Intrusion Detection
Explain how statistical anomaly detection and rule-based intrusion detection are utilized to identify different types of intruders.
An example of a host-based intrusion detection tool is the Tripwire program. Tripwire is a file integrity checking tool that regularly scans files and directories within the system, notifying the administrator of any modifications. It employs a secure database of cryptographic checksums for each file monitored and compares these values with the checksums recalculated during each scan. Configuring Tripwire requires selecting the files and directories to monitor and specifying allowable changes for each. For instance, it can be set to permit new entries in log files while preventing modifications of existing entries. Discuss the advantages and disadvantages of employing such a tool, taking into account the challenge of identifying which files should change infrequently, which may change more regularly, and which change rapidly, rendering them uncheckable. Additionally, evaluate the workload related to the configuration of the tool and the monitoring responsibilities of the system administrator?
Sample Answer
Intrusion Detection: Statistical Anomaly Detection and Rule-Based Systems
Statistical Anomaly Detection and Rule-Based Intrusion Detection
Intrusion detection systems (IDS) are crucial tools for safeguarding computer systems and networks. Two primary techniques for identifying intrusions are statistical anomaly detection and rule-based intrusion detection.
Statistical Anomaly Detection This method involves analyzing system behavior and identifying deviations from normal patterns. By monitoring system metrics like network traffic, CPU usage, and disk I/O, it can detect unusual activity that might indicate an intrusion. For example, a sudden spike in network traffic or a significant increase in system resource usage could be signs of malicious activity.