Page 468 - StudyBook.pdf
P. 468

452    Chapter 7 • Topologies and IDS


             Figure 7.13 Establishing a VPN Tunnel to Access the Corporate Network
             from Home

                                                                             Your Network
                      ISP Network
                                                     Internet



                             Firewall                                  Firewall   VPN Server



                                                            VPN tunnel through the Internet from
                                Dial-up Connection to       your home computer to the corporate
                                    your ISP                intranet.  All communications are
                                                            secure and authentic.
                                          Your Home Computer
                       RAS Server



             Intrusion Detection

             Firewalls and other simple boundary devices lack some degree of intelligence when
             it comes to observing, recognizing, and identifying attack signatures that may be
             present in the traffic they monitor and the log files they collect.A successful secu-
             rity strategy requires many layers and components. One of these components is the
             IDS. Intrusion detection is an important piece of security in that it acts as a detec-
             tive control.As an example, consider a locked car in a parking lot. Locking the car
             is much like securing the network. It provides security but only deters attacks.
             What if someone breaks in the locked car, how would the driver detect this? In the
             world of automobile security that could be accomplished with an alarm system. In
             the computer world this is done with an IDS.Whereas other boundary devices may
             collect all the information necessary to detect (and often to foil) attacks that may
             be getting started or are already underway, they have not been programmed to
             inspect for and detect the kinds of traffic or network behavior patterns that match
             known attack signatures or that suggest potential unrecognized attacks may be
             incipient or in progress.
                 In a nutshell, the simplest way to define an IDS is to describe it as a specialized
             tool that knows how to read and interpret the contents of log files from sensors
             placed on the network, routers, firewalls, servers, and other network devices.
             Furthermore, an IDS often stores a database of known attack signatures and can
             compare patterns of activity, traffic, or behavior it sees in the logs it is monitoring



          www.syngress.com
   463   464   465   466   467   468   469   470   471   472   473