Podcast
Questions and Answers
Which of the following is a primary characteristic of a zero-day attack?
Which of the following is a primary characteristic of a zero-day attack?
- Relying on social engineering tactics.
- Exploitation of a vulnerability with a known patch.
- Targeting only high-profile servers.
- Exploitation of a vulnerability that is unknown to the software vendor or antivirus vendors. (correct)
What is the primary function of an Intrusion Detection System (IDS)?
What is the primary function of an Intrusion Detection System (IDS)?
- To provide secure remote access to the network.
- To encrypt all network communications.
- To passively monitor network traffic and alert administrators to potential threats. (correct)
- To actively block malicious traffic.
In which operational mode does an Intrusion Prevention System (IPS) work to actively prevent malicious traffic?
In which operational mode does an Intrusion Prevention System (IPS) work to actively prevent malicious traffic?
- Inline mode. (correct)
- Monitoring mode.
- Promiscuous mode.
- Passive mode.
Which OSI layers are typically monitored by an Intrusion Prevention System (IPS) for threat detection?
Which OSI layers are typically monitored by an Intrusion Prevention System (IPS) for threat detection?
What is a key advantage of using an Intrusion Detection System (IDS) over an Intrusion Prevention System (IPS)?
What is a key advantage of using an Intrusion Detection System (IDS) over an Intrusion Prevention System (IPS)?
Which of the following statements accurately describes a key disadvantage of an Intrusion Prevention System (IPS)?
Which of the following statements accurately describes a key disadvantage of an Intrusion Prevention System (IPS)?
Which characteristic is common to both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
Which characteristic is common to both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
Which of the following is a benefit of using a Host-Based Intrusion Prevention System (HIPS)?
Which of the following is a benefit of using a Host-Based Intrusion Prevention System (HIPS)?
What is a limitation of a Network-Based Intrusion Prevention System (NIPS) regarding encrypted traffic?
What is a limitation of a Network-Based Intrusion Prevention System (NIPS) regarding encrypted traffic?
What factor should be considered when choosing an appropriate IPS solution for a network?
What factor should be considered when choosing an appropriate IPS solution for a network?
In a network which uses Cisco SPAN(Switched Port Analyzer), what is the primary purpose of configuring a monitor session?
In a network which uses Cisco SPAN(Switched Port Analyzer), what is the primary purpose of configuring a monitor session?
What command is used on a Cisco device to configure a SPAN session for intrusion detection?
What command is used on a Cisco device to configure a SPAN session for intrusion detection?
What does an IPS signature define?
What does an IPS signature define?
An IPS signature has how many distinct attributes?
An IPS signature has how many distinct attributes?
Which type of IPS signature consists of a single packet activity or event?
Which type of IPS signature consists of a single packet activity or event?
An IT department has configured their IPS to trigger an alarm when any traffic matches a specific signature, however the alarm is generated even when legitimate users access those resources. What type of alarm is the IPS generating?
An IT department has configured their IPS to trigger an alarm when any traffic matches a specific signature, however the alarm is generated even when legitimate users access those resources. What type of alarm is the IPS generating?
An IT department deployed an IPS but has been receiving a lot of false positive alarms. Which action should the IT department take to reduce the number of false positive alarms?
An IT department deployed an IPS but has been receiving a lot of false positive alarms. Which action should the IT department take to reduce the number of false positive alarms?
An IPS is configured to reset a TCP connection whenever it detects suspicious activity on a particular port. Which category of action does this IPS employ?
An IPS is configured to reset a TCP connection whenever it detects suspicious activity on a particular port. Which category of action does this IPS employ?
Which security practice is crucial for maintaining an effective Intrusion Prevention System (IPS)?
Which security practice is crucial for maintaining an effective Intrusion Prevention System (IPS)?
What is the purpose of Secure Device Event Exchange (SDEE) in network security?
What is the purpose of Secure Device Event Exchange (SDEE) in network security?
Which detection type compares current network traffic activity with pre-established traffic patterns?
Which detection type compares current network traffic activity with pre-established traffic patterns?
Which configuration is a best practice for an IPS?
Which configuration is a best practice for an IPS?
Which of the following actions can an IPS utilize but an IDS can't?
Which of the following actions can an IPS utilize but an IDS can't?
Which form of attack is particularly effective due to the fact that no official patch or protection exists?
Which form of attack is particularly effective due to the fact that no official patch or protection exists?
What step should a network administrator perform after installing a new IPS device on the network?
What step should a network administrator perform after installing a new IPS device on the network?
Flashcards
Zero-Day Attacks
Zero-Day Attacks
Attacks that exploit vulnerabilities that are unknown to the software vendor or the public.
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
A system that passively monitors network traffic and alerts administrators to potential security breaches.
Intrusion Prevention System (IPS)
Intrusion Prevention System (IPS)
A system that actively blocks or prevents detected intrusions, operating in-line to stop malicious traffic.
