网络入侵的检测和预防

标签: 异常检测, 入侵检测,入侵防御,IDS,IPS


异常检测 (Anomaly detection)

异常检测的假设是入侵者活动异常于正常主体的活动[1]。
特别是在检测滥用与网络入侵时,有趣性对象往往不是罕见对象,但却是超出预料的突发活动。这种模式不遵循通常统计定义中把异常点看作是罕见对象,于是许多异常检测方法(特别是无监督的方法)将对此类数据失效,除非进行了合适的聚集。相反,聚类分析算法可能可以检测出这些模式形成的微聚类[2]。

  • 无监督异常检测: 通过寻找与其他数据最不匹配的实例来检测出未标记测试数据的异常。
  • 监督式异常检测: 需要一个已经被标记“正常”与“异常”的数据集,并涉及到训练分类器(与许多其他的统计分类问题的关键区别是异常检测的内在不均衡性)。
  • 半监督式异常检测: 根据一个给定的正常训练数据集创建一个表示正常行为的模型,然后检测由学习模型生成的测试实例的可能性。

入侵检测 (Intrusion-detection)

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms[4].

Simulation tools

OPNET and NetSim are commonly used tools for simulation network intrusion detection systems.

Comparison with firewalls[4]

  • Firewall looks outwardly for intrusions to stop them from happening, limits access between networks to prevent intrusion and does not signal an attack from inside the network.
  • IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system.

Classifications by analyzed activity[4]:

  • network intrusion detection systems (NIDS): A system that analyzes incoming network traffic. *NIDS placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. It performs an analysis of passing traffic on the entire subnet, and matches the traffic that is passed on the subnets to the library of known attacks. *

    • On-line NIDS deals with the network in real time. It analyses the Ethernet packets and applies some rules, to decide if it is an attack or not [5].
    • Off-line NIDS deals with stored data and passes it through some processes to decide if it is an attack or not [5].
  • host-based intrusion detection systems (HIDS) : A system that monitors important operating system files. HIDS runs on individual hosts or devices on the network. These monitors the inbound and outbound packets from the device only and will alert the user or administrator if suspicious activity is detected. HIDS takes a snapshot of existing system files and matches it to the previous snapshot.

Classifications by detection approach[4]:

  • signature-based detection: Recognizing the attacks by looking for specific patterns, such as byte sequences in network traffic, or known malicious instruction sequences used by malware.

  • anomaly-based detection: Detecting deviations from a model of "good" traffic, which often relies on machine learning. *Using machine learning to create a model of trustworthy activity, and then compare new behavior against this model. *

入侵预防(Intrusion prevension)[4]

  • Intrusion prevention systems (IPS), also known as Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, reporting them and attempting to block or stop them.
  • Four different types:
    1. Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity.
    2. Wireless intrusion prevention systems (WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols.
    3. Network behavior analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware and policy violations.
    4. Host-based intrusion prevention system (HIPS): an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.

IDS与IPS的关系[6]

  • 入侵检测系统(IDS)对那些异常的、可能是入侵行为的数据进行检测和报警,告知使用者网络中的实时状况,并提供相应的解决、处理方法,是一种侧重于风险管理的安全产品。
  • 入侵防御系统(IPS)对那些被明确判断为攻击行为,会对网络、数据造成危害的恶意行为进行检测和防御,降低或是减免使用者对异常状况的处理资源开销,是一种侧重于风险控制的安全产品。
  • IDS and IPS both monitor network traffic and/or system activities for malicious activity.
  • IDS和IPS并非取代和互斥,而是相互协作:没有部署IDS的时候,只能是凭感觉判断,应该在什么地方部署什么样的安全产品,通过IDS的广泛部署,了解了网络的当前实时状况,据此状况可进一步判断应该在何处部署何类安全产品(IPS等)。

Reference

[1]. 异常检测-百科
[2]. 异常检测-维基
[3]. 入侵检测系统-维基
[4]. Intrusion detection system
[5] Abdullah A. Mohamed, "Design Intrusion Detection System Based On Image Block Matching", International Journal of Computer and Communication Engineering, IACSIT Press, Vol. 2, No. 5, September 2013
[6]. IPS(入侵防御系统)

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 212,686评论 6 492
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 90,668评论 3 385
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 158,160评论 0 348
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 56,736评论 1 284
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 65,847评论 6 386
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 50,043评论 1 291
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 39,129评论 3 410
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 37,872评论 0 268
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 44,318评论 1 303
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 36,645评论 2 327
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 38,777评论 1 341
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 34,470评论 4 333
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 40,126评论 3 317
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 30,861评论 0 21
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 32,095评论 1 267
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 46,589评论 2 362
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 43,687评论 2 351

推荐阅读更多精彩内容

  • 【本文内容主要整理自Sawbones,一个戏说医学发展史的播客。笔者整理的过程中也有参考一些资料添油加醋一番。要科...
    WangWeiwei阅读 2,283评论 1 5
  • 像是永远走在一个黑暗的隧道里 突然就被一片乌云笼罩 抑郁症并不孤单,概率为1/3 抑郁症症可以战胜 做有意义的事 ...
    Spencer成长持续阅读 211评论 0 0
  • 今天四月四号,我国传统的清明节。三天小长假的最后一天,早上收拾好东西,匆匆打车到火车站。家住农村,并没有城市里的墓...
    呸呸pei阅读 239评论 0 0
  • 下午,很突然接到医院打过来的电话,说那边很忙,希望我能转实习回去帮忙。 此时我正在华西实习,还是给老师打了电话,问...
    你在看着谁阅读 246评论 0 0