Podcast
Questions and Answers
What type of attack is one for which no signature exists?
What type of attack is one for which no signature exists?
- Phishing attack
- Zero-day attack (correct)
- Brute force attack
- Malware attack
Which action does an IDS take regarding network traffic?
Which action does an IDS take regarding network traffic?
- Generates new traffic
- Modifies traffic
- Passively monitors traffic (correct)
- Actively blocks traffic
What is a primary function of an IPS?
What is a primary function of an IPS?
- Blocking malicious traffic (correct)
- Accelerating network speed
- Decrypting encrypted data
- Compressing data packets
What Layer does IPS inspect malicious traffic content?
What Layer does IPS inspect malicious traffic content?
Which characteristic is common to both IDS and IPS?
Which characteristic is common to both IDS and IPS?
What is an advantage of an IDS?
What is an advantage of an IDS?
What action does an IPS take that an IDS does not?
What action does an IPS take that an IDS does not?
Which implementation provides operating system and application-level protection?
Which implementation provides operating system and application-level protection?
Which implementation is operating system independent?
Which implementation is operating system independent?
What is a disadvantage of network-based IPS?
What is a disadvantage of network-based IPS?
What is an IPS deployment mode?
What is an IPS deployment mode?
What does SPAN stand for?
What does SPAN stand for?
What command is used to associate a destination port with a SPAN session?
What command is used to associate a destination port with a SPAN session?
In IPS a signature is defined by which three attributes?
In IPS a signature is defined by which three attributes?
What type of IPS signature consists of a single packet, activity, or event?
What type of IPS signature consists of a single packet, activity, or event?
Which of the following contains a package of network signatures used by an IPS?
Which of the following contains a package of network signatures used by an IPS?
What is a false positive alarm type?
What is a false positive alarm type?
What is a true negative alarm type?
What is a true negative alarm type?
What action is performed when an event triggers the produce alert
?
What action is performed when an event triggers the produce alert
?
What action is performed when an event triggers the deny attacker inline
?
What action is performed when an event triggers the deny attacker inline
?
What is the purpose of the Secure Device Event Exchange (SDEE)?
What is the purpose of the Secure Device Event Exchange (SDEE)?
Which of the following is a consideration when choosing an IPS solution?
Which of the following is a consideration when choosing an IPS solution?
Which deployment mode has the IPS being directly in the path of the network traffic?
Which deployment mode has the IPS being directly in the path of the network traffic?
What are the key advantages of Host-Based IPS?
What are the key advantages of Host-Based IPS?
How do IDS and IPS technologies detect misuse in network traffic?
How do IDS and IPS technologies detect misuse in network traffic?
What is the best way for an IPS appliance to block undesirable traffic?
What is the best way for an IPS appliance to block undesirable traffic?
What do IDS and IPS use to detect typical intrusion activitiy?
What do IDS and IPS use to detect typical intrusion activitiy?
How does IPS operate?
How does IPS operate?
Which SPAN command allows you to see if a SPAN session is configured?
Which SPAN command allows you to see if a SPAN session is configured?
What are IPS required to do with malicious traffic coming to a host?
What are IPS required to do with malicious traffic coming to a host?
What kind of signatures identify a sequence of operations distributed across multiple hosts?
What kind of signatures identify a sequence of operations distributed across multiple hosts?
Which trigger can be used to initiate an alarms?
Which trigger can be used to initiate an alarms?
Which can assist in preventing malware attacks?
Which can assist in preventing malware attacks?
How fast does an IPS respond to malicious traffic?
How fast does an IPS respond to malicious traffic?
What helps IPS detects patterns of misuse in network traffic?
What helps IPS detects patterns of misuse in network traffic?
Where are Network-Based IPS sensors placed?
Where are Network-Based IPS sensors placed?
Which deployment mode does IDS use?
Which deployment mode does IDS use?
What kind of pattern does IDS and IPS detect?
What kind of pattern does IDS and IPS detect?
Which of the following is a valid action performed by an IPS on TCP connections?
Which of the following is a valid action performed by an IPS on TCP connections?
What is required for Anomaly-based detection to properly identify malicious traffic?
What is required for Anomaly-based detection to properly identify malicious traffic?
What term describes an attack for which no signature exists?
What term describes an attack for which no signature exists?
What does a signature contain?
What does a signature contain?
IPS works passively.
IPS works passively.
IDS requires traffic to be mirrored in order to reach it.
IDS requires traffic to be mirrored in order to reach it.
IDS can stop single packet attacks from reaching their target.
IDS can stop single packet attacks from reaching their target.
IPS responds immediately, preventing malicious traffic from passing.
IPS responds immediately, preventing malicious traffic from passing.
