5.
c) What is Demilitarized Zone? Explain with a diagram. [6]
Ans: In computer network, Demilitarized Zone is computer host or a small private network which is placed in “neutral zone” between the private network of company and the internet .It prevent outsider from direct access to a server that has companies data. DMZ acts as a proxy server and provide very effective mean of firewall.
In DMZ configuration, the outsider can access only DMZ host. DMZ host contains the website of the company but not the other data of the company. If an attacker attacks the website in DMZ then he can corrupt only the website but cannot do any harm to company’s data.
6.
b) What are the three classes of intruders? Discuss any three metrics used in profile-based anomaly detection. Explain the architecture of a distributed intrusion detection system (with a suitable diagram) and name the various components. [10]
Ans: Three classes of intruders are:
- Masquerader: An individual who has no authority to use a computer system using the system by exploiting the user account.
- Misfeasor: A legitimate user who is accessing data, program or resources of a system in spite of not has permission to access.
- Clandestine: A individual who grab the supervisory control a system and use it to avoid auditing and access control.
A distributed IDS (dIDS) consists of multiple Intrusion Detection Systems (IDS) over a large network, all of which communicate with each other, or with a central server that facilitates advanced network monitoring, incident analysis, and instant attack data. By having these co-operative agents distributed across a network, incident analysts, network operations, and security personnel are able to get a broader view of what is occurring on their network as a whole.
The Central Analysis Server
The central analysis server is really the heart and soul of the operation. This server would ideally consist of a database and Web server. This allows the interactive querying of attack data for analysis as well as a useful Web interface to allow the corporate guys upstairs to see the current attack status of your network.
The Co-operative Agent Network
The co-operative agent network is one of the most important components of the dIDS. An agent is a piece of software that reports attack information to the central analysis server. The use of multiple agents across a network allows the incident analysis team a broader view of the network than can be achieved with single IDS systems.
Attack Aggregation
Attack aggregation is another core part of the dIDS system. This part of the system is programming logic based on the central server. Aggregation simply refers to the method in which users or group order the information gathered from the agent network. One example of this would be to aggregate information according to attacker IP, putting all attacks from an attacking IP together with other attacks from the same IP.
No comments:
Post a Comment