Preview

Intrusion Detection

Satisfactory Essays
Open Document
Open Document
403 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Detection
INTRUSION DETECTION AS A NETWORK FORENSIC TOOL
Lecture by Peter Stephenson, CPE, PCE
Director of Technology, Netigy Corporation, San Jose, California
PhD Research Student, Oxford Brooks University, Oxford, UK

ABSTRACT: The concepts of intrusion detection and forensic analysis often are not considered together, even though the intrusion detection system (IDS) is the most likely candidate for gathering information useful in tracing and analyzing a network-based computer security incident. From the standpoint of the security practitioner, the primary use for the IDS is detection and response. To extend that to include forensic analysis of the event implies going outside the parameters of most intrusion detection systems.

Contrary to that belief, however, is the obvious concept that, when an event occurs, there is a high probability that the IDS will be the only thing watching the network in significant enough detail to capture the event and any precursor events in their entirety. Thus, the application of the output of an IDS to the investigation and potential prosecution of an attack against computers on a network is of interest both to practitioners and to researchers.

This lecture will discuss the details of intrusion detection systems in the context of their use as investigative tools, fundamentals of forensic computer analysis and network forensic analysi,s and some potential methods of combining techniques to enable investigation and prosecution of computer-related crime.

Specific topics to be covered include:

• Intrusion detection system architectures • Application of forensic computer analysis • Current network forensic analysis techniques • Legal requirements for the use of forensic evidence • Using forensics for system recovery (operational forensics) • Examination of an IDS suitable for use in forensic analysis of attacks • Problems and challenges in the forensic application of intrusion detection

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Implementing the installation of an IDS or IPS will allow for suspicious traffic to be flagged and reported to administrators based on one of two different factors. These factors are signature based or anomaly based depending on how they are configured.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    An IDS is a software or hardware tool which allows to detect and warn about an attack or…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    We attempt Earth-place discipline in initiative investigations, e-exploration, information processing system protection incident answer, and digital forensics, and have cars over 50,000 digital investigators cosmopolitan. Some of our most epidemic courses end: EnCase ® v7 Transition Designed for EnCase Forensic users who are upgrading from a previous version to Version 7, the EnCase v7 Transition course details the unaccustomed features of Version 7, spotlight specifically the areas of the fruit that differ significantly from anterior versions. To chronicle for this passage, a use must have accomplished Computer Forensics II or hold an EnCE ®certification. EnCase Computer Forensics I Practical exercises and real-life simulations stipulate participants with an understanding of proper handling of digital eveidence from hold to acquirement, to the analysis and archiving of the data. EnCase Computer Forensics II Designed for investigators with muscular electronic computer discrimination, prior rhetorical training, and experience second-hand EnCase Forensic. EnCase Startup Training Encase® Start Up on-imposition result training to let you spring-in and rapidly get empty with your new software. EnCase® Start Up is convenient for cull Guidance Software products at no cost. You can refer to it whenever you indigence it; brush-up on shape and secant, or import a new abound…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

     Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Identification is the first of four steps of the security process. Any user that expects to gain access to a system is referred to as a supplicant, and the tool that every user who gains entry to the system is referred to as an Identifier. The identifier can have many different methods for identifying the supplicant. The…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Fornesics

    • 3973 Words
    • 16 Pages

    Computer forensics itself is based upon applying various analytical techniques on digital media, usually when a computer security incident has been detected. The goal of computer forensics is to determine the scope of the security breach, and who the perpetrator was through an investigation, just as in a real, physical crime scene. The actual forensic investigation encompasses a multitude of areas of computer security, including internet abuse, pornographic websites, hacking, and fraud schemes. In addition, it also includes data alterations, both intentional and accidental.…

    • 3973 Words
    • 16 Pages
    Powerful Essays

Related Topics