Concepts

This topic describes how the intrusion detection system works.

Intrusion detection uses the idspolicy.conf file that contains a set of policies for intrusion events. Each policy has an associated condition and action, but there might be more than one condition associated with the same action. The TCP/IP stack reports the most common potential intrusion events and audits them, so that you can write an application to analyze the data and report to the security administrator if intrusions are likely to be underway. The following diagram shows how the intrusion detection function works.


Intrusion detection system
  1. You edit the idspolicy.conf file to detect specific types of intrusions, and then you start the QoS server.
  2. The QoS policy agent reads the intrusion detection policy in the idspolicy.conf file.
  3. The QoS policy agent sends a message with machine instructions to the QoS manager.
  4. The QoS manager interprets the machine instructions and sends them to the intrusion detection system inside the TCP/IP stack. The TCP/IP stack manages outbound traffic and inbound traffic in the network, and routes requests to other computers in the network.
  5. The intrusion detection system creates the policies in the port table. The port table entries represent ports 0 through port 65 535. For example, port 0, which contains conditions that apply to all ports, points to intrusion condition 1 which points to action 1. Similarly, port 1 points to condition 2 which points to action 2. Port 1 also points to condition 3 which points to action 1, and so on.
  6. When the TCP/IP stack detects an intrusion, it looks for matching conditions in the port table and executes the specific action, for example, creating an IM auditing record or system statistics.
  7. The system creates an IM audit record which describes the type of intrusion event.
  8. The system administrator analyzes the IM audit record to determine which security actions to take, such as closing off the port from where the intrusion originated.