当前位置:网站首页>What is an intrusion detection system?
What is an intrusion detection system?
2022-06-24 07:16:00 【Network technology alliance station】
Before today's article begins , Please watch this video first , It's easy to get into a door :
https://cloud.tencent.com/developer/video/23621
Intrusion detection overview
A malicious attack on an organization's information base by electronic means is called information warfare (information warfare) . The purpose of the attack may interfere with the normal activities of the organization , Even attempt to cause serious damage to the organization's information base . All kinds of countermeasures against information warfare can be classified into three categories : Protect 、 testing 、 Respond to .
** Protect ** ( Intrusion prevention ) Refers to the protection hardware 、 Software 、 Data protection against various attacks . At present, various network security facilities such as firewall and VPN, Various encryption technologies , Authentication technology , Vulnerable scanning and so on are within the scope of protection , They are the first line of defense for computer systems .
** testing ** ( Intrusion detection ) Study how to detect network attacks efficiently and correctly . Intrusion prevention alone is not enough to protect the security of computers , There are inevitable defects in any system and protocol , It may be the protocol itself or the implementation of the protocol , There are also social relations issues beyond technology , Can threaten information security . So even with these protective measures , The intruder may still exploit the corresponding flaw to break into the system , This means that intrusion detection can not be replaced by other security measures .
** Respond to ** ( Intrusion response ) It is the processing work after intrusion detection , It mainly includes loss assessment , Eradicate the back door left by the invaders , Data recovery , Collect evidence left by intruders, etc . These three security measures constitute a complete information warfare defense system .
Intrusion detection (Intrusion Detection ,ID) Is one of the topics discussed in this chapter , It monitors certain information of the computer system , To analyze , Detecting intrusion , And react . The system information detected by the intrusion detection system includes system records , The network traffic , Application logs, etc . intrusion ( Intrusion ) It is defined as unauthorized computer users and improper use (misuse) A legitimate user of a computer ( Internal threats ), Endangering or attempting to endanger the integrity of resources 、 confidentiality 、 Usability behavior . intrusion detection system (Intrusion DetectionSystem,IDS) It is the hardware and software to realize the intrusion detection function . Intrusion detection is based on the assumption that , namely : Intrusion behavior is significantly different from normal behavior , So it can be detected . The research of intrusion detection began in 20 century 80 years , Get into 90 In the s, intrusion detection has become a hot spot in research and application , There have been many research prototypes and commercial products .
Intrusion detection system is the complement of intrusion prevention system in function , It is not a substitute for intrusion prevention system . contrary , It works with these systems , Detect attacks that have evaded the control of these systems . Intrusion detection system is a kind of computer system security 、 The second line of defense for network security .
An ideal intrusion detection system has the following characteristics :
- Capable of continuous operation with minimal human intervention .
- Be able to recover and reset from system crash .
- Can resist attack .IDS You must be able to monitor yourself and detect whether you have been changed by an attacker .
- The runtime takes up the least overhead of the system .
- It can be configured according to the security policy of the monitored system .
- Be able to adapt to changes in system and user behavior during use .
As the size of the monitored system and the chance of being attacked increase , We believe that the following characteristics are equally important :
- It can detect the network with a certain scale .
- Guarantee IDS When a part is broken , The impact on the rest should be as small as possible .
- Allow dynamic reconfiguration , That is, it must have the ability to be configured again without restarting .
- Provide a very low false positive rate .
- Provide interoperability , Running in different environments IDS Components can interact .
- Provide a convenient user interface , Make it easy for managers to configure and monitor the system .
- It can detect intrusion in a real-time or near real-time manner .
Current intrusion detection systems ( Including research prototypes and commercial IDS) The number of has exceeded onehundred , They have only part of the above characteristics .
Intrusion detection system architecture
CIDF (Common Intrusion Detection Framework) Defines the universal IDS System structure , It divides the intrusion detection system into four functional modules :
** Event generator **(Event generater, E-box) Collect intrusion detection events , And provide IDS Treatment of other parts , yes IDS Information sources for . Events cover a wide range , It can be either network activity or system call sequence and other system information . The quality of the event 、 Quantity and type are right IDS The impact on performance is significant .
** Event analyzer **(Analysis engine, A-box ) Analyze the input events and detect intrusion . many IDS All of the researches on this topic focus on how to improve the capability of event analyzer , Including improving the accuracy of identifying known intrusions and improving the probability of detecting unknown intrusions .
** Event database **(Event database, D-box )E-boxes and A-boxes Generating a lot of data , The data must be stored properly , For future use . D-box Its function is to store and manage this data , be used for IDS Training and evidence preservation .
** Event responder **(Response unit, C-box) Respond to intrusions , This includes warning Administrators , Disconnect the intrusion connection , Eradicate the back door left by intruders and data recovery .
CIDF Summed up IDS The function of , And a reasonable division . This model can be used to describe the existing IDS The system structure of . Yes IDS It provides valuable guidance for the design and implementation of .