IDS inspects malicious traffic and blocks it at the application layer.
IDS inspects malicious traffic and blocks it at the application layer.
IDS and IPS are both always deployed as inline devices.
IDS and IPS are both always deployed as inline devices.
Both IDS and IPS use signatures to detect patterns of misuse in network traffic.
Both IDS and IPS use signatures to detect patterns of misuse in network traffic.
IDS has an impact on network performance.
IDS has an impact on network performance.
IPS often stops trigger packets.
IPS often stops trigger packets.
A disadvantage of IPS is that sensor issues never affect network traffic.
A disadvantage of IPS is that sensor issues never affect network traffic.
Host-based IPS is operating system independent.
Host-based IPS is operating system independent.
Network-based IPS can examine encrypted traffic.
Network-based IPS can examine encrypted traffic.
Network-Based IPS is cost effective.
Network-Based IPS is cost effective.
Network IPS is visible on the network.
Network IPS is visible on the network.
In promiscuous mode, an IPS sensor is deployed inline.
In promiscuous mode, an IPS sensor is deployed inline.
An inline mode deployment sends copies of traffic to the IPS sensor.
An inline mode deployment sends copies of traffic to the IPS sensor.
Switched Port Analyzer (SPAN) is also known as port mirroring.
Switched Port Analyzer (SPAN) is also known as port mirroring.
The monitor session
command is used to configure SPAN sessions.
The monitor session
command is used to configure SPAN sessions.
Atomic signatures identify distributed sequences of operations.
Atomic signatures identify distributed sequences of operations.
IPS signatures have only two distinct attributes.
IPS signatures have only two distinct attributes.
A signature file contains only one network signature.
A signature file contains only one network signature.
A false positive alarm indicates normal user traffic is incorrectly identified as malicious.
A false positive alarm indicates normal user traffic is incorrectly identified as malicious.
The best outcome is identifying a true negative, where ideal settings are achieved.
The best outcome is identifying a true negative, where ideal settings are achieved.
Policy-based signature detection can NOT detect unknown attacks.
Policy-based signature detection can NOT detect unknown attacks.
Request block connection is an example of a resetting a TCP connection action.
Request block connection is an example of a resetting a TCP connection action.
Deny attacker inline is an example of a dropping or preventing the activity action.
Deny attacker inline is an example of a dropping or preventing the activity action.
SPAN ports send a copy of network traffic.
SPAN ports send a copy of network traffic.
Zero-day attacks target vulnerabilities that are unknown to the vendor.
Zero-day attacks target vulnerabilities that are unknown to the vendor.
An IDS actively blocks malicious traffic.
An IDS actively blocks malicious traffic.
An IPS analyzes Layer 3 and Layer 4 traffic.
An IPS analyzes Layer 3 and Layer 4 traffic.
The ACL does not permit traffic on TCP port 443.
The ACL does not permit traffic on TCP port 443.
IDS and IPS use only atomic patterns to detect misuse.
IDS and IPS use only atomic patterns to detect misuse.
The policy must be created for Anomaly-Based Detection.
The policy must be created for Anomaly-Based Detection.
IDS is an older technology that is hardly ever used in modern systems.
IDS is an older technology that is hardly ever used in modern systems.
IDS implementation comes with some impact to network.
IDS implementation comes with some impact to network.
Security budget is not a deciding factor when choosing an IPS Solution.
Security budget is not a deciding factor when choosing an IPS Solution.
SNMP stands for Simple Network Management Protocol.
SNMP stands for Simple Network Management Protocol.
A signature is only a set of rules for IPS.
A signature is only a set of rules for IPS.
A trigger for an alarm is a signature attribute.
A trigger for an alarm is a signature attribute.
Signatures are static and do not need to be updated.
Signatures are static and do not need to be updated.
A zero-day attack is an attack that is well-known and has existing patches.
A zero-day attack is an attack that is well-known and has existing patches.
IDS operates in an inline mode, actively blocking malicious traffic.
IDS operates in an inline mode, actively blocking malicious traffic.
IPS can stop single packet attacks from reaching a target.
IPS can stop single packet attacks from reaching a target.
A signature in intrusion detection systems is a set of guidelines used to detect potential intrusive actions.
A signature in intrusion detection systems is a set of guidelines used to detect potential intrusive actions.
Atomic signatures are those that require examining multiple packets to identify a malicious activity.
Atomic signatures are those that require examining multiple packets to identify a malicious activity.
Flashcards
What is a Zero-Day Attack?
What is a Zero-Day Attack?
An attack that exploits a vulnerability unknown to the software vendor or security professionals.
Advantages of an IDS
Advantages of an IDS
It works passively, requires mirrored traffic, and doesn't usually pass network traffic unless mirrored.
