Download - Securing the infrastructure using IDS
![Page 1: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/1.jpg)
4/17/20142014/4/17
Network Security
By
RUBAN D
System Team
![Page 2: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/2.jpg)
4/17/20142014/4/17
Security Overview!
What is Security Major threat to Security Importance of having IDS inside security Tools used in IDS Security Onion - an Overview Practical Scenarios with Security Onion Conclusion
![Page 3: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/3.jpg)
4/17/20142014/4/17
Network Security Monitoring
![Page 4: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/4.jpg)
4/17/20142014/4/17
THREATS
Viruses
Virus back doors
Password Attacks
Sniffers
Worms
Penetrations
DOS
Malicious Websites
![Page 5: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/5.jpg)
4/17/20142014/4/17
Need For IDS
Antivirus vs Firewall vs IDS
![Page 6: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/6.jpg)
4/17/20142014/4/17
Tools Used in IDS
• Snort now Snorby • Squil • Sqert • ElSA • Wireshark • BRO • OSSEC • Last but not least - "Nmap"
![Page 7: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/7.jpg)
4/17/20142014/4/17
Security Onion
Security Onion is a FREE Linux distro for Network Security Monitoring (NSM) Security Onion is primarily for:
intrusion detection network security monitoring log management
Security onion How it helps analyst: • Was an EXE downloaded? • Was it executed? • Was the computer compromised?
![Page 8: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/8.jpg)
4/17/20142014/4/17
![Page 9: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/9.jpg)
4/17/20142014/4/17
![Page 10: Securing the infrastructure using IDS](https://reader035.vdocuments.net/reader035/viewer/2022080122/58a6b3ca1a28ab661f8b49b5/html5/thumbnails/10.jpg)
4/17/20142014/4/17
Thank you Thank you