Podcast
Questions and Answers
What best describes a zero-day attack?
What best describes a zero-day attack?
- An attack that is easily detectable.
- An attack that occurs on the last day of the month.
- An attack that exploits a vulnerability before a patch is available. (correct)
- An attack that uses only zero packets.
Which of the following is a primary function of an Intrusion Detection System (IDS)?
Which of the following is a primary function of an Intrusion Detection System (IDS)?
- To completely isolate the network from external threats.
- To actively block malicious traffic.
- To encrypt all network communications.
- To passively monitor network traffic for suspicious activity. (correct)
How does an Intrusion Prevention System (IPS) operate in the network?
How does an Intrusion Prevention System (IPS) operate in the network?
- In offline mode, analyzing stored traffic logs.
- In passive mode, similar to an IDS.
- In standalone mode, not connected to the network.
- In inline mode, directly in the path of network traffic. (correct)
Which OSI layer does an IPS inspect to block malicious traffic?
Which OSI layer does an IPS inspect to block malicious traffic?
Which of the following is a common characteristic of both IDS and IPS?
Which of the following is a common characteristic of both IDS and IPS?
What is an advantage of using an IDS over an IPS?
What is an advantage of using an IDS over an IPS?
What is a disadvantage of using an IPS?
What is a disadvantage of using an IPS?
What is a key advantage of a network-based IPS?
What is a key advantage of a network-based IPS?
Which of the following is true regarding network-based IPS?
Which of the following is true regarding network-based IPS?
Which is a factor that affects IPS sensor selection and deployment?
Which is a factor that affects IPS sensor selection and deployment?
What term describes the method where an IPS analyzes traffic by receiving a copy of it?
What term describes the method where an IPS analyzes traffic by receiving a copy of it?
What is the purpose of a SPAN port in network monitoring?
What is the purpose of a SPAN port in network monitoring?
Which command is used to configure a SPAN session to monitor traffic?
Which command is used to configure a SPAN session to monitor traffic?
What are the three distinct attributes of IPS Signatures?
What are the three distinct attributes of IPS Signatures?
What is the simplest type of signature that consists of a single packet?
What is the simplest type of signature that consists of a single packet?
What does a signature file contain?
What does a signature file contain?
Which detection type has easy configuration and fewer false positives?
Which detection type has easy configuration and fewer false positives?
Which detection has attacks that can be viewed through a window?
Which detection has attacks that can be viewed through a window?
Which of the following is true about the advantages of anomaly based detection?
Which of the following is true about the advantages of anomaly based detection?
Which alarm occurs when normal user traffic is categorized as malicious?
Which alarm occurs when normal user traffic is categorized as malicious?
Which alarm occurs when attack traffic is allowed without any flagging?
Which alarm occurs when attack traffic is allowed without any flagging?
Which alarm results in an ideal setting?
Which alarm results in an ideal setting?
What signature action permits traffic to appear as normal based on configured exceptions?
What signature action permits traffic to appear as normal based on configured exceptions?
What signature action can an approved IT scanning host use?
What signature action can an approved IT scanning host use?
What is the name of the protocol used for Secure Device Event Exchange?
What is the name of the protocol used for Secure Device Event Exchange?
IDS works in an inline mode.
IDS works in an inline mode.
IPS can stop single packet attacks.
IPS can stop single packet attacks.
A zero-day attack exploits known vulnerabilities.
A zero-day attack exploits known vulnerabilities.
IDS requires traffic to be mirrored to it.
IDS requires traffic to be mirrored to it.
IPS only monitors layer 7 traffic.
IPS only monitors layer 7 traffic.
IDS can actively block malicious traffic.
IDS can actively block malicious traffic.
IPS always has a direct impact on network performance.
IPS always has a direct impact on network performance.
Host-based IPS is cost-effective.
Host-based IPS is cost-effective.
Network-based IPS can examine encrypted traffic.
Network-based IPS can examine encrypted traffic.
Both IDS and IPS can be deployed as sensors.
Both IDS and IPS can be deployed as sensors.
IDS does not provide operating system-level protection.
IDS does not provide operating system-level protection.
Network topology is not a factor when choosing an IPS solution.
Network topology is not a factor when choosing an IPS solution.
When new threats are identified, new signatures do not need to be uploaded to an IPS.
When new threats are identified, new signatures do not need to be uploaded to an IPS.
IDS and IPS only use atomic patterns.
IDS and IPS only use atomic patterns.
A SPAN port sends copies of traffic.
A SPAN port sends copies of traffic.
A signature file contains a package of newtwork signatures
A signature file contains a package of newtwork signatures
An atomic signature requires must contain state.
An atomic signature requires must contain state.
Intrusion Detection System (IDS) operationally responds immediately by allowing any malicious traffic to pass.
Intrusion Detection System (IDS) operationally responds immediately by allowing any malicious traffic to pass.
Intrusion Prevention Systems (IPS) sensor overloading does not impacts the network
Intrusion Prevention Systems (IPS) sensor overloading does not impacts the network
IDS is implemented in an inline mode.
IDS is implemented in an inline mode.
IPS triggers packets.
