Shared Flashcard Set

Details

CCNAS_Chpt5_ImplementingIPS
CCNAS_Chpt5_ImplementingIPS
26
Computer Networking
Undergraduate 3
03/27/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
IDS characteristics
Definition
If an attack is detected, the target machine will experience the attack.

Does not impact network (latency, jitter)

Copies of packets are independently sent to the sensor for analysis
Term
IPS characteristics
Definition
May impact network flow.

A sensor is placed inline.

If an attack is detected, it can be immediately stopped prior to reaching the target.
Term
IDS and IPS characteristics
Definition
Uses sensors

An alarm can be sent.

Uses signatures
Term
host-based solution characteristics
Definition
Not concerned with fragmented packets.

Cisco Agent

Can monitor operating system processes and resources.

Installed on individual computers.
Term
network based solution characteristics
Definition
Looks for network-wide malicious activity

All traffic will be unencrypted.

Installed at network edge.

ASA AIP-SSM

Is independent of the server operating systems.

Will watch for TTL attacks.

Cisco 4200
Term
Signature Type
Definition
Classified based on whether the signature consists of one packet or event, or a sequence of packets.
Term
Signature Trigger
Definition
Anything that can reliably signal an intrusion or security policy violation.
Term
Signature Action
Definition
The step(s) that should be taken when a matching activity is detected.
Term
atomic signature
Definition
A single packet is examined to see if matches a signature.
Term
composite signature
Definition
Also called a stateful signature

A sequence of operations or packets are examined to see if together they match a signature.
Term
Service SME signature
Definition
Signatures that examine services that may be attacked.
Term
String SME
Definition
Signatures that use regular expression-based patterns
Term
Multi-string SME
Definition
Supports flexible pattern matching and Trend Labs signatures.
Term
Pattern-Based trigger
Definition
Looks for a specific, pre-determined pattern.
Term
Anomaly-based trigger
Definition
A set of normal activities are first defined, then looks for excessive activity outside of this.
Term
Policy-based trigger
Definition
Suspicious behaviours are defined based on historical analysis.
Term
Honey Pot-based trigger
Definition
A dummy server is used to attrack attacks.
Term
Protocol Decodes
Definition
Breaks the paket into fields and analyzes the fields for abnormalities.
Term
True negative
Definition
The network is not under attack, and no alarm is generated.
Term
False Negative
Definition
The network is under an attack, but no alarm is generated.
Term
True positive
Definition
The network is under attack, and an alarm is generated.
Term
False Positive
Definition
The network is not being attacked, but an alarm is generated.
Term
What actions may be taken if a signature is detected?
Definition
Produce an alert
Log the activity
Drop the packet
Block future similar activity
Allow the activity
Term
How is an updated group of signatures added to a Cisco router
Definition
Download and install a signature package.
Term
Purpose of a crypto key to be used by IOS IPS is
Definition
To verify the master signature file is from Cisco
Term
When an administrator edits a signature action or paramter, this is referred to as ______.
Definition
tuning
Supporting users have an ad free experience!