欢迎来到天天文库
浏览记录
ID:5398527
大小:1.62 MB
页数:98页
时间:2017-11-10
《cisco企业ids解决方案》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、AdvancedEnterpriseIDSDeploymentandTuningThePotentialImpacttotheBottomLineIsSignificantTheNumberofSecurityIncidentsContinuestoRiseExponentiallyTheComplexityandSophisticationofAttacksandVulnerabilitiesContinuestoRiseTheChallenge:SecurityinModernNetworksMitigatingtheRisk:Defensei
2、nDepthComprehensivesecuritypolicyPervasivesecurity—endtoendSecurityinlayersMultipletechnologies,workingtogetherDefenseinDepth:TheRoleofIntrusionDetectionComplementarytechnologytofirewallsBeenaroundformorethanadecade,startedcomingintoprominenceinthelate’90sPerformsdeeppacketins
3、pection,gainingvisibilityintodetailoftenmissedbyfirewallsInternetAdvancedEnterpriseIDSDeployment:AgendaIntrusionProtectionSystemsNetworkSensorsHostAgentsManagementConsolesCaseStudiesIntrusionProtectionSystemsIntrusionProtectionAgendaTerminologyandTechnologiesCompleteArchitectur
4、e:Sensors,Agents,ManagementConsolesPlacementStrategiesWheretoPlaceYourSensors,whatTraffictoWatch,HowtoGetTraffictoThemOrganization-LevelConcernsRespondingtoIntrusions,OwnershipandOrganization,OutsourcingIDSTerminology:FalsePositivesAFalseAlarmoccurswhenanIDSreportsanattackevent
5、houghnoattackisunderwayBenignactivitythatthesystemmistakenlyreportsasmaliciousTypicallyduetoimpropertuningCaneasilyoverwhelmalarmconsolescreatingenormousamountofbackgroundnoiseCanresultinmistrustoftheIDSbysecuritypersonnelIDSTerminologyFalseNegativesAFalseNegativeoccurswhenanID
6、SfailstoreportanongoingattackMaliciousactivitythatthesystemdoesnotdetectorreportTendtobeworsebecausethepurposeofanIDSistodetectsucheventsCanbeduetoavarietyofeventsCanbetheresultofIDSevasioneffortsbyanattackerCanalsobeduetoout-of-datesignatureknowledgebase(misusedetectionsystems
7、)Minorstatetransitionthatisbelowadetectablethreshold(anomaly-basedsystems)IDSTerminology:SignaturesandAnomaliesSignaturesexplicitlydefinewhatactivityshouldbeconsideredmaliciousSimplepatternmatchingStatefulpatternmatchingProtocoldecode-basedanalysisHeuristic-basedanalysisAnomal
8、ydetectioninvolvesdefining“normal”activityandlookingfo
此文档下载收益归作者所有