How does an IPS work?
How does an IPS work?
An IPS is inline, monitors Layers 3 and 4 traffic, can stop single packet attacks, and responds immediately to block malicious traffic.
IDS vs IPS
IDS vs IPS
Signup and view all the flashcards
How are IDS and IPS similar?
How are IDS and IPS similar?
Signup and view all the flashcards
What are the advantages of IDS and IPS?
What are the advantages of IDS and IPS?
Signup and view all the flashcards
Disadvantages of IDS and IPS
Disadvantages of IDS and IPS
Signup and view all the flashcards
Host-Based vs. Network-Based IPS
Host-Based vs. Network-Based IPS
Signup and view all the flashcards
Factors affecting IPS sensor selection
Factors affecting IPS sensor selection
Signup and view all the flashcards
Deployment modes: Promiscuous vs Inline?
Deployment modes: Promiscuous vs Inline?
Signup and view all the flashcards
What is a SPAN port?
What is a SPAN port?
Signup and view all the flashcards
What does a monitor session command do?
What does a monitor session command do?
Signup and view all the flashcards
What are the three attributes of signatures?
What are the three attributes of signatures?
Signup and view all the flashcards
Atomic vs composite signature
Atomic vs composite signature
Signup and view all the flashcards
What is a signature file?
What is a signature file?
Signup and view all the flashcards
What are the different detection types?
What are the different detection types?
Signup and view all the flashcards
What is a false positive alarm?
What is a false positive alarm?
Signup and view all the flashcards
What is a false negative?
What is a false negative?
Signup and view all the flashcards
What actions can an IPS take?
What actions can an IPS take?
Signup and view all the flashcards
What is an IPS?
What is an IPS?
Signup and view all the flashcards
What is host-based IPS?
What is host-based IPS?
Signup and view all the flashcards
What are the disadvantages of network-based IPS?
What are the disadvantages of network-based IPS?
Signup and view all the flashcards
What is Cisco IPS AIM?
What is Cisco IPS AIM?
Signup and view all the flashcards
What does the show monitor command do?
What does the show monitor command do?
Signup and view all the flashcards
How should signature files be handled as new threats emerge?
How should signature files be handled as new threats emerge?
Signup and view all the flashcards
What type of signature is detecting an ARP request?
What type of signature is detecting an ARP request?
Signup and view all the flashcards
What is stateful inspection?
What is stateful inspection?
Signup and view all the flashcards
What is a constraint of composite signatures?
What is a constraint of composite signatures?
Signup and view all the flashcards
What is a true negative?
What is a true negative?
Signup and view all the flashcards
What does SDEE provide?
What does SDEE provide?
Signup and view all the flashcards
What is a signature in network security?
What is a signature in network security?
Signup and view all the flashcards
What is the function of 'blocking' in IPS?
What is the function of 'blocking' in IPS?
Signup and view all the flashcards
What are the advantages of pattern-based detection?
What are the advantages of pattern-based detection?
Signup and view all the flashcards
What is a disadvantage of honey pot-based detection?
What is a disadvantage of honey pot-based detection?
Signup and view all the flashcards
What's a property of Atomic Signatures?
What's a property of Atomic Signatures?
Signup and view all the flashcards
Study Notes
<existing_notes>
### Chapter 5: Implementing Intrusion Prevention
- This chapter provides an overview of intrusion prevention systems (IPS).
### 5.1 IPS Technologies
- This section covers zero-day attacks, monitoring, detection, stopping attacks and the advantages and disadvantages of IDSs and IPSs.
### 5.1.1: IDS and IPS Characteristics
- Zero-day attacks exploit vulnerabilities before they are known publicly.
### Monitor for Attacks
- Intrusion Detection Systems (IDS) work passively.
- An IDS requires traffic mirroring to analyze it.
- Network traffic doesn't pass through the IDS unless mirrored.
### Detect and Stop Attacks
- Intrusion Prevention Systems (IPS) operate inline.
- An IPS monitors Layer 3 and Layer 4 traffic.
- IPS can stop single-packet attacks to prevent reaching a target.
- IPS responds immediately to block malicious traffic.
- An IPS inspects malicious traffic content at the application layer
### Similarities Between IDS and IPS
- Both intrusion detection systems (IDS) and intrusion prevention systems (IPS) are deployed as sensors.
- Both IDS and IPS use signatures to detect patterns of misuse in network traffic.
- IDS and IPS can detect atomic patterns (single-packet) and composite patterns (multi-packet).
### Advantages and Disadvantages of IDS and IPS
- The advantages of IDS include no impact on the network.
- The advantages of IDS include no network impact if there is a sensor failure or overload.
