Which of the following is use to protect a network from malicious attack and unwanted intrusion?

Preventing System Intrusions

Michael West, in Network and System Security (Second Edition), 2014

Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion prevention systems (IPSs) focus primarily on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IPSs have become a necessary addition to the security infrastructure of nearly every organization. IPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IPSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IPS stopping the attack itself, changing the security environment (reconfiguring a firewall), or changing the attack’s content. This chapter describes the characteristics of IPS technologies and provides recommendations for designing, implementing, configuring, securing, monitoring, and maintaining them. The types of IPS technologies are differentiated primarily by the types of events that they monitor and the ways in which they are deployed.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166899000022

Information Security Essentials for IT Managers

Albert Caballero, in Managing Information Security (Second Edition), 2014

Intrusion Prevention

Intrusion prevention is a system that allows for the active blocking of attacks while they are inline on the network, before they even get to the target host. There are many ways to prevent attacks or unwanted traffic from coming into your network, the most common of which is known as a firewall. Although a firewall is mentioned quite commonly and a lot of people know what a firewall is, there are several different types of controls that can be put in place in addition to a firewall that can seriously help protect the network. Here are the most common prevention technologies:

Firewalls. The purpose of a firewall is to enforce an organization’s security policy at the border of two networks. Typically most firewalls are deployed at the edge between the internal network and the Internet (if there is such a thing) and are configured to block (prevent) any traffic from going in or out that is not allowed by the corporate security policy. There are quite a few different levels of protection a firewall can provide, depending on the type of firewall that is deployed, such as these:

Packet filtering. The most basic type of firewalls perform what is called stateful packet filtering, which means that they can remember which side initiated the connection, and rules (called access control lists, or ACLs) can be created based not only on IPs and ports but also depending on the state of the connection (meaning whether the traffic is going into or out of the network).

Proxies. The main difference between proxies and stateful packet-filtering firewalls is that proxies have the ability to terminate and reestablish connections between two end hosts, acting as a proxy for all communications and adding a layer of security and functionality to the regular firewalls.

Application layer firewalls. The app firewalls have become increasingly popular; they are designed to protect certain types of applications (Web or database) and can be configured to perform a level of blocking that is much more intuitive and granular, based not only on network information but also application-specific variables so that administrators can be much more precise in what they are blocking. In addition, app firewalls can typically be loaded with server-side SSL certificates, allowing the appliance to decrypt encrypted traffic, a huge benefit to a typical proxy or stateful firewall.

Intrusion prevention systems. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents using a set of conditions based on signatures or anomalies.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166882000015

Nokia Security Solutions Overview

Andrew Hay, ... Warren Verbanec, in Nokia Firewall, VPN, and IPSO Configuration Guide, 2009

IP290 IPS

The Nokia IP290 Intrusion Prevention with Sourcefire, also referred to as Nokia IP290 IPS, is optimized for Sourcefire 3D Sensor applications. Running Nokia IPSO-LX, a specialized Linux-based operating system, the Nokia IP290 IPS comes preinstalled with Sourcefire Intrusion Prevention System (IPS) and Real-time Network Awareness (RNA). Both products can run simultaneously on the IP290 IPS platform.

Nokia IP290 IPS appliances are ideally suited for growing companies and satellite offices that want high-performance intrusion detection and protection. The small size of Nokia IP290 IPS appliances makes them attractive for installations that need to conserve space. Two Nokia IP290 IPS appliances can be rack-mounted in a 1U space if they are installed in a rack-mountable shell, which can be ordered. Figure 1.7 shows two Nokia IP290 platforms in the rack-mountable shell.

Which of the following is use to protect a network from malicious attack and unwanted intrusion?

Figure 1.7. Nokia IP290 Platforms in a Rack-Mountable Shell

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492867000012

Defensive Tactics and Procedures

Steve Winterfeld, in The Basics of Cyber Warfare, 2013

Intrusion Detection and Prevention

Intrusion detection and intrusion prevention on a nationwide scale or even across the DoD, as we discussed in the previous section, is a difficult prospect. At present, the networks that comprise the Internet are not segmented along national boundaries, for the most part. Additionally, we have a wide variety of media that can be used to carry network communications, including: copper and fiber optic cables, satellite communications, purpose build wireless networks, packet radio, and any number of other means. This lack of network segmentation along physical borders and wide variety of communications methods makes IDS/IPS a technically challenging prospect to implement.

