Chapter 11- Wireless Intrusion Detection-class
Chapter 11- Wireless Intrusion Detection-class
• Intrusion Detection
Misuse detection
Anomaly detection
• Vulnerability Analysis
Network-Based Vulnerability Scanners
Host-Based Vulnerability Scanners
• Intrusions are caused by attackers accessing the systems from the Internet,
authorized users of the systems who attempt to gain additional privileges
for which they are not authorized, and authorized users who misuse the
privileges given them.
• By gathering and analyzing the data flows through the network, IDS can
detect potential attacks.
…
Incidents have many causes, such as
- malware (e.g., worms, spyware),
- attackers gaining unauthorized access to systems from the Internet, and
- authorized users of systems who misuse their privileges or attempt to gain
additional privileges for which they are not authorized.
i.e., many incidents are malicious in nature, many others are not.
IDS Terminology
• Alert, alarm: self-explanatory
• False negative: IDS fails to detect actual attack
• False positive: Attack alert when none occurred
• Confidence value: Estimate of attack probability
• Alarm filtering: self-explanatory
Intrusion Detection Systems Classification
Figure. Illustrates the implementation of both NIDS and HIDS to protect the
network.
…
NIDS
Host-Based IDS
• Monitors the characteristics of a single host and the events occurring
within that host for suspicious activity.
Here, let’s focus on the two major parts (Network-based analysis , and host-
based analysis).