Intruders

ALOKKUMAR1237 827 views 14 slides Nov 25, 2018
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

what is intruders in network security


Slide Content

Intruders Created by alok kumar

What is intruders:- An intruder is an individual or software program that enters a computer system without authorization. An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality.

Example:- a person who enters a building, grounds, etc, without permission. someone who enters a place without permission in order to commit a crime.

Types of intruder:- 1.Masquerader 2.Misfeasor 3.Clandestine user

1.Masquerader An individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. The masquerader is likely to be an outsider. For ex:- A party or assembly of people wearing masks, and amusing themselves with dancing, conversation, or other diversions.

2. Misfeasor A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges. the misfeasor generally is an insider. For ex:- Any person who works in it companies , sents the data of company through email or others sources to friends or family members without permission of company. Called misfeasor .

3. Clandestine user An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. The clandestine user can be either an outsider or an insider For ex:- if A is the Supervisor of B then B try to steal and use the credentials of their supervisor.

Intrusion techniques The objective of the intruder is to gain access to a system . Generally, this requires the intruder to acquire information that should have been protected. In some cases, this information is in the form of a user password. With knowledge of some other user's password, an intruder can log in to a system and exercise all the privileges accorded to the legitimate user. The password file can be protected in one of two ways-

One-way function a one-way transformation in which the password is used to generate a key for the one-way function and in which a fixed-length output is produced.

Access control Access to the password file is limited to one or a very few accounts

Intrusion Detection If an intrusion is detected quickly enough, the intruder can be identified and ejected from the system before any damage is done or any data are compromised. Even if the detection is not sufficiently timely to preempt the intruder, the sooner that the intrusion is detected, the less the amount of damage and the more quickly that recovery can be achieved.

Audit Records Native audit records : Virtually all multiuser operating systems include accounting software that collects information on user activity. The advantage of using this information is that no additional collection software is needed. The disadvantage is that the native audit records may not contain the needed information or may not contain it in a convenient form

Detection-specific audit records A collection facility can be implemented that generates audit records containing only that information required by the intrusion detection system. One advantage of such an approach is that it could be made vendor independent and ported to a variety of systems. The disadvantage is the extra overhead involved in having, in effect, two accounting packages running on a machine

. Thank you
Tags