Idps Siem PDF
Idps Siem PDF
Defense in Depth
• Single defenses can and will fail
• Instead, we need multiple layers of defense of
different designs and objectives
Network Defense in Depth
1 1. Advance Threat Protection
2 e.g. FireEye, Cisco/IronPort
3 2. Intrusion Detection Systems
4 e.g. McAfee
5 3. Web Security
6 e.g. Fortinet
7 4. Email Security
8 e.g. Bluecoat, Cisco/IronPort
5. Forensics Analysis
e.g. RSA/NetWitness
6. Data Loss Prevention (DLP)
e.g. TrendMicro
7. Next-Gen Firewalls
e.g. Palo Alto Networks
8. Security Event Monitoring
e.g. HP/ArcSight
Network Defense in Depth
1 1. Advance Threat Protection
2 e.g. FireEye, Cisco/IronPort
3 2. Intrusion Detection Systems
4 e.g. McAfee
5 3. Web Security
6 e.g. Fortinet
7 4. Email Security
8 e.g. Bluecoat, Cisco/IronPort
5. Forensics Analysis
e.g. RSA/NetWitness
6. Data Loss Prevention (DLP)
e.g. TrendMicro
7. Next-Gen Firewalls
e.g. Palo Alto Networks
8. Security Event Monitoring
e.g. HP/ArcSight
Intrusion Detection System
• A device or software application that monitors
a network or systems for malicious activity or
policy violations. [CIA violation]
Policy Alarms
Event
Event Analyzer stream Event Storage
Packets Collector
Packet stream
SYSTEM
Firewall versus Network IDS
• What is the difference between firewalls and
network-based Intrusion Detection Systems?
Firewall vs. Network-based IDS
• What is the difference between firewalls and
network-based Intrusion Detection Systems?
• Firewall
– Active filtering FW
– Fail-close
• Network-based IDS
IDS
– Passive monitoring
– Fail-open
Host-based IDS
• Using OS auditing mechanisms
– EventLog: Windows Event Logs, System, Security,
Application.
– Netstat: Read information about network usage.
– Health: Read information about CPU, Memory,
and Swap usage.
– Ps: Read information about running processes
• Monitoring user activities
– E.g. analyze shell command
• Monitoring execution of system programs
Host-based IDS
Policy Configuration
Alarms
Detector Countermeasure
Vulnerability
Audit logs Actions
Scanning
SYSTEM
IDS detection Methods
• Knowledge-based
• Specification-based
• Behavior-based
Evaluation of IDS
• Accuracy
• Completeness
• Performance
• Fault tolerance
• Timeliness
Knowledge-based IDS
• High accuracy, but low in completeness
* Source “ManageEngine”
https://www.manageengine.com/products/eventlog/manageengine-siem-whitepaper.html
SIEM Workflow
Generate
Collect Data Archive Logs for
Alerts Security Security and
from Log Correlate Events Forensic
Incidents Compliance
Sources Analysis
Reports
SIEM Workflow
Generate
Collect Data Archive Logs for
Alerts Security Security and
from Log Correlate Events Forensic
Incidents Compliance
Sources Analysis
Reports
• Severity
Low Medium High Critical
• Notification: upon identifying a threat, notifications
are sent to the security administrators (SOC)
• Automated Response: the majority of SIEM tools
can execute external scripts to react on identified
threats. (Change to FW rules, issue a Remedy ticket)
Security Operations Center (SOC)
SIEM Workflow
Generate
Collect Data Archive Logs for
Alerts Security Security and
from Log Correlate Events Forensic
Incidents Compliance
Sources Analysis
Reports
SIEM Workflow
Generate
Collect Data Archive Logs for
Alerts Security Security and
from Log Correlate Events Forensic
Incidents Compliance
Sources Analysis
Reports
THANK YOU!