Cryptography And Data Privacy
Cryptography And Data P
Last Name First Namepage 4infa 630 Cryptography And Data P
Last Name First Namepage 4infa 630 Cryptography And Data P
Last Name First Name INFA 630- Cryptography and Data Protection Midterm Exam Spring 2017 Due on Sunday 11:59 EST INFA 630 Intrusion Detection and Intrusion Prevention Midterm Exam Instructions · You are to take this test during the week (with late submission on Monday; a maximum of 15% penalty). The test is due no later than 11:59 p.m. Eastern Daylight Time on Sunday. Work alone . You may not confer with other class members, or anyone else, directly or by e-mail or otherwise, regarding the questions, issues, or your answers.
You may use your notes, textbooks, other published materials, and the Internet. · The test scored on the basis of 100 points for the test. The exam is intended to assess your understanding of key concepts in the course, NOT your ability to look up concepts on the internet. Make sure answers are stated in your own words, and where applicable provide your own examples, rather than repeating the ones used in the course materials. · When composing your answers, be thorough . Do not simply examine one alternative if two or more alternatives exist. The more complete your answer, the higher your score will be.
Be sure to identify any assumptions you are making in developing your answers, and describe how your answer would change if the assumptions were different. For multiple choice question if you think there are more than one correct answers choose the best one and justify your answers · While composing your answers, be VERY careful to cite your sources. Remember, failure to cite sources constitutes an academic integrity violation. Use APA style for citations and references. References are not required for Part I, & II.
However, for Part III and IV please give references. · Your answers should be contained in a Microsoft Word, RTF, or compatible format document uploaded to the Assignments folder. If you use some other word processor, please make sure the numbering does not change. I may return files (ungraded) in any other format if I cannot open them in one try. I may check your part IV answers with Turnitin. · Please be sure to put your name in the header on every page including page #’s. Replace “Last Name†with your last name and so on.
Name your file “ Lastname first nameINFA630 Midterm†· General or logistical questions about the exam or these instructions should be posted in the Q&A Conference. Please submit specific or detailed questions regarding the exam to your instructor at [email protected] . If questions submitted via email are applicable to all, your instructor, with your permission, may post them in the LEO Q&A Conference area, without revealing their source.
Paper For Above instruction
Introduction
The midterm exam for INFA 630 covers critical areas of intrusion detection and prevention, focusing on concepts such as anomaly-based and signature-based intrusion detection systems (IDS), intrusion prevention systems (IPS), network and host-based detection, and the strategic deployment of IDS within organizational network architectures. Understanding these elements is essential for developing effective cybersecurity strategies to safeguard organizational assets against evolving threats.
Part 1: True or False Questions
Anomaly-based intrusion detection systems generate alerts based on deviations from "normal" traffic. (True) These systems model normal activity and flag significant deviations as potential threats, allowing for the detection of novel or zero-day attacks (Liao, Lin, & Lin, 2013). Conversely, signature-based systems rely on pre-defined patterns, detecting known attack signatures (Roesch, 1999).
A host-based IDS only monitors network traffic destined for a particular computer. (False) Host-based IDS (HIDS) monitor system-level activities such as file integrity, process monitoring, and system logs. They do not primarily focus on network traffic, which is the domain of network-based IDS (NIDS) (Scarfone & Mell, 2007).
When discussing IDS and IPS, a signature is a digital certificate used to identify the author of a rule. (False) In IDS/IPS terminology, a signature is a pattern or rule that identifies specific attack vectors or malware signatures. Digital certificates are used in cryptography to verify identities, not in intrusion signatures (TCP/IP Guide, 2014).
To comply with network communication standards, software running on Internet hosts must implement both IP and ICMP protocols. (False) While many Internet applications use IP, not all are required to implement ICMP. ICMP is used for diagnostic and error-reporting purposes, but its implementation is not mandatory for all networked applications (Rekhter, 1994).
