Preview

Intrusion Detection

Satisfactory Essays
Open Document
Open Document
403 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Detection
INTRUSION DETECTION AS A NETWORK FORENSIC TOOL
Lecture by Peter Stephenson, CPE, PCE
Director of Technology, Netigy Corporation, San Jose, California
PhD Research Student, Oxford Brooks University, Oxford, UK

ABSTRACT: The concepts of intrusion detection and forensic analysis often are not considered together, even though the intrusion detection system (IDS) is the most likely candidate for gathering information useful in tracing and analyzing a network-based computer security incident. From the standpoint of the security practitioner, the primary use for the IDS is detection and response. To extend that to include forensic analysis of the event implies going outside the parameters of most intrusion detection systems.

Contrary to that belief, however, is the obvious concept that, when an event occurs, there is a high probability that the IDS will be the only thing watching the network in significant enough detail to capture the event and any precursor events in their entirety. Thus, the application of the output of an IDS to the investigation and potential prosecution of an attack against computers on a network is of interest both to practitioners and to researchers.

This lecture will discuss the details of intrusion detection systems in the context of their use as investigative tools, fundamentals of forensic computer analysis and network forensic analysi,s and some potential methods of combining techniques to enable investigation and prosecution of computer-related crime.

Specific topics to be covered include:

• Intrusion detection system architectures • Application of forensic computer analysis • Current network forensic analysis techniques • Legal requirements for the use of forensic evidence • Using forensics for system recovery (operational forensics) • Examination of an IDS suitable for use in forensic analysis of attacks • Problems and challenges in the forensic application of intrusion detection

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Implementing the installation of an IDS or IPS will allow for suspicious traffic to be flagged and reported to administrators based on one of two different factors. These factors are signature based or anomaly based depending on how they are configured.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    An IDS is a software or hardware tool which allows to detect and warn about an attack or…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

     Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    We attempt Earth-place discipline in initiative investigations, e-exploration, information processing system protection incident answer, and digital forensics, and have cars over 50,000 digital investigators cosmopolitan. Some of our most epidemic courses end: EnCase ® v7 Transition Designed for EnCase Forensic users who are upgrading from a previous version to Version 7, the EnCase v7 Transition course details the unaccustomed features of Version 7, spotlight specifically the areas of the fruit that differ significantly from anterior versions. To chronicle for this passage, a use must have accomplished Computer Forensics II or hold an EnCE ®certification. EnCase Computer Forensics I Practical exercises and real-life simulations stipulate participants with an understanding of proper handling of digital eveidence from hold to acquirement, to the analysis and archiving of the data. EnCase Computer Forensics II Designed for investigators with muscular electronic computer discrimination, prior rhetorical training, and experience second-hand EnCase Forensic. EnCase Startup Training Encase® Start Up on-imposition result training to let you spring-in and rapidly get empty with your new software. EnCase® Start Up is convenient for cull Guidance Software products at no cost. You can refer to it whenever you indigence it; brush-up on shape and secant, or import a new abound…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In his speech at the Republican National Convention , accepting the Republican nomination for the presidency, Donald Trump depicted himself as the savior of a nation in crisis; crisis of terrorism, crime, a dishonest, selfish government and a failing economy, all thanks to the administration of Barak Obama. One of Trumps main points of his speech was to “present the facts plainly and honestly” – to set the record straight about the state of the country, in contrast to the “corporate spin”, the “media myths” and the “carefully-crafted lies” of the Democratic party, as he puts it, presenting a skeptical, elitist view upon the government. An important focus in his speech is a new form of exceptionalism, or, as he puts it, “Americanism”, as he…

    • 303 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Identification is the first of four steps of the security process. Any user that expects to gain access to a system is referred to as a supplicant, and the tool that every user who gains entry to the system is referred to as an Identifier. The identifier can have many different methods for identifying the supplicant. The…

    • 1725 Words
    • 5 Pages
    Better Essays

Related Topics