Two main strategies exist for accomplishing intrusion detection and/or prevention on this scale; we can either structure networks to provide a limited number of connections outside of the area that we wish to protect and monitor, or we implement massively distributed IDS/IPS; either method has its inherent issues. Restructuring our networks to provide only a few choke points is most certainly the cleanest route to take, and may be workable when building new networks, but would likely be prohibitively expensive for existing networks. It will also be impacted by the move to the cloud and mobile devices, the days of isolated networks is even coming to a close in classified networks as we see them looking at how to move to these new infrastructures. Likewise, massively distributed IDS/IPS, although having the benefit of not requiring us to alter our networks, is likely to miss some of the traffic entering and exiting said networks. In either case, at present, conducting such operations is likely to prove difficult in a variety of ways.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124047372000070

Computer Network Defense

Jason Andress, Steve Winterfeld, in Cyber Warfare (Second Edition), 2014

Intrusion Detection and Prevention

Intrusion detection and intrusion prevention on a nationwide scale, as we discussed in the previous section, is a difficult prospect. At present, the networks that comprise the Internet are not segmented along national boundaries, for the most part. Additionally, we have a wide variety of media that can be used to carry network communications, including: copper and fiber optic cables, satellite communications, purpose-built wireless networks, packet radio, and any number of other means. This lack of network segmentation along physical borders and wide variety of communications methods makes IDS/IPS a technically challenging prospect to implement.

Two main strategies exist for accomplishing intrusion detection and/or prevention on this scale; we can either structure networks to provide a limited number of connections outside of the area that we wish to protect and monitor, or we implement massively distributed IDS/IPS; either method has its inherent issues. Restructuring our networks to provide only a few choke points is most certainly the cleanest route to take, and may be workable when building new networks, but would likely be prohibitively expensive for existing networks. Likewise, massively distributed IDS/IPS, although having the benefit of not requiring us to alter our networks, is likely to miss some of the traffic entering and exiting said networks. In either case, at present, conducting such operations is likely to prove difficult in a variety of ways.

An example where this has been deployed as part of national defense in the Department of Homeland security Network Security Deployment National Cybersecurity Protection System (operationally known as EINSTIEN). EINSTEIN was deployed in accordance with Comprehensive National Cybersecurity Initiative directive 5—Connect current cyber ops centers to enhance situational awareness. There are multiple blocks but the first was built around IDS [9].

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166721000118

Intrusion Response Systems: A Survey

Bingrui Foo, ... Eugene H. Spafford, in Information Assurance, 2008

Details

Snort Inline is the intrusion prevention component of Snort, a popular network intrusion detection and prevention system capable of real-time IP network traffic analysis. Snort was originally developed by Martin Roesch and is currently owned and developed by Sourcefire, a company founded by Roesch. Snort Inline started as a separate project that used Snort for its packet logging and traffic analysis capabilities, but has since been included in the Snort distribution, providing the intrusion response capabilities that the popular IDS had hitherto lacked.

The Netfilter/IPtables software allows for the implementation of the response mechanism while Snort Inline provides the policies based on which IPtables make the decision to allow or deny packets. After an incoming packet to a network is provided by IPtables, Snort performs the rule matching against the packet. There are three new rule types included in Snort for Snort Inline to define the actions that IPtables might take after receiving an incoming packet. All three rule types drop the packet if it matches a predefined rule. The second type of rule also logs the packet and the third type sends a control message back. The rules are applied before any alert or log rule is applied. The current version of Snort also allows a system to replace sections of a packet payload when using Snort Inline. The only limitation is that the payload selected must be replaced by a string of the same length. For example, an adversary that is looking to propagate malicious code through the PUT command could have it replaced by the TRACE command, thus halting further propagation of the code.

In order for Snort Inline to interface with IPtables, two C libraries are needed: libipq and libnet. Libipq [23] is a library for IPtables packet queuing that allows Snort Inline to exchange messages with IPtables. Libnet is the popular networking interface to construct, handle, and inject packets into a network.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978012373566950015X

Active Response

In Snort Intrusion Detection and Prevention Toolkit, 2007

NFS mountd Overflow Attack

For our last example, we revisit the NFS mountd overflow attack. First, we modify Snort SID 316 to replace the content of the mountd attack with the hex code 0×65, which happens to correspond to the ASCII code for the letter e.