- The disadvantages of IDS include response actions not stopping the trigger.
- The advantages of IPS include stopping trigger packets.
- The disadvantages of IPS include sensor issues potentially affecting network traffic.
- The disadvantages of IPS include sensor overloading impacting the network and some impact on the network.
### 5.1.2: Network-Based IPS Implementations
- Network-Based IPS implementations and Host-Based IPS Implementations
### Host-Based and Network-Based IPS
- Host-based IPS provides protection specific to a host operating system and application-level protection. It also protects the host after the message is decrypted. However, it's operating system-dependent and must be installed on all hosts.
- Network-Based IPS is cost-effective and operating system-independent. However, it cannot examine encrypted traffic and must stop malicious traffic before it reaches the host.
### Network-Based IPS Sensors
- A corporate network is protected from untrusted network with firewall and sensors in place
### Cisco’s Modular and Appliance-Based IPS Solutions
- Cisco offers various IPS solutions, including IPS AIM, Network Module Enhanced (IPS NME), ASA AIP-SSM, IPS 4300 Series Sensors, and Catalyst 6500 Series IDSM-2.
### Choose an IPS Solution
- Factors affecting IPS sensor selection and deployment are the amount of network traffic, the network topology, the security budget, and the availability of security staff.
### IPS Advantages and Disadvantages
- Network IPS is cost-effective, not visible on the network, operating system independent, and able to see lower-level network events.
- Network IPS cannot examine encrypted traffic and cannot determine whether an attack was successful.
### Modes of Deployment
- Promiscuous mode is associated with IDS
- Inline mode is associated with IPS
### 5.1.3: Cisco Switched Port Analyzer
- Cisco Systems provides SPAN (Switched Port Analyzer) for port mirroring.
### Port Mirroring
- Traffic can be analyzed using a hub by sniffing the traffic
### Cisco SPAN
- Traffic can be analysed using a switch to copy the traffic to a port analyzer
### Configuring Cisco SPAN Using Intrusion Detection
- Configuring Cisco SPAN uses the monitor session command to associate a source port and a destination port with a SPAN session.
- The show monitor command is used to verify the SPAN session.
### 5.2: IPS Signatures
- Covers IPS signature characteristics, IPS signature alarms, managing and monitoring IPS and understanding the global correlation of Cisco IPS devices.
### 5.2.1: IPS Signature Characteristics
- A signature is a set of rules used by IDS and IPS to detect intrusions.
- Signatures have three attributes: type, trigger (alarm), and action.
### Signature Types
- Atomic signatures consist of a single packet, activity, or event.
- Composite signatures identify a sequence of operations distributed across multiple hosts over time.
### Signature File
- New signatures are created and uploaded to an IPS as new threats are identified.
- A signature file contains a package of network signatures.
### Download a Signature File
- A signature file can be downloaded
### 5.2.2: IPS Signature Alarms
- Explanation of IPS signature alarms
### Signature Alarm
- Detection types include pattern-based detection, anomaly-based detection, policy-based detection, and honey pot-based detection.
- Pattern-based detection is easy to configure and has fewer false positives.
- Anomaly-based detection is simple, reliable, and uses customized policies.
- Policy-based detection is easy to configure and can detect unknown attacks.
- Honey pot-based detection provides a window to view attacks, distracts/confuses attackers, slows down/averts attacks, and collects information about attacks.
### Pattern-Based Detection
- Atomic signatures don't require state to examine patterns.
- Composite Signatures must contain state or examine multiple items to determine if signal action should be applied
### Anomaly-Based Detection
- State is required to identify activity that deviates from normal profile for composite signature type
### Policy-Based and Honey Pot-Based Detection
- State is not required to identify undesirable behavior for atomic signatures
### Alarm Triggering Mechanisms
- Alarm types are detailed along with their associated network activity, IPS activity, and outcomes.
- A false positive, normal user traffic triggers alarm generation, requiring alarm tuning.
- A false negative refers to attack traffic not generating an alarm, also requiring tuning.
- A true positive is attack traffic generating an alarm, which is ideal.
- A true negative represents normal user traffic not triggering an alarm, which is ideal.
### 5.2.3: IPS Signature Actions
- Covers the summary of action categories
### Signature Actions
- Action categories are defined, including generating an alert, logging activity, dropping or preventing activity, resetting a TCP connection, blocking future activity, and allowing activity.
### 5.2.4: Manage and Monitor IPS
- Covers everything to do with management and monitoring of IPS
### Secure Device Event Exchange
- Syslog and SDEE protocol is used in secure divide event exchange
### IPS Configuration Best Practices
- VPN, ESA/WSA, Webserver, Email server and DNS with firewall and IPS in place
</existing_notes>
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.