Page 1223 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1223

FIGURE 17.4 Intrusion prevention system


               In contrast, an active IDS that is not placed in line can check the
               activity only after it has reached the target. The active IDS can take
               steps to block an attack after it starts but cannot prevent it.

               An IPS can use knowledge-based detection and/or behavior-based
               detection, just as any other IDS. Additionally, it can log activity and
               provide notification to administrators just as an IDS would.




                             A current trend is the replacement of IDSs with IPSs.

                  Similarly, many appliances that include detection and prevention

                  capabilities focus their use on an IPS. Because an IPS is placed
                  inline with the traffic, it can inspect all traffic as it occurs.




               Specific Preventive Measures

               Although intrusion detection and prevention systems go a long way
               toward protecting networks, administrators typically implement
               additional security controls to protect their networks. The following
               sections describe several of these as additional preventive measures.



               Honeypots/Honeynets
               Honeypots are individual computers created as a trap for intruders. A

               honeynet is two or more networked honeypots used together to
               simulate a network. They look and act like legitimate systems, but they
               do not host data of any real value for an attacker. Administrators often
               configure honeypots with vulnerabilities to tempt intruders into
               attacking them. They may be unpatched or have security

               vulnerabilities that administrators purposely leave open. The goal is to
               grab the attention of intruders and keep the intruders away from the
               legitimate network that is hosting valuable resources. Legitimate users
               wouldn’t access the honeypot, so any access to a honeypot is most
               likely an unauthorized intruder.

               In addition to keeping the attacker away from a production
               environment, the honeypot gives administrators an opportunity to
   1218   1219   1220   1221   1222   1223   1224   1225   1226   1227   1228