Network intrusion detection systems (NIDS) attempt to detect cyber attacks, malware, denial of service (DoS) attacks or port scans on a computer network or a computer itself. NIDS monitor network traffic and detect malicious activity by identifying suspicious patterns in incoming packets. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system.
Due to the sophistication of cyber threats and data breaches, implementing and maintaining network security, data security and information security requires a defense in depth approach. Organizations need to secure their networks with a combination of technologies and detection methods designed to combat multiple attack vectors, intrusion and compromise methods available to cyber criminals today.
It's no longer enough to rely on a simple security system and antivirus software that can protect against known attacks at the application layer.
A variety of tools and methodologies exist, however two common elements used to secure enterprise network configurations are the firewall and intrusion detection and intrusion prevention systems (IDS/IDPS). Firewalls control incoming and outgoing traffic based on rules and policies, acting as a barrier between secure and untrusted networks.
Inside the secure network, an IDS/IDPS detects suspicious activity to and from hosts and within traffic itself, taking proactive measures to log and block attacks.
The main difference between intrusion detection systems and intrusion prevention systems are that intrusion prevention systems are placed inline. This means they can actively prevent or block intrusions that are detected. IPS can send an alarm, drop malicious packets, reset a connection, block traffic from an offending IP address, correct cyclic redundancy check (CRC) errors, defragment packet streams, mitigate TCP sequencing issues and clean up unwanted transport and network layer options.
This post will focus on NIDS rather than host intrusion detection systems (HIDS) and intrusion prevention systems.
IDS/IDPS offerings can be split into two solutions: network intrusion detection systems (NIDS) and host intrusion detection systems (HIDS).
NIDS are strategically positioned at various points in the network to monitor incoming and outgoing traffic to and from networked devices. NIDS solutions offer sophisticated, real-time intrusion detection capabilities, consisting of an assembly of interoperating pieces: a standalone appliance, hardware sensors and software components are common. These work in concert to allow a wider range of network intrusion detection capabilities than HIDS solutions.
In contrast, HIDS solutions are installed on every computer's operating system to analyze and monitor traffic coming to and from the device in question. HIDS also track and monitor local file changes and potential alterations due to unauthorized access and/or compromise.
A comprehensive cyber security strategy will employ both NIDS and HIDS since each comes with distinct advantages and disadvantages.
For example, since HIDS are host-installed and have access to details such as registry settings, logs and other system information, they can make IP address attribution and digital forensics more accessible. However, resources are drawn from the host (e.g. the computer the HIDS is installed on) to power the HIDS and HIDS are reactive in nature and can only respond to an attack after it has occurred.
In contrast, NIDS are usually hardware installed on the network itself and don't tap into any underlying network devices for resources. The installation of NIDS tends to be simple too, simply drop them into the network to begin monitoring for suspicious traffic. However, NIDS are usually expensive and targeted at the enterprise user.
That said, there are a decent selection of free, open-source NIDS solutions available based on commodity hardware that offer comparable levels of security and protection as commercial NIDS offerings.
Before we can jump into what free NIDS offerings are available, another distinction must be made concerning how different types of NIDS detect intrusions.
NIDS can incorporate one or both types of intrusion detection: signature-based and anomaly-based.
A signature-based NIDS monitors network traffic for suspicious patterns in data packets, signatures of known network intrusions, to detect and remediate attacks and compromises.
This is achieved through the use of a database of known intrusion types and data patterns, allowing signature-based NIDS to quickly identify intrusions and initiate the appropriate course of action.
In contrast, anomaly-based NIDS use the baseline of the system in a normal state to track whether unusual or suspicious activity is occurring. This method takes time to set up, as baselining requires the NIDS to learn about your usage patterns, making it an organic, heuristic based approach to intrusion detection.
The benefit of anomaly-based NIDS is that it is more flexible and powerful than signature-based NIDS that require an intrusion type is on file to pattern match against.
For example, a newly discovered intrusion type or vulnerability may not yet to be listed on CVE, making it hard for the signature-based NIDS to detect it.
However, an anomaly-based NIDS could react immediately to the change in baseline.
In general, it's suggested to employ a defense in depth strategy because both have their pros and cons.
Signature-based approaches are faster, generate less false positives and don't require time for baselining. However, they are reactive in nature and are completely exposed to new cyber threats. as they rely on a database of preexisting intrusion signatures.
While anomaly-based NIDS are difficult to set up, configure and train, they can be effective against new and existing attack vectors because of their ability to baseline a system at each protocol stack.
Signature-based and anomaly-based NIDS have complementary strengths and should be used together.
Securing the enterprise these days doesn’t need to be a bank-breaking ordeal. The aforementioned free open source NIDS solutions are all competent offerings that offer industrial strength protection against intrusions and compromises, with many of the tools complementing each other when used in tandem. Furthermore, offerings like Security Onion have taken the legwork out of picking/choosing the appropriate tools by combining the most popular open source security tools into one unified solution stack, freely available and easy to install.