• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

Week 4 Blog

Wireshark and Packet Capture provided us with a view into network traffic and how much of it exists.  How can a Security Analyst effectively use wireshark to detect attacks in real time?  IDSs are poised to alleviate those short comings,  A properly deployed IDS can provide a secure measure to detect network attacks based on their signature.  The short comings of IDSs are that, it can really only help you against known attacks.  Anything that is new is still hard to detect.  Until someone creates a signature pattern to look for.

In the coming weeks, we will discuss IDSs as the technology.  We will also attempt to install Snort IDS on a PC.  And then we will make an effort to write some signature for simple network patterns to see if they can provide alerts on that type of behaviour.

Reader Interactions

Comments

  1. Vaibhav Shukla says

    July 2, 2017 at 5:27 pm

    Even I tried reading the CISSP book to know what is more industry based preference either Signature or anamoly based.But actually there is no perfect answer to it and it specifically mentions that it depends on organization culture and regulations under which it is working.There is no ids which can be ultimate superior and also carry its own advantage and disadvantages

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in