IPS triggers packets.
Host-based IPS are operating system independent.
Host-based IPS are operating system independent.
IPS can be deployed in Inline Mode only.
IPS can be deployed in Inline Mode only.
An IDS sensor failure will impact the network.
An IDS sensor failure will impact the network.
The action 'Request SNMP trap' is a specific alert.
The action 'Request SNMP trap' is a specific alert.
Flashcards
What is a zero-day attack?
What is a zero-day attack?
An attack that exploits a vulnerability before a patch is available.
How does an IDS monitor attacks?
How does an IDS monitor attacks?
Works passively, requires mirroring, doesn't pass traffic unless mirrored.
How does an IPS detect & stop attacks?
How does an IPS detect & stop attacks?
Implemented inline, monitors L3/L4 traffic, stops single packets, responds immediately.
What does an IPS inspect?
What does an IPS inspect?
Signup and view all the flashcards
Similarities between IDS and IPS
Similarities between IDS and IPS
Signup and view all the flashcards
Advantages of IDS
Advantages of IDS
Signup and view all the flashcards
Advantage of IPS
Advantage of IPS
Signup and view all the flashcards
Disadvantage of IDS
Disadvantage of IDS
Signup and view all the flashcards
Disadvantages of IPS
Disadvantages of IPS
Signup and view all the flashcards
Advantages of Host-Based IPS
Advantages of Host-Based IPS
Signup and view all the flashcards
Advantages of Network-Based IPS
Advantages of Network-Based IPS
Signup and view all the flashcards
Disadvantages of Host-Based IPS
Disadvantages of Host-Based IPS
Signup and view all the flashcards
Disadvantages of Network-Based IPS
Disadvantages of Network-Based IPS
Signup and view all the flashcards
Factors for choosing an IPS solution
Factors for choosing an IPS solution
Signup and view all the flashcards
Network IPS advantages
Network IPS advantages
Signup and view all the flashcards
Network IPS disadvantages
Network IPS disadvantages
Signup and view all the flashcards
Promiscuous Mode for IDS
Promiscuous Mode for IDS
Signup and view all the flashcards
Inline Mode for IPS
Inline Mode for IPS
Signup and view all the flashcards
Monitor Session command
Monitor Session command
Signup and view all the flashcards
What is a Signature?
What is a Signature?
Signup and view all the flashcards
Attributes of a signature
Attributes of a signature
Signup and view all the flashcards
What is Atomic Signature?
What is Atomic Signature?
Signup and view all the flashcards
What is composite signature?
What is composite signature?
Signup and view all the flashcards
What is a signature file?
What is a signature file?
Signup and view all the flashcards
What is an Intrusion Prevention System (IPS)?
What is an Intrusion Prevention System (IPS)?
Signup and view all the flashcards
What is port mirroring?
What is port mirroring?
Signup and view all the flashcards
What is Cisco Switched Port Analyzer (SPAN)?
What is Cisco Switched Port Analyzer (SPAN)?
Signup and view all the flashcards
What is an atomic signature?
What is an atomic signature?
Signup and view all the flashcards
Generating an alert
Generating an alert
Signup and view all the flashcards
Logging the activity
Logging the activity
Signup and view all the flashcards
Dropping or preventing activity
Dropping or preventing activity
Signup and view all the flashcards
Resetting a TCP connection
Resetting a TCP connection
Signup and view all the flashcards
Blocking future activity
Blocking future activity
Signup and view all the flashcards
Allow the activity
Allow the activity
Signup and view all the flashcards
Anomaly-based detection
Anomaly-based detection
Signup and view all the flashcards
Policy-based detection
Policy-based detection
Signup and view all the flashcards
Honeypot-based detection
Honeypot-based detection
Signup and view all the flashcards
False positive
False positive
Signup and view all the flashcards
False negative
False negative
Signup and view all the flashcards
True positive
True positive
Signup and view all the flashcards
True negative
True negative
Signup and view all the flashcards
Study Notes
- Implementing Intrusion Prevention is covered in Chapter 5 of CCNA Security v2.0
- Dr. Nadhir Ben Halima is the author
### IPS Technologies
- This section explains zero-day attacks
- It covers how to monitor, detect, and stop attacks
- It also describes the advantages and disadvantages of IDS and IPS
### IDS and IPS Characteristics
- A zero-day attack is an attack that exploits a previously unknown vulnerability
- The monitor traffic passively and require mirroring to reach it
- Network traffic does not pass through IDS unless mirrored
- IPS is implemented in an inline mode
- IPS monitors Layer 3 and Layer 4 traffic
- IPS stops single packet attacks from reaching target
- IPS responds immediately and will not allow malicious traffic to pass
- IPS inspects malicious traffic content at the application layer and blocks it
- Both IDS and IPS are deployed as sensors
- Both IDS and IPS use signatures to detect patterns of misuse in network traffic
- Both can detect atomic patterns, ie single-packed, or composite patterns, ie multi-packet
### IDS vs IPS - Advantages and Disadvantages
- IDS: No impact on network, no impact given sensor failure/overload. Disadvantage = response action cannot stop trigger
- IPS: Stops trigger packets. Disadvantage = sensor issues/overloading affects network traffic, some impact on network
### Network-Based IPS Implementations
- Host-Based IPS Advantages: Provides protection specific to a host operating system along with the operating system and application level protection, and protects the host after the message is decrypted
