Should Companies Use Ids to Secure Their Networks?
By: Mike • Research Paper • 1,714 Words • December 17, 2009 • 1,019 Views
Essay title: Should Companies Use Ids to Secure Their Networks?
Organisations are more concerned about computer security, as most information now is stored in databases, and most systems are connected to the Internet. Use of Intrusion Detection Systems (IDS) is one of the factors companies should consider when planning their information security policy. IDS is important to protect sensitive information, to meet laws and regulations and to prevent economic loss, although in some cases IDS implementation is no economically viable. To be able to determine if an implementation of an IDS is necessary some factors must be taken into consideration, such as advantages and disadvantages, economy, laws and regulations.
The basics of Intrusion Detection (IDS) and Intrusion Prevention (IPS) systems are essential to determine. A definition of an IDS is “the tools, methods, and resources to help identify, assess and report unauthorized or unapproved network activity” (Endorf, Schultz and Mellander, 2004, p. 4). There are three types of IDS, each of which functions differently, namely host-based IDS (HIDS), network-based IDS (NIDS) and hybrids. HIDS is software that scans all resources on a host for activity, and then compares against known threats. NIDS analyzes network packets on a network segment and either compare against known threats or analyze for patterns of malicious behaviour. A hybrid IDS combines these two methods (Endorf, Schultz and Mellander, 2004, p. 7). Two different analysis methods are used; rule-based detection analyses based on signatures, like virus scanning, and profile-based detection looks for abnormal data patterns (Endorf, Schultz and Mellander, 2004, pp. 16-17). Larger companies with sensitive information to protect should use hybrids to protect the network and those servers containing sensitive information. Ortega (2006, p. 6) states that signature-based solutions will not work for defending sensitive information, because hackers knows how to conduct new types of attacks.
Furthermore, according to Grimes (2004, p. 301) there are two generations of IDS. First-generation is based on accurate detection to give early warnings to security managers. Second-generation IDS uses more features to improve the accuracy and decrease the cost, and also implement some prevention mechanisms. Second generation gives the most protection, but for small organisations first generation will be sufficient and easier to implement and maintain.
Another consideration is a good management system. Grimes (2004, p. 317) says that instead of many management systems it is better to implement one system that can manage all security products in an effective way. Systems combining IDS and firewall technology should also be considered, especially for smaller organisations that have to save costs and manpower (Grimes. 2004, p. 322). Moreover, types of attacks, such as attacks against network protocols or applications, denial of service, buffer overflows, malcrafted requests, file corruption, malformed network packets, or unauthorized program execution all can give unauthorized users access to confidential data and slow down or halt applications or network traffic (Grimes, 2004, p. 297).
Another important factor is, according to Lunch (2006, p. 40), threats from inside sources, normally former employees with technical knowledge of the firms network, or currently employees or contractors. Mostly they use simple methods to damage data or get information, but also some sophisticated methods are utilized. More than 50 percent of the attacks are conducted by insiders, so focus must be on protecting servers, more then the network.
Having looked at the basics of IDS it is necessary to consider the benefits and disadvantages. Advantages, such as logging network and host activity, analysis to use in forensics or criminal prosecution and restricting malevolent activity (Endorf, Schultz and Mellander, 2004, p. 14), as well as detecting hackers and quantifying attacks (Endorf, Schultz and Mellander, 2004, p. 20), are immense. There are also some disadvantages. According to Grimes (2004, p. 301) IDS cannot stop misuse, when unauthorized users use legal usernames and passwords or human errors from legal users. Also, generation of false positives makes it difficult for security managers to analyse alarms. Additionally, IDS reacts to threats and normally do not prevent damage, and it require full time monitoring (Endorf, Schultz and Mellander, 2004, p. 20). The most important is to be able to log and analyse incidents that might be attacks, to prevent sensitive data from being enabled for misuse, and to avoid damage to the network and servers. Security managers must have enough skills to configure and maintain IDS software to minimise the disadvantages and to analyse alarms effectively.
Economic considerations are another important factor. An IDS is expensive to acquire, configure and maintain