|
Intrusion Detection
Organizations continue to deploy firewalls as
the central gatekeepers to prevent unauthorized
users from entering their networks. However,
network security is in many ways similar to
physical security in that no one technology
serves all needs—rather, a layered defense
provides the best results. Organizations are
increasingly looking to additional security
technologies to counter the risk and vulnerability
that firewalls alone cannot address. A network-based
IDS (NIDS) provides around-the-clock network
surveillance while a host-based IDS (HIDS) protects
servers.
Given the complexity of an enterprise site,
the variety of attack |
|
|
|
|
techniques, and the typical hacking
scenario, there is a clear need for a comprehensive
solution.
The solution should protect against the different
attack techniques and prevent the malicious actions
performed during a typical hacking cycle. The
Cisco IDS solution addresses this need by offering
a combined solution that includes NIDS and HIDS
components. The NIDS primarily addresses the network
attacks, whereas the HIDS protects the servers
against OS and application attacks.
The NIDS sensors are installed in multiple locations.
One important location is in front of the firewall
that monitors communication coming into the organization.
In addition, every important network segment is
covered with a sensor. The HIDS is first deployed
on Internet-facing servers such as Web, mail,
and DNS servers. Because the Internet-facing servers
are connected to back-end servers, HIDS is also
deployed on all the other critical servers within
the corporate firewall.
An IDS sensor analyzes packet data streams within
a network, searching for unauthorized activity,
such as attacks by hackers, and enabling users
to respond to security breaches before systems
are compromised. When unauthorized activity is
detected, the IDS can send alarms to a management
console with details of the activity and can often
order other systems, such as routers, to cut off
the unauthorized sessions. In the physical analogy,
an IDS is equivalent to a video camera and motion
sensor detecting unauthorized or suspicious activity
and working with automated response systems such
as watch guards to stop the activity. |
|
|