The main task of intrusion detection systems is to prevent a computer system by detecting signs of attack and can repel it. The detection of attacks depends on the number and type of appropriate action (Figure 1). In order to prevent good intrusions, a good combination of 'baits and traps' is needed for the study of threats. Commanding the focus of intruders on protected resources is another important task. Both the real system and the trap system need to be tested continuously. Data generated by intrusion detection systems is carefully checked (this is the main task for each IDS) to detect attack signals (intrusion).
Figure 1: Process of IDS
Figure 2: IDS infrastructure
When an intrusion is detected, IDS issues alerts to system administrators about this incident. The next step is done by the administrator or it may be the IDS itself by taking advantage of additional measurement parameters (locking functions to limit sessions, system backups, routing connections to traps system, valid infrastructure, .) - according to the security policies of organizations (Figure 2). An IDS is a component within the security policy.
Between different IDS tasks, identifying intruders is one of the basic tasks. It is also useful in legal research of circumstances and the installation of appropriate patches to allow future attacks to be targeted at specific individuals or system resources.
Intrusion detection can sometimes produce false alarms, such as problems that occur due to network interface problems or the sending of attack descriptions or signatures via email.
Architecture of intrusion detection system
Figure 3: A sample IDS. Narrow width corresponds to the quantity
Information flow between system components
The sensor is integrated with the data collection component (Figure 4) - an event generator. This collection method is determined by the event creation policy to define the event information filtering mode. Event generators (operating systems, networks, applications) provide a number of appropriate policies for events, be it a record of system events or network packets. This policy number, along with policy information, can be stored in a protected or external system. In some cases, for example, when the event data stream is transmitted directly to the analyzer without any data storage being performed. This also involves a bit of network packets.
Figure 4: IDS components
The role of the sensor is to filter information and remove incompatible data obtained from events related to the protection system, so suspicious actions can be detected. The parser uses the detection policy database for this item. There are also components: attack signs, normal behavior profiles, necessary parameters (eg thresholds). In addition, the database holds configuration parameters, including communication modes with the response module. The sensor also has its own database, including data stored on potentially complex intrusions (created from various actions).
IDS can be arranged centrally (eg integrated into a firewall) or distributed. A distributed IDS includes many different IDSs on a large network, all of them communicate with each other. Many sophisticated systems follow the single-agent structure principle, where small modules are organized on a host in a protected network.
The role of the agent is to test and filter all actions within the protected area and depending on the method in question - create an initial analysis and even take action in response. The network of collaborating agents reporting to the central analytics server is one of the key components of IDS. DIDS can use more sophisticated analysis tools, especially equipped with detection of distributed attacks. Other actors' roles are related to its mobility and roaming properties in physical locations. In addition, agents can be specifically for detecting certain known attack signs. This is a decisive factor when it comes to protection means related to new types of attacks. IDS-based agent solutions also use less complex mechanisms for responding policy upgrades.
The multi-agent architecture solution introduced in 1994 is AAFID (autonomous agents for intrusion detection) - see Figure 5. It uses agents to examine certain aspects of behaviors. system at a certain time. For example, an actor might indicate an unusual number of telnet sessions within the system it checks. The agent is able to issue a warning when a suspicious event is detected. Agents can be cloned and changed inside other systems (autonomous feature). Một phần trong các tác nhân, hệ thống có thể có các bộ phận thu phát để kiểm tra tất cả các hành động được kiểm soát bởi các tác nhân ở một host cụ thể nào đó. Các bộ thu nhận luôn luôn gửi các kết quả hoạt động của chúng đến bộ kiểm tra duy nhất. Các bộ kiểm tra nhận thông tin từ các mạng (không chủ từ một host), điều đó có nghĩa là chúng có thể tương quan với thông tin phân tán. Thêm vào đó, một số bộ lọc có thể được đưa ra để chọn lọc và thu thập dữ liệu.
Figure 5
Xem tiếp phần II