Intrusion Prevention - CompTIA Security+ SY0-701 - 3.2

Intrusion Prevention - CompTIA Security+ SY0-701 - 3.2

Intrusion Prevention Systems Explained

Overview of Intrusion Prevention Systems (IPS)

  • An Intrusion Prevention System (IPS) monitors network traffic in real-time to identify and block potential threats or exploits.
  • IPS can detect known vulnerabilities, such as operating system exploits or application vulnerabilities, as well as generic issues like buffer overflows and SQL injections.

Comparison with Intrusion Detection Systems (IDS)

  • Unlike an Intrusion Detection System (IDS), which only alerts about vulnerabilities without blocking them, an IPS actively prevents harmful traffic from entering the network.
  • The primary function of an IPS is to ensure that malicious data does not compromise network security by blocking it immediately upon detection.

Fail-Safe Mechanisms in Security Devices

  • Security devices like IPS can fail due to power loss, hardware issues, or software bugs; their configuration determines how they handle failures.
  • Fail-open: If the device fails, traffic continues flowing but without security checks. This keeps the network operational but unprotected.
  • Fail-closed: A failure results in severed connections and no communication through that link, which may be undesirable for most networks.

Inline vs Passive Monitoring Configurations

Inline Configuration

  • In an inline setup, the IPS is placed between a firewall and a core switch to actively monitor all incoming traffic for legitimacy before allowing it through.
  • Active monitoring is often preferred because it allows immediate identification and blocking of potential attacks before they reach critical parts of the network.

Passive Monitoring

  • Organizations may opt for passive monitoring if they are concerned about potential downtime caused by active systems or overly aggressive blocking of legitimate traffic. In this case:
  • Traffic flows normally while a copy is sent to the IPS for analysis without interrupting communication between devices on the switch.
  • This method limits the ability of the IPS to block threats in real-time since it's not inline with regular communications; thus it's often referred to as IDS design despite using an IPS technology.

Traffic Evaluation Process

  • During active monitoring:
  • Traffic passes through a firewall and then through the IPS where it’s evaluated.
  • Legitimate traffic proceeds to the core switch while potentially malicious traffic gets blocked immediately by the IPS.

Passive Monitoring Techniques

  • For passive monitoring setups:
  • Methods such as port mirroring (SPAN) or physical network taps are used to duplicate traffic for analysis without affecting normal operations.
Playlists: Page 3
Video description

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer’s Course Notes: https://professormesser.link/701notes - - - - - Intrusion prevention can be a useful method of blocking attacks against known vulnerabilities. In this video, you'll learn about IPS failure modes, device connections, and differences between active and passive monitoring. - - - - - Subscribe to get the latest videos: https://professormesser.link/yt Calendar of live events: https://www.professormesser.com/calendar/ FOLLOW PROFESSOR MESSER: Professor Messer official website: https://www.professormesser.com/ Twitter: https://www.professormesser.com/twitter Facebook: https://www.professormesser.com/facebook Instagram: https://www.professormesser.com/instagram LinkedIn: https://www.professormesser.com/linkedin