Ids And Idp; Host Idp; Network Idp - ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Firewalls are usually deployed at the network edge. However, many attacks (inadvertently) are
launched from within an organization. Virtual private networks (VPN), removable storage
devices and wireless networks may all provide access to the internal network without going
through the firewall.

12.1.2 IDS and IDP

An Intrusion Detection System (IDS) can detect suspicious activity, but does not take action
against attacks. On the other hand an IDP is a proactive defense mechanisms designed to
detect malicious packets within normal network traffic and take an action (block, drop, log,
send an alert) against the offending traffic automatically before it does any damage. An IDS
only raises an alert after the malicious payload has been delivered. Worms such as Slammer
and Blaster have such fast proliferation speeds that by the time an alert is generated, the
damage is already done and spreading fast.
There are two main categories of IDP; Host IDP and Network IDP.

12.1.3 Host IDP

The goal of host-based intrusions is to infiltrate files on an individual computer or server in
with the goal of accessing confidential information or destroying information on a computer.
You must install Host IDP directly on the system being protected. It works closely with the
operating system, monitoring and intercepting system calls to the kernel or APIs in order to
prevent attacks as well as log them.
Disadvantages of host IDPs are that you have to install them on each device (that you want to
protect) in your network and due to the necessarily tight integration with the host operating
system, future operating system upgrades could cause problems.

12.1.4 Network IDP

Network-based intrusions have the goal of bringing down a network or networks by attacking
computer(s), switch(es), router(s) or modem(s). If a LAN switch is compromised for example,
then the whole LAN is compromised, resulting in the equivalent of a LAN Denial of Service
(DoS) attack. Host-based intrusions may be used to cause network-based intrusions when the
goal of the host virus is to propagate attacks on the network, or attack computer/server
operating system vulnerabilities with the goal of bringing down the computer/server. Typical
"network-based intrusions" are SQL slammer, Blaster, Nimda, MyDoom etc.
A Network IDP has at least two network interfaces, one internal and one external. As packets
appear at an interface they are passed to the detection engine, which determines whether they
are malicious or not. If a malicious packet is detected, an action is taken. The remaining
packets that make up that particular TCP session are also discarded.
237
Chapter 12 Intrusion Detection and Prevention (IDP)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents