6.6. Intrusion Detection and Prevention
6.6.1. Overview
Intrusion Definition
Computer servers can sometimes have vulnerabilities which leave them exposed to attacks
carried by network traffic. Worms, trojans and backdoor exploits are examples of such attacks
which, if successful, can potentially compromise or take control of a server. A generic term that
can be used to describe these server orientated threats are
intrusions
.
Intrusion Detection
Intrusions differ from viruses in that a virus is normally contained in a single file download and
this is normally downloaded to a client system. An intrusion manifests itself as a malicious
pattern of Internet data aimed at bypassing server security mechanisms. Intrusions are not
uncommon and they can constantly evolve as their creation can be automated by the attacker.
NetDefendOS IDP provides an important line of defense against these threats.
Intrusion Detection and Prevention
(IDP) is a NetDefendOS subsystem that is designed to protect
against these intrusion attempts. It operates by monitoring network traffic as it passes through
the NetDefend Firewall, searching for patterns that indicate an intrusion is being attempted.
Once detected, NetDefendOS IDP allows steps to be taken to neutralize both the intrusion
attempt as well as its source.
The Terms IDP, IPS and IDS
Note that the terms
Intrusion Detection and Prevention
(IDP),
Intrusion Prevention System
(IDP) and
Intrusion Detection System
(IDS) may be used interchangeably in D-Link literature. They all refer to
the same feature, which is known as IDP within NetDefendOS.
IDP Issues
In order to have an effective and reliable IDP system, the following issues have to be addressed:
•
What kinds of traffic should be analyzed?
•
What should we search for in that traffic?
•
What action should be carried out when an intrusion is detected?
NetDefendOS IDP Components
NetDefendOS IDP addresses the above issues with the following mechanisms:
•
IDP Rules are configured by the administrator to determine what traffic should be scanned.
•
Pattern Matching is applied by NetDefendOS IDP to the traffic that matches an IDP Rule as it
streams through the firewall.
•
If NetDefendOS IDP detects an intrusion then the Action specified for the triggering IDP Rule
is taken.
Chapter 6: Security Mechanisms
552
Содержание NetDefendOS
Страница 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Страница 32: ...Chapter 1 NetDefendOS Overview 32 ...
Страница 144: ...Chapter 2 Management and Maintenance 144 ...
Страница 220: ... Enable DHCP passthrough Enable L2 passthrough for non IP protocols 4 Click OK Chapter 3 Fundamentals 220 ...
Страница 267: ... SourceNetwork lannet DestinationInterface any DestinationNetwork all nets 4 Click OK Chapter 3 Fundamentals 267 ...
Страница 284: ...Chapter 3 Fundamentals 284 ...
Страница 360: ...The ospf command options are fully described in the separate NetDefendOS CLI Reference Guide Chapter 4 Routing 360 ...
Страница 392: ...Chapter 4 Routing 392 ...
Страница 396: ...Web Interface 1 Go to Network Ethernet If1 2 Select Enable DHCP 3 Click OK Chapter 5 DHCP Services 396 ...
Страница 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Страница 420: ...Chapter 5 DHCP Services 420 ...
Страница 424: ...2 Now enter Name lan_Access Action Expect Interface lan Network lannet 3 Click OK Chapter 6 Security Mechanisms 424 ...
Страница 573: ...Chapter 6 Security Mechanisms 573 ...
Страница 575: ...This section describes and provides examples of configuring NAT and SAT rules Chapter 7 Address Translation 575 ...
Страница 607: ...Chapter 7 Address Translation 607 ...
Страница 666: ...Chapter 8 User Authentication 666 ...
Страница 775: ...Chapter 9 VPN 775 ...
Страница 819: ...Chapter 10 Traffic Management 819 ...
Страница 842: ...Chapter 11 High Availability 842 ...
Страница 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Страница 879: ...Chapter 13 Advanced Settings 879 ...