intrusion detection sysytem. content basically this presentation contains, what is tripwire? how...

19
INTRUSION DETECTION SYSYTEM

Upload: nelson-bond

Post on 29-Jan-2016

242 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

INTRUSION DETECTION SYSYTEM

Page 2: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

CONTENTBasically this presentation contains,• What is TripWire?

• How does TripWire work?

• Where is TripWire used?

• Tripwire for network devices.+

• Tripwire for servers

• How do you install and use TripWire?

• What is the benefit of TripWire?

• What are the chances of TripWire?

• Final word on TripWire.

Page 3: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

What is TripWire? Reliable intrusion detection system.

Tool that checks to see what changes have been made in your system.

Pinpoints, notifies, determines the nature, and provides information on the changes on how to manage the change.

Mainly monitors the key attributes(like binary signature, size and other related data) of your files.

Changes are compared to the established good baseline.

Security is compromised, if there is no control over the various operations taking place.

Security not only means protecting your system against various attacks but also means taking quick and decisive actions when your system is attacked.

Page 4: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

Elements of tripwireA tripwire databaseA policy file

Page 5: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

How does TripWire work?

Page 6: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

First, a baseline database is created storing the original attributes like binary values in registry.

If the host computer is intruded, the intruder changes these values to go undetected.

The TripWire software constantly checks the system logs to check if any unauthorized changes were made.

If so, then it reports to the user.

User can then undo those changes to revert the system back to the original state.

Page 7: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

Where is TripWire used?Tripwire for Servers(TS) is software used by servers.

Can be installed on any server that needs to be monitored for any changes.

Typical servers include mail servers, web servers, firewalls, transaction server, development server.

It is also used for Host Based Intrusion Detection System(HIDS) and also for Network Intrusion Detection System(NIDS).

It is used for network devices like routers, switches, firewall, etc.

If any of these devices are tampered with, it can lead to huge losses for the Organization that supports the network.

Page 8: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

TRIPWIRE FOR NETWORK DEVICES• Tripwire for network devices maintains a log

of all significant actions including adding and deleting nodes, rules, tasks and user accounts.

• Automatic notification of changes to your routers, switches and firewalls.

• Automatic restoration of critical network devices.

• Heterogeneous support for today’s most commonly used network devices.

Page 9: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

User authentication levels“Monitors” are allowed only to monitor the

application. They cannot make changes to Tripwire for Network Devices or to the devices that the software monitors.

“Users” can make changes to Tripwire for Network Devices, such as add routers, switches. Groups, tasks, etc., but they cannot make changes to the devices it monitors.

“Powerusers” can make changes to the software and to the devices it monitors.

“Administrator” can perform all actions, plus delete violations and log messages as well as add, delete, or modify user accounts

Page 10: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

Tripwire for serversFor the tripwire for server’s software to work

two important things should be present –the policy file and the database.

The Tripwire for server’s software conducts subsequent file checks automatically comparing the state of system with the baseline database.

Any inconsistencies are reported to the Tripwire manger and to the host system log file.

Reports can also be emailed to an administrator.

Page 11: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

There are two types of Tripwire ManagerActive Tripwire ManagerPassive Tripwire Manager This active Tripwire Manager gives a user

the ability to update the database, schedule integrity checks, update and distribute policy and configuration files and view integrity reports.

The passive mode only allows to view the status of the machines and integrity reports.

Page 12: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

How do you install and use TripWire? Install Tripwire and customize the policy file.

Initialize the Tripwire database.

Run a Tripwire integrity check.

Examine the Tripwire report file.

Take appropriate security measures.

Update the Tripwire database file.

Update the Tripwire policy file.

Page 13: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

What is the benefit of TripWire?Increase security

Immediately detects and pinpoints unauthorized change.

Instill AccountabilityTripwire identifies and reports the sources of change.

Gain VisibilityTripwire software provides a centralized view of changes across the enterprise infrastructure and supports multiple devices from multiple vendors.

Ensure AvailabilityTripwire software reduces troubleshooting time, enabling rapid discovery and recovery. Enables the fastest possible restoration back to a desired, good state.

Page 14: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

What are the chances of TripWire?The main attractive feature of this system is that the software generates a report about which file has been violated, when the file has been violated and also what information in the files have been changed.

If properly used it also helps to detect who made the changes.

Proper implementation of the system must be done with a full time manager and crisis management department.

Page 15: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

Where did I get this Information?www.tripwire.comwww.iec.comwww.itpaper.comwww.google.com (Search for Tripwire)

Page 16: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

ADVANTAGES

Increase security Immediately detects and pinpoints unauthorized change.

  Instill Accountability Tripwire identifies and reports the sources of change. Gain Visibility Tripwire software provides a centralized view of changes across

the enterprise infrastructure and supports multiple devices from multiple vendors.

 Ensure Availability Tripwire software reduces troubleshooting time, enabling rapid

discovery and recovery. Enables the fastest possible restoration back to a desired, good state.

Page 17: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

DRAWBACKS

Ineffective when applied to frequently changing files.

 higher learning curve to install, edit, and

maintain the software  Cost Effective

Page 18: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire

APPLICATIONS Tripwire for Servers(used as software). Tripwire for Host Based Intrusion Detection

System (HIDS) and also for Network Based Intrusion Detection System (NIDS).

 Tripwire for Network Devices like Routers,

Switches etc. 

Page 19: INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire