Process Models for Intrusion Detection Summary - CSU1288 - Shoolini U

Summary of Process Models for Intrusion Detection

1. What is a Process Model in IDS?

2. Key Phases in IDS Process

  1. Data Collection

    • Collects logs, network traffic, user activity.
  2. Data Preprocessing

    • Filters and normalizes data.
  3. Feature Extraction

    • Identifies relevant patterns or behaviors.
  4. Detection/Analysis

    • Uses detection techniques (signature, anomaly, hybrid).
  5. Alert Generation

    • Issues warnings for detected threats.
  6. Response/Action

    • Blocks, alerts, or quarantines based on threat type.

3. Process Models

A. Signature-Based Detection

B. Anomaly-Based Detection

C. Hybrid Detection

4. Visual Flow (General)

Data Collection → Feature Extraction → Detection → Alert → Response

5. Process Model Selection Criteria

  1. Network Environment: Size and complexity.
  2. Detection Needs: Known vs. unknown threats.
  3. False Positive Tolerance
  4. Resource Constraints
  5. Cost vs. Benefit

6. Benefits of IDS Process Models

7. Challenges

8. Advantages & Limitations of Each Model

Model Advantages Limitations
Signature Fast, low resource usage, accurate for known Misses new/variant attacks
Anomaly Detects unknown threats, adaptable High false positives, complex setup
Hybrid Combines strengths, broader coverage Complex, higher computational cost

9. Data Collection in IDS

10. Best Practices

  1. Regular Updates: Signatures and baselines.
  2. Use Hybrid Models: For complete coverage.
  3. Threshold Tuning: Reduces false alarms.
  4. Integration: With firewalls, SIEM, IPS for better security.