Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30

Video Description

This network discusses basic network security appliances. Two common security appliances are an IPS and an IDS. IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System. An IPS is an active system that sits on the network and intercepts network traffic, analyses and stops anything deemed malicious. Whereas IDS is a passive system; it doesn't stop network traffic. It sets alerts and sends messages if something happens, but it does not stop anything. IPS and IDS appliances can be either behavior based or signature based, network based or host based. It's good to have a combination of things for maximum network security.

Video Transcription

00:04
Hi and welcome to Sigh Bury My name's Anthony and I'm gonna local subject matter expert for Network Plus. And today we're gonna be talking about basic network security appliances. So let's take a look and talk about some of our different security appliances, which could be in place on our network. Now, two of our most common security appliances are going to be an I. P. S or an ideas.
00:23
Now I, P s stands for intrusion prevention system
00:27
and an I. D. S stands for an intrusion detection system.
00:30
An I. P. S is going to be an active system that sits on our network and intercepts network traffic, analyzes it and stops network traffic that it deems and malicious or deems to be harmful.
00:42
And I D s, on the other hand, is a passive system, and I d s doesn't stop network traffic. It sends it, sets alerts, it sends us messages that lets us know if something occurred. But an I. D. S is not going to stop something that's in progress. It's just going to be a reactive type, passive scanning and system.
01:00
We're gonna have to go in later, and we're gonna have to check and see if we can fix what it alerted us to.
01:06
However, an I p s is going to be something that is actively in session and is actively functioning on our network. So just as a this is an example, and I ps would need to sit on our network and intercept traffic much like a firewall. Does it have to be in between? And it would have
01:23
point A and point B, and traffic would have to be directed through it for it to stop it.
01:27
And I d. S, however, can do consider anywhere on our network work can receive mirrored copies of traffic. All it has to do is sit somewhere on our network off off our network, maybe on a mirrored port, maybe on a span port, and receive copies of the data that's already gone from point A to point B and then analyzes this data and gives us the results.
01:48
Depending on our situation and depending on our security posture,
01:51
we may use an I. P. S if we need to absolutely make sure that we stop stop it before it happens. But if we can't, if we don't have that luxury if we If we need to value our network traffic and our network through put more than we weaken, then we can have with an I p. S and we say Okay, well, it's sending too many false positives.
02:10
It's dropping too much traffic.
02:13
Let's just set up an I. D. S and then let the idea see the traffic. And then we'll go through the logs as we can, and then address issues as we can, but we need to have that traffic through. So we're just gonna have the i. D. S be passive and not be an active I PS. So an I p s or an I D s can be based off of
02:31
can detect malicious traffic. Comtech
02:35
can detect
02:37
issues with our different traffic based on a couple different a couple of different
02:42
skating mechanisms. But our two main skating mechanisms are going to be behavioral bit, behavior based or signature based.
02:50
Now, when we're talking about behavior based scanning, we're talking about skating on traffic, skating on files and folders that is going to be here. Ristic, which is means it's going to be based on activity based on some sort of rule. So if we're skating traffic and we have an I d S r I P s, it's scanning some network traffic
03:08
and it says, Hey, wait a second.
03:09
I recognize this sequence is pat of packets as support scans. Ah, typical port scan. Or I recognize this sequence sequence of packets as someone trying to establish a malicious connection where this is a sea, this packet and this is a commonly used port for a malicious software and
03:29
are such a port 4444
03:31
That's a common commonly used port for medicine for medicine, like, well, the default port for medicine point not Cyril, the most commonly used port but the default port for medicine. So we tagged that and say, Hey, this is this may be malicious. You might want to take a look at that
03:47
based on some behavior based on some rules of thumb. If it sees a file and it wants to take a look at that file, Ah, behavior based file scan would be one that says, OK, what does this file want to do? Does it want to change the registry? One is they want to bring up, make a pop up, Come up. Doesn't want to open a new fur.
04:06
Doesn't wanna open or delete a file.
04:09
What is this trying to do and what if what it's trying to do, seem suspicious than we flag it, or then we delete it or move it to quarantine. So that's behavior based. We're basing it. Based on what something does. We're basing it based on activity or suspicious actions.
04:25
Signature based is actually based on a hash of of a pre established hash of malicious code. So signatures are developed by company, the company that issues the I i ps or I d. S to us. And they say that we've identified
04:44
these. We've identified all of this malware.
04:47
We found this malware in the wild. It was samples were sent to us and we took this malware. We took a section of the critical code for the Mauro toe work, and we put it through an algorithm and created a string of has created a hash for it, sort of like a fingerprint for the malware
05:04
and our signatures. All of these different fingerprints are going to be put in our I. P s or I. D. S is dictionary and as they scan our files, they put them scene through the same algorithm. And if any of those files have the same fingerprint is what matches in our dictionary, it flags them is militias. So our signature based
05:23
scanning is based off of fingerprint
05:26
behavioral based here. Six scanning is based on actions some, sometimes our behavior behavioral based here. Six. Gaining won't catch things that our signature based wood and sometimes our signature based, won't catch things that our behavior based would. Because malware can be very easily changed or modified, the code can be re written.
05:46
And if it's something that has never been seen before,
05:47
then a signature based scan is not gonna catch it because there's no fingerprint available for it. As if someone, this is the first time if it's the first time someone's been arrested the first time someone's been caught doing something they don't have, and they don't have fingerprints in the system. They have to get a fingerprint before they'll be in the system.
06:04
But this this malware that a signature base that we have signatures for,
06:09
has already been arrested has already been caught once, so we have fingerprints for it
06:14
now, the other, the other. Definitely The other distinction between our I. D s and I P s is
06:20
will be if our I d S r I. P. S is our network based or host based
06:26
network a network based idea. So I ps is goingto watch network traffic. So this will be a device or a This is gonna be a device that may sit on our network. Maybe in all, a singular only one device that all it does is sit on our network
06:41
and act as an I. D. S. Or maybe a role that we install on A servers in another computer
06:46
that it sits on our network and it watches the network traffic. So it looks for specific activity that is going around on our network.
06:55
So it may, as we may establish what our network normally looks like. And then if it notices an increase in a certain type of traffic or notices an increase or sudden sudden oddity in the way that traffic is being sent and received on our network, that it's gonna start flagging this So I'm gonna start sending alerts.
07:12
Host based I D. S is an I P s is are installed on the device that we think may be targeted. This is something such as anti viruses or anti malware sze. They will actually sit on the device that we think will be targeted, and they will scan for malicious activity on that device.
07:29
They aren't looking at our network. They aren't looking at what's going on amongst our other computers.
07:32
They're looking at what's going on with our computer. They're looking at our file system. They're looking at the incoming and outgoing connections, but they're not really concerned about other people's network traffic. So
07:45
our host based
07:46
security, host based ideas and I PS will be on the individual devices and our network based I PS and ideas will be on our actual network. It's great to have a combination of both of them because we can't just rely on one of the other. We may have a month now where on our computer that our host based can't catch
08:05
because not really doing much on our computer,
08:07
but instead it's causing our computer to send out a lot of odd network traffic, which one which a network based ideas would catch,
08:16
or we may have a particular type of malware or particular type of malicious activity. That's only affecting our style system. And it's modifying our files and it's changing our registry and it's popping up ABS and it's popping up fake anti virus. And it's not really sending anything at malicious or suspicious over our network.
08:35
Well, then, a network based ideas
08:37
would be less inclined to catch that rather than a host based I d s would. So r I P s I d S r I P s. So it's it's great to have a combination of both of them on your network host based I D s is or I. P s is on the device and the network base that's watching our network.

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC
Instructor