Dr. Greg Bernstein
May 2nd, 2022
From CyBOK section 8.1.2
From Wikipedia
In computer security, a DMZ or demilitarized zone is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN): an external network node can access only what is exposed in the DMZ, while the rest of the organization’s network is fire walled.
From Wikipedia
From CIS Control 19, organizational control
Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems.
From CIS Control 19, organizational control
Cyber incidents are now just part of our way of life. Even large, well-funded, and technically sophisticated enterprises struggle to keep up with the frequency and complexity of attacks. The question of a successful cyber-attack against an enterprise is not “if” but “when.”
When an incident occurs, it is too late to develop the right procedures, reporting, data collection, management responsibility, legal protocols, and communications strategy that will allow the enterprise to successfully understand, manage, and recover. Without an incident response plan, an organization may not discover an attack in the first place, or, if the attack is detected, the organization may not follow good procedures to contain damage, eradicate the attacker’s presence, and recover in a secure fashion.
From Wikipedia: IDS
An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.
From Wikipedia: IPS
Intrusion prevention systems (IPS) are network security appliances that monitor network or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, report it and attempt to block or stop it.
Intrusion prevention systems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are, unlike intrusion detection systems, intrusion prevention systems are placed in-line and are able to actively prevent or block intrusions that are detected.
From Wikipedia: IDS
Network-based intrusion detection/prevention system (NIDS/NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity.
Wireless intrusion detection/prevention system (WIDS/WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols.
Host-based intrusion detection/prevention system (HIDS/HIPS): monitors a single host for suspicious activity by analyzing events occurring within that host.
From Wikipedia: IDS
Signature-based detection: Signature-based IDS monitors packets in the Network and compares with pre-configured and pre-determined attack patterns known as signatures.
Anomaly-based detection: An IDS which is anomaly-based will monitor network traffic and compare it against an established baseline. The baseline will identify what is “normal” for that network – what sort of bandwidth is generally used and what protocols are used.
From Snort
“Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world.” (according to them…)
Once downloaded and configured, Snort rules are distributed in two sets: The “Community Ruleset” and the “Snort Subscriber Ruleset.”, i.e., they make their money via subscriptions.
Testing with a the site http://testmynids.org/uid/index.html
I ran an NMAP scan and it saw that too
From OSSEC Home page
OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS)
Multiplatform HIDS: Linux, Solaris, AIX, HP-UX, BSD, Windows, Mac and VMware ESX.
PCI Compliance: OSSEC helps organizations meet specific compliance requirements such as PCI DSS. It detects and alerts on unauthorized file system modification and malicious behavior that could make you non-compliant.
From Wikipedia: Fail2Ban
Fail2Ban operates by monitoring log files for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system’s security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6. Fail2Ban is typically set up to unban a blocked host within a certain period