Intrusion detection system classification
In order to classify accurately , The first thing to do is to identify the IDS features .IDS It's a complex system , If only one feature is used for classification , The result will be rough . Therefore, this chapter compares... According to various characteristics IDS It is classified from different angles . The event analyzer is IDS The core of , Therefore, the detection methods are classified first . Secondly, it classifies from the perspective of event generator , Take the type of event or the method of event collection as the classification standard .
Classification of test methods
Intrusion detection methods can be broadly divided into two categories : Abuse detection (misuse detection) 、 Anomaly detection (anomaly detection) . stay IDS in , Any one of these events can fall into three categories :
- Known intrusion
- Known normal state
- Unable to determine the status
The third event may be an unknown intrusion , It may also be normal , However, under the existing system and technology, it is impossible to determine . The current detection methods are to identify the known intrusion and the known normal state , Abuse detection identifies known intrusions , However, unknown intrusions in undeterminable States will be missed (false negative) , Anomaly detection will know the intrusion according to the known normal state 、 All undecidable states are treated as exceptions , Therefore, false positives will occur (falsepositive) .
1. Abuse detection
Based on knowledge of known intrusions , Detect intrusion in input events . This method does not care about normal behavior , Study only known intrusions , It can detect known intrusions more accurately , But the ability to detect unknown intrusion is limited . Most businesses today IDS All use this method . The technologies used in abuse detection include :
2. expert system
Using expert system technology , Use rules to represent intrusions . It's usually used forward-chaining 、production-based And other expert system tools . for example DARPA Of Emerald project , take P-BEST The toolkit is applied to intrusion detection .
3. State transition model
The intrusion is represented as a series of system state transitions , Detect intrusions by monitoring changes in system or network status . A typical system is NetSTAT.
4. Protocol analysis and string matching
Match the known attack pattern with the input event to determine the occurrence of the intrusion , This method has high speed 、 Good expansibility , But it is prone to false positives . Typical systems include shadow、Bro and Snort etc. .
5. Anomaly detection
Contrary to abuse detection , Anomaly detection studies the normal state of the system , By monitoring user behavior patterns 、 Host system call characteristics 、 Network connection status, etc , Establish the normal model of the system . In operation , Compare the current system behavior with the normal model , Determine the nature of the event according to the degree of deviation from the normal . This method is likely to detect unknown intrusion and variant attack , However, the existing systems usually have a large number of false positives . The detection of unknown intrusion is IDS The most challenging question in , It is more difficult than improper behavior detection . Anomaly detection usually uses statistical methods and machine learning methods .
6. Statistical methods
Using statistical analysis method to establish the normal model of the system . Statistical data sources include : User keystroke characteristics 、telnet The average length of the conversation, etc . The attribute of the event is judged by monitoring the deviation between the input value and the expected value ,Emerald and cmds All include this way .
7. Machine learning methods
Methods and tools in the field of machine learning, such as neural networks 、 data mining 、 Genetic algorithm (ga) 、 Application of Bayesian network and artificial immune system in anomaly detection . This method is also used to identify anomalies by establishing a normal model . Each method has different application scope and characteristics . One of the hotspots of current research is noise data learning .
8. Mixed detection
The above two kinds of detection methods have their own advantages , Abuse detection can detect known attacks accurately and efficiently ; Anomaly detection can identify unknown attacks . At present, any kind of system can not complete all the intrusion detection tasks well . blend IDS It contains both pattern recognition and anomaly recognition systems , And according to the characteristics of the two methods, the division of labor , It can accurately identify known attacks , Some unknown attacks can be found , It can reduce false positives and false negatives .Emerlad It is a typical hybrid system .
System structure classification
from IDS The monitored events can be classified into network-based events IDS(Network-based IDS,NIDS) And host based IDS. according to IDS The response mode of can be divided into real-time IDS And non real time IDS, It is divided into distributed events according to the way of collecting events IDS And centralized IDS.
Host based IDS Data sources include : System call sequence , Storage system activity records , System logs, etc . Due to host based IDS Have a full grasp of the host information and have strong control over the host , Therefore, compared with network intrusion detection system , Its detection accuracy is higher , Lower false positive rate . Simultaneous host based IDS More difficult to cheat , The response to the attack is also more effective : The intrusion connection can be disconnected , Kill process . Its disadvantage is that only one host can be protected , And a certain burden on the host , And poor portability .
Web based IDS Detect intrusion activity by monitoring network traffic , It is called network intrusion detection system for short (NIDS).NIDS It can protect the whole network , Its advantages are simplicity and portability . NIDS The use of will not have a significant impact on the existing network system , And can be applied to various network environments . Network intrusion detection system only deals with network data , The semantic grasp of data is insufficient , Vulnerable to attack and deception . Adapting to high-speed network and improving scalability are NIDS Problems to be solved .