Application Layer Inspection
Application Layer Inspection
Signup and view all the flashcards
Signature
Signature
Signup and view all the flashcards
Atomic Signature
Atomic Signature
Signup and view all the flashcards
Composite Signature
Composite Signature
Signup and view all the flashcards
Signature File
Signature File
Signup and view all the flashcards
False Positive
False Positive
Signup and view all the flashcards
IPS Tuning
IPS Tuning
Signup and view all the flashcards
Secure Device Event Exchange (SDEE)
Secure Device Event Exchange (SDEE)
Signup and view all the flashcards
Port Mirroring/SPAN
Port Mirroring/SPAN
Signup and view all the flashcards
Atomic Signature
Atomic Signature
Signup and view all the flashcards
Host-Based IPS
Host-Based IPS
Signup and view all the flashcards
Network-Based IPS
Network-Based IPS
Signup and view all the flashcards
Study Notes
Implementing Intrusion Prevention
- Chapter 5 focuses on intrusion prevention implementation, as part of the CCNA Security v2.0 curriculum.
IPS Technologies
- Section 5.1 explores IPS technologies and explains zero-day attacks.
- Monitoring, detecting, and stopping attacks are key elements in IPS.
- Aims to describe the advantages and disadvantages of both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
IDS and IPS Characteristics
- Zero-day attacks exploit vulnerabilities that are unknown to the software vendor.
- IDS operates passively, requiring traffic mirroring.
- Mirrored network traffic will not pass through the IDS.
- IPS operates in inline mode and monitors traffic at Layers 3 and 4.
- IPS stops single-packet attacks and immediately responds, preventing malicious traffic from passing.
- IPS inspects traffic content at the application layer and blocks it.
- There are a few similarities between IDS and IPS which include deployment as sensors, use signatures to detect patterns of misuse, and detect atomic or composite patterns in traffic.
Advantages and Disadvantages of IDS and IPS
- IDS advantages include no network impact and continued operation even with sensor failure or overload.
- IDS disadvantages include the inability to stop the triggering event.
- IPS advantages includes abilities to stop trigger packets
- IPS disadvantages include potential network traffic disruption from sensor issues, network impact from overloading, and some impact on overall network performance.
Network-Based IPS Implementations
- Host-Based IPS provides protection specific to a host operating system.
- Host-Based IPS offers OS and application level protection, securing the host after message decryption.
- Host-Based IPS is usually dependent on the operating system and needs to be installed on all hosts.
- Network-Based IPS is cost-effective and OS independent.
- Network-Based IPS cannot examine encrypted traffic and must stop malicious traffic before it reaches a host.
IPS Solutions
- Cisco offers modular and appliance-based IPS solutions.
- These include Cisco IPS AIM, Network Module Enhanced (IPS NME), ASA AIP-SSM, IPS 4300 Series Sensors, and Catalyst 6500 Series IDSM-2.
- IPS sensor selection and deployment considers factors like network traffic volume, network topology, security budget, and available security staff.
Promiscuous Mode
- "Promiscuous Mode" uses the switch SPAN port to sends copies of traffic for analysis.
- The IDS then analyses a duplicate of all traffic, rather than the actual traffic.
Inline Mode
- Inline Mode is where the IPS Sensor sits to analyze all traffic
Modes of Deployment
- The common method of deployment includes "Promiscuous Mode" for IDS.
- The common method of deployment includes "Inline Mode" for IPS.
Cisco Switched Port Analyzer
- Port mirroring can be used to sniff traffic on both Hubs and Switches
- Cisco SPAN is used to monitor network traffic
- The
monitor session
command associates a source port and destination port with a SPAN session. - Show monitor command is used to verify the SPAN session.
IPS Signatures
- Section 5.2 focuses on IPS signatures, their characteristics, alarms, management, monitoring, and global correlation of Cisco IPS devices.
- IPS signatures consist of a set of rules used to detect intrusion activity.
- Signatures have three attributes which include a type, a trigger (alarm), and an action
- Signatures are categorized as either atomic or composite.
- Atomic signatures consist of a single packet, activity, or event for detection.
- Composite signatures identify a sequence of operations across multiple hosts over time.
- The latest should be uploaded to an IPS as threats evolve.
- Signature Alarm has both advantages and disadvantages.
- IPS signatures actions include the generation of an alert, logging of activity, preventing activities
Signature Alarms
- Pattern-based detection is easy to configure and has fewer false positives with good signature design.
- Anomaly-based detection is simple and reliable with customized policies.
- Policy-based detection is readily configured and detects unknown attacks.
- Honey pot-based detection enables window to view attacks, confuse attackers, slow down and avert attacks
Pattern-Based Detection example
- Atomic signature looks for no state to examine pattern to determine an appropriate action.
- An atomic signature example will detect a ARP request that has a source ethernet address of FF:FF:FF:FF:FF:FF:FF.
- Composite signature has to examine what state has to be appied, or even multiple states.
- An example composite signature is searching for a "confidential" string in a TCP session
Anomaly-Based Detection example
- Atomic signatures have no state required to identify activity that deviates from the configured profile.
- The composite signature looks at what state is required to identify if the profile deviates from its initial configuration
Policy Detection Example
Policy will identify what type of packets are detected, and compare them against the profile.
Alarm Triggering Mechanism
- False positives: Normal traffic triggers an alarm, requiring tuning of the alarm.
- False negatives: An attack occurs, but no alarm is generated, requiring alarm tuning.
- True positives: An attack occurs which triggers an alarm, representing an ideal setting.
- True negatives: Normal traffic with no alarm generated, also representing an ideal setting.
Secure Device Event Exchange
- Secure Device Event Exchange is used for network managmen and to monitor alarms over Syslog
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.