Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

3 Intrusion detection system (IDS)

This section is part of the amber and green pathways.

So what happens when there’s an attack on a computer network? Chances are that you’ve seen a movie or TV programme where the administrators rush to their keyboards and frantically begin typing, lights flash, sirens sound – it’s all very exciting – but does anything like this happen in real life?

As you might suspect, the answer is, no, not really. Computer networks are regularly attacked, but the response is rarely as exciting as filmmakers would like you to believe.

Intrusion detection systems (IDS) may be a dedicated device or software and are typically divided into two types depending on their responsibilities:

  • Network Intrusion Detection System (NIDS), which is responsible for monitoring data passing over a network.
  • Host Intrusion Detection System (HIDS), which is responsible for monitoring data to and from a computer.
This diagram shows a host-based IDS alongside a router, which then connects to a firewall.
Figure 7 Host-based IDS and network-based IDS

An IDS can support a network firewall. Ideally the firewall should be closed to all traffic apart from that which is known to be needed by the organisation (such as web traffic, email and FTP). An IDS can then be used to scan any traffic passing through the firewall for potential attacks using a NIDS, as well as being able to detect those coming from within – such as from a personal computer infected with malware – using a HIDS.

Intrusion detection may be considered passive; it identifies that an intrusion is taking place and informs an administrator who must take appropriate action. However, they can also be reactive – as well as informing the administrator, the IDS can actively attempt to stop the intrusion, in most cases by blocking any further data packets sent by the source IP address. These systems are also referred to as an Intrusion Prevention or Protection System (IPS). The following table illustrates the functional differences between IDS and IPS. Notice where these devices are deployed.

Table 1 IDS vs. IPS
IDSIPS
Where in the network?Supporting the firewall and with the capability of inspecting all the incoming and outgoing data trafficBetween the firewall and the router connecting to the internet
OperationPassive – inspects the data traffic and alerts a companion device such a FirewallActive – performs IPS functions and also blocks suspicious traffic from reaching the firewall
DetectionAnomaly detection – statistical anomaly, signature-based or rule-based, and misuse detectionAnomaly detection – statistical anomaly, signature-based or rule-based, and misuse detection

Weaknesses

Automated intrusion detection systems have a number of weaknesses. They can be too sensitive, falsely reporting that an intrusion is under way, for example if a network is incorrectly configured or a buggy program begins issuing large numbers of packets.

Conversely, they are sometimes not sensitive enough to certain types of attack that proceed very slowly and do not generate enough traffic data to raise the alarm. Finally, signature IDS relies on the software suppliers issuing regular updates to the list of known signatures, until the IDS receives the update it is effectively blind to the attack.

How does a Firewall differ from an IPS?

The primary differences are in what they are purposed for. A firewall is an independent device that is positioned at the entry/exit point of the network. It inspects the IP datagrams and “filters” them based on a set of rules. These rules are configurable and can be changed as required. Based on the rules, the firewall either permits the IP datagrams access to the network it protects or it denies access to the network.

The following table illustrates the difference between a firewall and an IPS. Notice that the IPS is typically deployed between the internet router and the firewall. That way, it can block the data traffic it finds suspicious and prevent it from reaching the firewall.

Table 2 Firewall vs. IPS
FirewallIPS
Where in the network?At the perimeter of the network, before the internet routerBetween the firewall and the router connecting to the internet
OperationActive – inspects incoming IP datagrams and blocks or permits them throughActive – performs IPS functions and also blocks suspicious traffic from reaching the firewall
DetectionRule-based blocking of IP datagrams based on source and destination addresses and service port numbersAnomaly detection – statistical anomaly, signature-based or rule-based, and misuse detection
IntegrationFirewalls deployed for small networks could have the IPS functionality integratedDedicated functionality

In the next section you’ll learn how IDS works in practice.