Two of the above IDS Can not complete effective intrusion detection alone , The combination of the two can achieve the effect of learning from each other . At present, some businesses IDS This scheme has been adopted , Such as RealSecurity,Axnet.
IDS The application scale of is also an important parameter . Existing business IDS The scope of application is LAN . With the development of network intrusion , Attacks have evolved into coordinated attacks from different hosts . Detection of such attacks is an existing IDS Not competent , Need to rely on multi-point distributed network intrusion detection system , Detect through joint defense .
3、 ... and 、 A typical intrusion detection system
IDS From the last century 80 The years have begun , The first business IDS Also in the 1991 The year was born . At present, all kinds of IDS The number of research projects and commercial products is extremely large , The following is an introduction to the representative intrusion detection system , It's divided into business IDS、IDS Research projects and free software .
1. Open source IDS project :Snort
Snort It is a network intrusion detection system based on abuse detection that runs on a single computer . Snort adopt libpcap Get network package , And analyze the protocol . It defines a simple and flexible network intrusion description language , Describe the network intrusion ( Intrusion signature or intrusion signal ).Snort Match and search network data according to intrusion description , Capable of detecting various network attacks and reconnaissance , Include : Buffer overflow attack , Port scanning , CGI attack ,SMB Reconnaissance, etc . It also provides a variety of attack response methods . For the latest attack methods , Use Snort Intrusion description language can write the description of new attacks quickly and easily , So that Snort Can detect this attack . stay Internet Publishing has been established on Snort Intrusion mode database site . Snort Is a very dynamic free software , Under the development of volunteers all over the world , Technology and functions are constantly improving .
2. Commercial products
Mainstream business in the international market IDS Most of the products are web-based , Systems using abuse detection methods . There are mainly :
1、RealSecure
RealSecure from Internet Security Systems(ISS) Development , There are three system components :
- Network intrusion detection agent,
- Host intrusion detection agent
- Administrative console .
RealSecure It belongs to distributed structure , Each network monitor runs on a dedicated workstation , Monitor different network segments . RealSecure The intrusion detection method belongs to abuse detection , It can detect almost all mainstream attacks , The seamless integration of host based detection and network-based detection is realized . For different applications such as Exchange、MS SQL、LDAP、Oracle and Sybase etc. ,RealSecure Special system agents are provided for intrusion detection . The whole system is configured by a management program and interacts with users , Information such as safety reports can be provided .RealSecure The disadvantage of is that you can't do package reassembly , This makes it vulnerable to deception .ISS In seven IDS Got the highest rating in the evaluation of .
2、NFR
Network Flight Recorder? (NFR) It is a network intrusion detection system based on abuse detection . It is available in two versions : Business Edition , Research edition ( Provide source code ), The release of the research version has been stopped . NFR Use the modified Libpcap Carry out network packet capturing , And has a perfect package analysis script language N-code, It can be used to write detection and processing programs for various attacks . NFR Is the world's first TCP Package reorganization function IDS product , This makes NFR Able to resist Ptacek and Newsham Proposed avoidance IDS Methods .
3. The research system mainly includes :
1、EMERALD
EMERALD (Event Monitoring Enabling Responses to Anomalous LiveDisturbances) yes DARPA A sub project of intrusion detection research , It integrates the abuse detection module and the anomaly detection and analysis module for collaborative analysis . Its development fully applies the idea of software engineering , Each module of the system is independent 、 Reusability . The design objectives of the system include the rapid integration of novel analytical techniques , It can quickly adapt to the dynamic changes of the existing network environment configuration .
EMERALD The expert system is applied P-BEST Implement abuse detection , Application of statistical analysis technology to achieve anomaly detection . The system structure is a distributed structure that can be easily extended , The monitors can communicate with each other , Form a hierarchical structure . The monitor has cross network communication capability , Sharable analysis methods , Cooperate to detect distributed network attacks , Suitable for large-scale wide area network intrusion detection .EMERALD Still developing , The technologies and methods it uses represent IDS The direction of Technological Development .
2、JAM
JAM yes DARPA A research project of , The distributed multi-agent structure is adopted . Every agent Distributed learning on different data sources , And share knowledge .JAM Data mining technology and meta-learning Technology for anomaly detection . at present JAM From experimental system to application , The technology will be applied to NFR In the new generation of products .
边栏推荐
- High energy ahead: Figure 18 shows you how to use the waterfall chart to visually reflect data changes
- The cloud monitoring system hertzbeat V1.1.0 is released, and a command starts the monitoring journey!
- 捏脸师: 炙手可热的元宇宙造型师
- Smart space 𞓜 visualization of operation of digital twin cargo spacecraft
- Huawei cloud image engine service
- Implementation and usage analysis of static pod
- JVM调试工具-Arthas
- Tencent host security captures Yapi remote code execution 0day vulnerability for wild exploitation. The attack is spreading and can be intercepted by firewall
- 0 foundation a literature club low code development member management applet (4)
- 内网学习笔记(4)
猜你喜欢