Again, we launch our attack from evilhost against the NFS server, but this time, we take a packet trace from the server itself, as shown in Code Listing 11.27. As we expect, the critical portion of the attack that instructs the remote system to point back into the exploit payload has been translated into a harmless series of e characters completely unrelated to the original attack by snort_inline (see Code Listing 11.28).

Code Listing 11.27

Modified NFS mountd Overflow Snort Rule (SID 316)

Which of the following is use to protect a network from malicious attack and unwanted intrusion?

Code Listing 11.28

NFS mountd Overflow Attack

Which of the following is use to protect a network from malicious attack and unwanted intrusion?

Which of the following is use to protect a network from malicious attack and unwanted intrusion?

Damage & Defense…

Intrusion Prevention: An Opinion

Before we end the chapter, it is worth spending a few paragraphs talking about the dichotomy between firewalls and ID5es, NIPS are the subject of much debate and strong emotions. This sidebar presents those of this book's editors.

The core purpose of a firewall is to allow or block network traffic based on how that traffic matches a policy the firewall has been given. This means it needs to be able to decide whether traffic is allowed through, very quickly and predictably. As vendors have learned, customers want firewalls that don't block traffic for any reason except policy (for example, not because the firewall is too slow or overloaded, or because it misunderstood a protocol). Additionally, it should not block traffic that the policy creator intended to allow. In short, a firewall must make a decision quickly and then pass or drop packets as quickly as possible. In contrast, the core purpose of a NIDS is to find attacks/intrusions/events of interest in your network traffic. This means that the IDS must not miss packets because there is too much traffic. The IDS must not misunderstand a protocol or assume that the protocol in use is the one normally used on that port. Finally, the IDS must not decide whether traffic is malicious without seeing all of it (for example, allowing traffic to pass after seeing that there is nothing malicious in the TCP connection setup, as a firewall might). In short, an IDS must not miss any traffic and must constantly recheck its conclusions (for example, look for a match against a single packet and then look for matches against the entire stream).

Unfortunately, these two core functions are essentially in opposition to each other. As such, NIPS are difficult to implement properly. Firewall vendors who are advertising their products as NIPS think that all decisions can be made based on simple decisions and that network traffic is never ambiguous (because at Layer 4 and below, it generally is not or at least isn't as ambiguous as it is at higher layers). They forget that applications are horribly eccentric and that evading detection is easy when you can play in the application-layer protocols. IDS vendors who are advertising their products as NIPS think that making decisions after the entire connection is completed is an effective way to prevent the attack, and that false-positive rates that customers accept from an IDS will also be acceptable for an IPS. In our opinion, such viewpoints from IDS vendors are simply misguided.

An example of a good place for deployment of a NIPS is in front of critical servers that have application-layer vulnerabilities that can't be patched for some reason and are easily and clearly definable. Whatever you do, understand that IPS cannot be a “silver bullet” that removes the requirement that you patch and harden systems, apply policy-based firewalls, and monitor the network with an IDS.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597490993500161

How can intrusion attacks be prevented?

Preventing network intrusion. Any business with an internet connection is potentially susceptible to network intruders. The best way to stop them is to block services you do not need, either at your network's entry point (by a network firewall) or at your computer (by a personal firewall).

What are two types of intrusion prevention system?

Intrusion prevention systems have various ways of detecting malicious activity, however the two predominant methods are signature-based detection and statistical anomaly-based detection.

What does IPS protect against?

What Does IPS Protect Against? IPS security solutions can stop any attack based on malicious traffic sent over a network, provided it has a known attack signature, or can be detected as anomalous compared to normal traffic. IPS is commonly used to detect and stop all the attacks below.

What is an example of an intrusion prevention system?

Trellix Network Security (McAfee + FireEye) Protection against bots, Distributed Denial of Service (DDoS), ransomware, and many other attacks. Blocks harmful sites and downloads. Protects cloud and on-prem devices. FireEye's IPS was deployed as part of the network security and forensics solution.