107 lines
7.6 KiB
HTML
107 lines
7.6 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Intrusion detection" />
|
|
<meta name="abstract" content="Intrusion detection involves gathering information about unauthorized access attempts and attacks coming in over the TCP/IP network. Security administrators can analyze the auditing records that intrusion detection provides to secure the iSeries network from these types of attacks." />
|
|
<meta name="description" content="Intrusion detection involves gathering information about unauthorized access attempts and attacks coming in over the TCP/IP network. Security administrators can analyze the auditing records that intrusion detection provides to secure the iSeries network from these types of attacks." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubwhatnew.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubprintthis.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubconcepts.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubterms.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubsetup.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubmanage.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubaudit.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubanalyze.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaubrelated.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="rzaubkickoff" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Intrusion detection</title>
|
|
</head>
|
|
<body id="rzaubkickoff"><a name="rzaubkickoff"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Intrusion detection</h1>
|
|
<div><p>Intrusion detection involves gathering information about unauthorized
|
|
access attempts and attacks coming in over the TCP/IP network. Security administrators
|
|
can analyze the auditing records that intrusion detection provides to secure
|
|
the iSeries™ network
|
|
from these types of attacks. </p>
|
|
<p id="rzaubkickoff__ids1"><a name="rzaubkickoff__ids1"><!-- --></a>Intrusion encompasses many undesirable activities such as information
|
|
theft and denial of service attacks. The objective of an intrusion may be
|
|
to acquire information that a person is not authorized to have (information
|
|
theft). The objective may be to cause a business harm by rendering a network,
|
|
system, or application unusable (denial of service), or it may be to gain
|
|
unauthorized use of a system as a means for further intrusions elsewhere.
|
|
Most intrusions follow a pattern of information gathering, attempted access,
|
|
and then destructive attacks. Some attacks can be detected and neutralized
|
|
by the target system. Other attacks cannot be effectively neutralized by the
|
|
target system. Most of the attacks also make use of <dfn class="term">spoofed</dfn> packets,
|
|
which are not easily traceable to their true origin. Many attacks make use
|
|
of unwitting accomplices, which are machines or networks that are used without
|
|
authorization to hide the identity of the attacker. For these reasons, a vital
|
|
part of intrusion detection is gathering information, detecting access attempts,
|
|
and attack behaviors.</p>
|
|
<div class="p" id="rzaubkickoff__ids2"><a name="rzaubkickoff__ids2"><!-- --></a>You can create an intrusion detection policy that audits suspicious
|
|
intrusion events that come in through the TCP/IP network. Examples of problems
|
|
that the intrusion detection function looks for includes:<ul><li>Denial of service attacks</li>
|
|
<li>Port scans</li>
|
|
<li>Malformed packets</li>
|
|
<li>Internet protocol (IP) fragments</li>
|
|
<li>Restricted IP options and protocols</li>
|
|
<li>Internet Control Message Protocol (ICMP) redirect messages</li>
|
|
<li>Perpetual echo attacks on User Datagram Protocol (UDP) port 7 (the echo
|
|
port)</li>
|
|
</ul>
|
|
</div>
|
|
<p>You also can write an application to analyze the auditing data and report
|
|
to the security administrator if TCP/IP intrusions are likely to be underway.</p>
|
|
<div class="important" id="rzaubkickoff__ids3"><a name="rzaubkickoff__ids3"><!-- --></a><span class="importanttitle">Important:</span> The term <dfn class="term">intrusion detection</dfn> is
|
|
used two ways in the iSeries documentation. In the first sense, intrusion
|
|
detection refers to the prevention and detection of security exposures. For
|
|
example, a hacker might be trying to break into the system using an invalid
|
|
user ID, or an inexperienced user with too much authority might be altering
|
|
important objects in system libraries. In the second sense, intrusion detection
|
|
refers to the new intrusion detection function that uses policies to monitor
|
|
suspicious traffic on the system.</div>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzaubwhatnew.htm">What's new for V5R4</a></strong><br />
|
|
The entire intrusion detection topic is new in V5R4.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubprintthis.htm">Printable PDF</a></strong><br />
|
|
Use this to view and print a PDF of this information.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubconcepts.htm">Concepts</a></strong><br />
|
|
This topic describes how the intrusion detection system works.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubterms.htm">Terminology</a></strong><br />
|
|
This topic defines intrusion detection terms.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubsetup.htm">Set up a new intrusion detection policy</a></strong><br />
|
|
Learn how to set up an intrusion detection policy for the first time.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubmanage.htm">Manage the intrusion detection policy file</a></strong><br />
|
|
You can configure an intrusion detection program to send e-mail to a system administrator to alert them to suspicious events and provide suggestions as to what action to take.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubaudit.htm">Audit intrusion detection activities</a></strong><br />
|
|
Learn how to audit intrusion detection activities. If the intrusion detection system (IDS) flags a suspicious event, it writes an IM audit record.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubanalyze.htm">Analyze the auditing data</a></strong><br />
|
|
Learn how to analyze the auditing data for intrusion detection activities, and obtain reference information about the fields in the IM audit record.</li>
|
|
<li class="ulchildlink"><strong><a href="rzaubrelated.htm">Related information for intrusion detection</a></strong><br />
|
|
Listed here are the product manuals and IBM<sup>®</sup> Redbooks™ (in PDF format), Web sites,
|
|
and information center topics that relate to the intrusion detection topic.
|
|
You can view or print any of the PDFs.</li>
|
|
</ul>
|
|
</div>
|
|
</body>
|
|
</html> |