华为云图引擎服务

Decryption of the original divine square stone mechanism

Intranet learning notes (4)

现货黄金有哪些眩人的小技术?

Unexpected token u in JSON at position 0

Application configuration management, basic principle analysis

Intelligent Vision Group A4 paper recognition example

【信号识别】基于深度学习CNN实现信号调制分类附matlab代码

【均衡器】LS均衡器,DEF均衡器以及LMMSE均衡器的误码率性能对比仿真

Counter attack of flour dregs: MySQL 66 questions, 20000 words + 50 pictures
随机推荐
Why use lock [readonly] object? Why not lock (this)?
【云驻共创】华为云HCIA-IoT V2.5培训系列内容之物联网概览
Computing power and intelligence of robot fog
【图像融合】基于伪 Wigner 分布 (PWD) 实现图像融合附matlab代码
Typora charges? Build vs Code markdown writing environment
Huawei cloud database advanced learning
Canal installation configuration
System design: partition or data partition
Counter attack of flour dregs: MySQL 66 questions, 20000 words + 50 pictures
Introduction to game design and development - layered quaternion - dynamic layer
基因检测,如何帮助患者对抗疾病?
Audio knowledge (V) -- data processing
MFC使用控制台时 项目路径中不能有空格和中文,否则会报错误 LNK1342 未能保存要编辑的二进制文件的备份副本等
How do I check the IP address? What is an IP address
雲監控系統 HertzBeat v1.1.0 發布,一條命令開啟監控之旅!
内网学习笔记(4)
One year since joining Tencent
Huawei Cloud Database Advanced Learning
【信号识别】基于深度学习CNN实现信号调制分类附matlab代码
JVM调试工具-jmap