Signature-based intrusion detection can identify previously unknown attacks. (False) Signature-based systems detect only known threats based on existing signatures; they cannot detect unknown or zero-day attacks without prior signatures (Liao, Lin, & Lin, 2013).
The primary difference between network-based IDS and IPS is that an IPS responds to suspected attacks by blocking network traffic, while an IDS only provides notification that suspicious traffic is observed. (True) IPSs are inline and can proactively block or prevent attacks; IDSs typically operate passively, alerting administrators (Scarfone & Mell, 2007).
Snort requires the use of at least one preprocessor to be able to analyze patterns in network traffic spanning multiple packets. (True) Preprocessors analyze reassembled or preprocessed traffic to identify attack patterns across multiple packets, such as fragmented attacks (Roesch, 1999).
Snort generates an alert as soon as a detection rule is matched. (True) It operates in real-time, triggering alerts immediately upon matching signatures or detection criteria (Roesch, 1999).
A network-based IDS that scans packet traffic to try to match known attack patterns is called a signature-based NIDS. (True) This approach relies on pattern matching, signature databases, to identify malicious activity (Liu, Stolfo, & Wang, 2000).
An in-line IDS must have the processing power to handle traffic at least as fast as the bandwidth of the network it monitors, or it will lose packets and potentially fail to notify on packets matching alert rules. (True) Inline deployment requires high throughput to prevent packet loss, which can hinder detection (Scarfone & Mell, 2007).
Part 2: Multiple Choice Questions
1. An advantage of anomaly-based detection is that it can detect “zero-day†or previously unknown attacks (c). Signature-based detection is limited to known threats; thus, anomaly detection's ability to identify novel attacks is a significant benefit. Unlike options a, b, d, e, which are less characteristic of anomaly detection (Liao, Lin, & Lin, 2013).
2. Most commercial IDSes generate alerts based on signatures at the network layer and the Application layer (a). Signatures are designed for recognizable attack patterns at various OSI layers, especially network and application layers (Roesch, 1999).
3. Out-of-order packet arrival can result from the network routing process or traffic load balancing and is generally not caused by packet alteration or splitting across interfaces (b). Session or network path anomalies can cause misordering, but network routing policies or load balancers are primary causes (Chaudhuri, 2014).
4. Intrusion protection systems (IPS) detect network attacks, respond by blocking or resetting connections, and sit inline to monitor traffic (e). All three options a, b, and c, are correct attributes of IPSs (Scarfone & Mell, 2007).
5. Snort’s limitations include inability to protect against insider threats, encrypted traffic, and scalability issues in large networks (c, d, e). However, it can be centrally managed and deployed across multiple OSes, making options a and b less correct.
Part 3: Short Answers
1. Signature-based and anomaly-based IDS are both vital tools in network security. Similarities include their purpose to detect intrusions, use signature or behavioral models for detection, and require regular updates. However, they differ in detection approach: signature-based systems detect known threats through pattern matching, while anomaly-based systems identify deviations from normal behavior, which allows detection of unknown threats (Liao et al., 2013). Signature-based IDS are highly effective against known exploits but weak against zero-day attacks unless signatures are updated promptly. Anomaly-based systems can detect new attack patterns but often have higher false positive rates. Lastly, signature-based detection requires comprehensive signature databases, whereas anomaly detection depends on behavioral models that can adapt over time (Scarfone & Mell, 2007).
2. Primary approaches to writing signatures for network IDS include pattern matching and protocol anomaly detection. Pattern matching signatures look for specific byte sequences or signatures in network traffic, while protocol anomaly signatures focus on deviations from standard protocol behaviors. Pattern matching is more efficient and widely used, but protocol anomaly detection can identify more sophisticated attacks that do not match known signatures (Roesch, 1999). Generally, pattern matching is preferred due to its effectiveness and simplicity but combining both provides comprehensive coverage.
