- Practical Network Scanning
- Ajay Singh Chauhan
- 326字
- 2022-07-12 10:43:01
Intrusion detection systems / intrusion prevention systems
There is a high chance that attacks may enter a network. Intrusion prevention system (IPS) / Intrusion detection system (IDS) is a proactive measure to detect and identify suspicious or undesirable activities that indicate intrusion. In IDS, deployment can be online or offline, and the basic idea is to redirect traffic you wish to monitor. There are multiple methods like switch port SPAN or fiber optic TAP solution, which can be used to redirect traffic. Pattern matching is used to detect known attacks by their signature and anomalies. Based on the activity, monitoring alerts can be set up to notify the network administrator.
As the following diagram shows, SPAN port is configured on a switch in order to redirect traffic to the IDS sensor. An actual SPAN port creates a copy of data flowing for a specific interface and redirects it to another port on the switch:

IPS offers proactive detection and prevention against unwanted network traffic. In an inline placement of IPS, all the traffic will travel via IPS devices. Based on the rules, actions can then be taken. When a signature is detected on an IPS device it can be used for resetting, blocking, and denying connections, as well as logging, monitoring, and alarming. A system admin can also define a policy-based approach with defined policy violation rules and actions to keep in mind when well-known signatures are released. Actions should be defined by the system admin.
The following diagram shows a topology for inline setup of IPS. All the traffic travels through IPS devices for traffic inspection. This is a bit different to doing a port SPAN, since all data goes through an IPS box. Consequently, you should be aware of what type of data has to be inspected:

There are a number of different attack types that can be prevented using an IPS, including:
- Denial of Service
- Distributed Denial of Service
- Exploits
- Worms
- Viruses
- Web漏洞分析與防范實戰(zhàn):卷1
- Metasploit Penetration Testing Cookbook(Third Edition)
- Enterprise Cloud Security and Governance
- Preventing Digital Extortion
- 安全技術(shù)運營:方法與實踐
- 計算機病毒原理與防范(第2版)
- 從0到1:CTFer成長之路
- 解密彩虹團隊非凡實戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- End to End GUI Development with Qt5
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Mastering Metasploit
- 功能型密碼算法設(shè)計與分析
- 交換機·路由器·防火墻(第2版)
- 黑客攻防從入門到精通:命令版
- 紅藍攻防:技術(shù)與策略(原書第3版)