Intrusion Detection Flashcards

1
Q

Are either individuals, usually working as insiders, or members of a larger group of outsider attackers, who are motivated by social or political causes

Aim of their attacks is often to promote and publicize their cause typically through:
Website defacement
DoS attacks
theft and distribution of data that results in negative publicity or compromise of their targets.

A

Activists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Individuals or members of an organized crime group with a goal of financial reward

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Groups of hackers sponsored by governments to conduct espionage or sabotage activities

A

State-Sponsored Organizations (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hackers with minimal technical skill who primarily use existing attack toolkits

A

Apprentice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hackers with sufficient technical skills to modify and extend attack toolkits to use newly discovered, or purchased, vulnerabilities

A

Journeyman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hackers with high-level technical skills capable of discovering brand new categories of vulnerabilities

A

Master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Intruder Skill Levels?

A

Apprentice
Journeyman
Master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Intruder Behavior

A
Target acquisition and information gathering
Initial access
Privilege escalation
Information gathering or system exploit 
Maintaining access
Covering tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.

A

Security Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.

A

Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three logical components of the Intrusion Detection System (IDS)

A
  • Sensors - collect data
  • Analyzers - determine if intrusion has occurred
  • User interface - view output or control system behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitors the characteristics of

a single host for suspicious activity

A

Host-based IDS (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Monitors network traffic and

analyzes network, transport, and application protocols to identify suspicious activity

A

Network-based IDS (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Combines information from a number of sensors, often both
host and network based, in a central analyzer that is able to
better identify and respond to intrusion activity

A

Distributed or hybrid IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Involves the collection of data relating to the behavior of legitimate users over a period of time
Current observed behavior is analyzed to determine whether this behavior is that of a legitimate user or that of an intruder

A

Anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are analysis approaches?

A

Anomaly detection

Signature/Heuristic detection

17
Q

Uses a set of known malicious data patterns or attack rules that are compared with current behavior
Also known as misuse detection
Can only identify known attacks for which it has patterns or rules

A

Signature/Heuristic detection

18
Q

What are the classification approaches used for Anomaly Detection

A

Statistical
Knowledge based
Machine learning

19
Q

Analysis of the observed behavior using univariate, multivariate, or time-series models of observed metrics

A

Statistical

20
Q

Approaches use an expert system that classifies observed behavior according to a set of rules that model legitimate behavior

A

Knowledge based

21
Q

Approaches automatically determine a suitable classification model from the training data using data mining techniques

A

Machine learning