3. A preprocessor in Snort is a module that prepares network traffic for analysis by reconstructing sessions, defragmenting packets, and extracting relevant information. Examples include the portscan preprocessor, which detects port scans, and the stream4 preprocessor, which reassembles TCP streams for pattern matching across multiple packets. These pre-processors enhance detection accuracy by ensuring that the traffic analyzed is complete and representative of the actual transmitted data, reducing false positives and negatives (Roesch, 1999).
4. Attackers might evade detection by manipulating attack signatures, fragmenting malicious payloads, or inserting benign traffic to hide malicious behavior. Techniques include packet fragmentation to bypass signature detection or using encrypted channels to obscure payloads. Defense strategies include employing intrusion prevention systems with anti-evasion capabilities, implementing traffic normalization methods, and deploying HIDS to detect anomalies at hosts (Chaudhuri, 2014).
5. Host-based IDS (HIDS) monitors system activities such as file integrity, process monitoring, and log analysis, contrasting with network-based IDS (NIDS) which inspects network traffic. HIDS is particularly effective against insider threats, malicious modifications, and malware infections at the host level. It can detect activities like unauthorized file changes, privilege escalation, and malicious process execution (Scarfone & Mell, 2007).
Part 4: IDS Placement Recommendations
In GCI’s three-zone architecture, strategic IDS placement maximizes security coverage. In the untrusted outer zone, deploying a network-based IDS (NIDS) on the perimeter such as outside the external firewall captures inbound traffic, detecting probing and intrusion attempts. Given the hyper-scaling requirements, a high-speed inline IDS should be used here to prevent packet loss. Within the demilitarized zone (DMZ), deploying a signature-based NIDS and possibly an NIPS inline, monitors ingress traffic to critical services such as web and email servers. Placement should account for the traffic flow originating from the Internet and the internal network.
Between the DMZ and the trusted zone, deploying an internal NIDS inspects traffic moving into the core network. This detection layer catches lateral movements or malicious insiders. For the internal network, especially at the major servers and databases, host-based IDS should be installed on critical servers to monitor insider threats and data integrity.
Remote access points like VPN gateways or dial-up connections should also host IDS components, preferably host-based for granular monitoring, with supplementary network-based detection for anomalous activity. Leveraging centralized management tools for IDS configuration and alerts enhances visibility and operational efficiency. In summary, a layered deployment—perimeter NIDS/NIPS, internal NIDS, host-based IDS on critical servers, and endpoint monitoring—optimizes security posture while considering traffic load, encryption, and network architecture.
Additional Considerations
Deployment strategies must weigh factors such as network latency, bandwidth, false positive rates, and management overhead. Regular signature updates, real-time alerting, and proper tuning are crucial for effective operation. Given the critical nature of GCI’s operations, integrating intrusion detection with centralized security information and event management (SIEM) systems improves incident response capabilities.
References
- Chaudhuri, A. (2014). Evasion techniques in intrusion detection systems. International Journal of Computer Science & Engineering Technology, 5(4), 357-362.
- Liao, Y., Lin, S., & Lin, C. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
- Liu, A. X., Stolfo, S. J., & Wang, S. (2000). Toward integrating host and network intrusion detection. Proceedings of the 6th ACM Conference on Computer and Communications Security.
- Rekhter, Y. (1994). Internet Control Message Protocol. RFC 792, IETF.
- Roesch, M. (1999). Snort: Lightweight Intrusion Detection for Networks. Proceedings of the 13th USENIX Conference on System Administration.
- Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
- TCP/IP Guide. (2014). IP and ICMP Protocols. [Online]. Available at: https://www.tcpipguide.com
- Cybersecurity & Infrastructure Security Agency. (2021). Network Security Best Practices. CISA Publications.
- Marzullo, K., & Wood, J. (2014). Network security architecture: Design principles. IEEE Communications Surveys & Tutorials.
- Wang, K., & Stolfo, S. (2004). Anomalous Payload-Based Network Intrusion Detection. Recent Advances in Intrusion Detection, 203-222.