- Host-Based IPS Disadvantages: Operating system dependent, and must be installed on all hosts
- Network-Based IPS Advantages: Cost effective and the OS is independent
- Network-Based IPS Disadvantages: Cannot examine encrypted traffic and must stop malicious traffic prior to arriving at the host
### Cisco IPS Solutions
- Cisco offers Modular and Appliance-Based IPS Solutions
- Cisco IPS AIM and Network Module Enhanced (IPS NME)
- Cisco ASA AIP-SSM
- Cisco IPS 4300 Series Sensors
- Cisco Catalyst 6500 Series IDSM-2
### Choosing/Deploying an IPS Sensor
- Factors include amount of network traffic, network topology, the security budget and security staff available to manage IPS
### IPS Advantages and Disadvantages
- Network IPS Advantages: cost-effective, not visible on the network, OS independent and can see lower level network events
- Network IPS Disadvantages: Cannot determine if the attack was successful, nor can they examine encrypted traffic
### Modes of Deployment
- Promiscuous Mode and Inline Mode exist
- Promiscuous mode is associated with IDS
- Inline mode is associated with IPS
### SPAN
- Cisco Switched Port Analyzer sends copies of the traffic
### Cisco SPAN usage
- Associate a source port and a destination port with a SPAN session
- To Verify the SPAN session use the Show monitor command
### IPS Signatures
- IPS Signatures: Understand IPS signature characteristics, explain IPS signature alarms, manage and monitor IPS, and understand the global correlation of Cisco IPS devices
### IPS Signature Characteristics
- A signature is a set of rules that an IDS and an IPS use to detect typical intrusion activity
- Signatures have three distinct attributes: type, trigger (alarm), action
### Signature Type details
- Atomic signature: this simplest type includes a single packet, activity, or event that is examined to determine if it matches a configured signature
- Composite signature: identifies a sequence of operations distributed across multiple hosts over an arbitrary period of time
### Signature File details
- As new threats are identified, signatures need to be created and uploaded to an IPS
- A signature file contains a package of network signatures
### IPS Signature Alarms
- Categories include Pattern-based, Anomaly-based, Policy-based and Honey pot-based Detection,
### Signature Alarm types
- Pattern-based Detection, is easy easy to configure due to fewer false positives and a superior signatures design
- Anomaly-based Detection is reliable because of customized policies
- Policy-based Detection is easy to configure and can detect unknown attacks
- Honey pot-based Detection allows you to view attacks, distract and confuse attackers, slow down and avert attacks, and collect information about attack
### Signature Alarms - Disadvantages
- Pattern-based Detection: Cannot detect unknown signatures must be created, updated, and tuned and initially include a lot of false positives
- Anomaly-based Detection: Produces generic output and the policy must be created
- Policy-based Detection: Difficult to profile typical activity in large networks and the traffic profile must be constant
- Honey pot-based Detection: Requires a dedicated honey pot server (hot pot) that must not be trusted
### Signature Type Example
- Atomic Signature: No state required to examine pattern to determine if signature action applied given Pattern-based Detection
- Composite Signature: With Pattern-based Detection, must contain state or examine multiple items to determine if signature action should be applied.
### Atomic Signature Action
- An example is when detecting an Address Resolution Protocol (ARP) request that has a source Ethernet address of FF:FF:FF:FF:FF:FF.
### Composite Signature Action
- An example is when searching for the string "confidential" across multiple packets in a TCP session.
### Composite Signature example with Anomaly-based Detection
- State required to identify activity that deviates from normal profile
- An example is verifying protocol compliance for HTTP traffic.
### Action Trigger types
- Normal user traffic: Indicates a false positive whereby an alarm is generated when there is no actual threat necessitating a tune alarm
- Attack traffic: Indicates a true positive where there is alarm generated in order to reach ideal settings
- Attack traffic: Indicates a false negative whereby No alarm generated when there is one necessitating a tune alarm
- Normal user traffic: Indicates a true negative (an ideal setting) when the alarm generated is normal user traffic
### Signature Actions
- Actions include: Generating an alert, Logging the activity, Dropping or preventing the activity, Resetting a TCP connection, Blocking future activity and allowing the activity
### Details on Signature Actions
- Generating an alert: Produce an alert or a verbose alert
- Logging the activity: Log attacker packets, a log pair of packets (attacker and defendant packets), Log victim packets
- Dropping or preventing the activity: Deny attacker inline, deny connection inline, deny packet inline
- Resetting a TCP connection: Reset a TCP connection
- Blocking future activity: Request block connection, request block host, request SNMP trap
- Allow the activity: Allow the traffic to appear as normal based on configured exceptions
### Secure Device Event Exchange
- Consists of Alarm, SDEE and Syslog protocols that are used by the Network Management Console and the Syslog Server
### IPS Configuration Best Practices
- A firewall and IPS will provide the most effective outcome
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.