Summary of Information Sources of IDS
2025, March 6
1. Overview of IDS Components
- Detection Engine: Analyzes data to detect potential intrusions.
- Data Sources: Collects information from hosts and networks.
- Alerting System: Notifies administrators of security threats.
- Response System: Takes action when an intrusion is detected.
2. Information Sources in IDS
- Definition: Raw data collected to detect threats and malicious activity.
- Types:
- Host-Based Information Sources
- Network-Based Information Sources
3. Host-Based Information Sources
- Definition: Data collected from individual systems (e.g., servers, workstations).
- Key Sources:
- System Logs: OS and application logs (e.g., Linux syslog, Windows Event Logs).
- File Integrity Checking: Detects unauthorized file changes (Tripwire, OSSEC).
- Process Monitoring: Tracks system activity and CPU/memory usage.
- Audit Trails: Logs user activities and security events.
Advantages:
- Detects insider threats.
- Provides detailed host-level monitoring.
4. Network-Based Information Sources
- Definition: Monitors network traffic to detect intrusion attempts.
- Key Sources:
- Network Traffic Logs: Captures data packets (Wireshark, tcpdump).
- Firewall Logs: Monitors blocked/unusual network activity (pfSense, Cisco ASA).
- Router/Switch Logs: Records packet forwarding details (Cisco, Juniper).
- NIDS/NIPS Logs: Logs from Snort, Suricata, Bro IDS.
Advantages:
- Detects external threats before they reach endpoints.
- Provides network-wide threat visibility.
5. Combining Host-Based & Network-Based Sources
- Why Combine?
- Holistic View: Detects both internal and external attacks.
- Enhanced Threat Detection: Identifies attacks that bypass individual defenses.
- Real-Time Monitoring: Improves response to active threats.
Example:
- An attacker may bypass network defenses but leave traces in host logs (e.g., file modifications).
6. Goals of Intrusion Detection Systems (IDS)
Primary Goals:
- Attack Detection: Identifies unauthorized access and policy violations.
- Alerting & Notification: Notifies security teams of potential threats.
- Forensic Analysis: Logs data to aid in security investigations.
- Attack Prevention: When integrated with Intrusion Prevention Systems (IPS).
Secondary Goals:
- Policy Enforcement: Ensures compliance with security standards.
- Resource Protection: Detects and prevents resource exhaustion attacks.
7. IDS Architecture
- Key Components:
- Sensors: Collect data from hosts and networks.
- Analysis Engine: Detects patterns of attacks (Signature-Based & Anomaly-Based).
- Alerting Mechanism: Sends notifications via Email, SMS, SIEM dashboards.
- Response System: Takes action (passive logging or active blocking).
8. IDS Detection Mechanisms
- Signature-Based Detection: Matches known attack patterns.
- Anomaly-Based Detection: Identifies deviations from normal behavior.
9. IDS Alerting System
- Real-Time Alerts: Immediate notifications for critical threats.
- Log-Based Alerts: Alerts generated from event logs.
10. IDS Response System
- Passive Response: Logs the threat but takes no direct action.
- Active Response: Blocks attackers (e.g., blacklisting IPs).
- Integration with IPS: Automates prevention for detected threats.
11. IDS Design Considerations
- Scalability: Can handle high traffic volumes.
- Accuracy: Minimizes false positives/negatives.
- Deployment Flexibility: Uses HIDS, NIDS, or Hybrid IDS based on environment.
- Integration: Works with firewalls, SIEMs, and other security tools.
Conclusion
- IDS collects and analyzes host-based and network-based data to detect threats.
- Combining both sources improves detection accuracy and response times.
- IDS plays a crucial role in network security and incident response.