V dobe, keď sa počet a zložitosť kybernetických hrozieb neustále vyvíja, sa bezpečnosť siete stala prvoradou. Systémy na detekciu narušenia siete (NIDS) zohrávajú kľúčovú úlohu pri zaisťovaní bezpečnosti siete. Tieto systémy sú navrhnuté tak, aby zisťovali škodlivú sieťovú prevádzku, neobvyklé správanie a pokusy o vniknutie do počítačových systémov a upozorňovali správcov, keď sa zistí vniknutie alebo neobvyklé správanie. Štúdium sieťovej bezpečnosti zahŕňa získanie vedomostí o monitorovaní sieťovej prevádzky a pochopenie najbežnejších sieťových útokov, ako sú odmietnutie služby (DoS), distribuované odmietnutie služby (DDoS), prieskum, jej systémov a krádež informácií Okrem toho je nevyhnutné porozumieť technikám detekcie narušenia vrátane metód založených na podpisoch a anomáliách.
Na konci tohto modulu by mal študent vedieť:
Porozumieť bezpečnostnej úlohe NIDS v sieťach.
Porozumieť nástrojom na monitorovanie sieťovej prevádzky.
Identifikovať a kategorizovať najbežnejšie sieťové útoky, ako sú DoS, DdoS, MitM, Prieskumný (Reconnaissance) útok, Krádež informácií.
Porozumieť technikám detekcie NIDS vrátane analýz založených na podpisoch, anomáliách a správaní.
- Ozkan-Okay, et. al. A comprehensive systematic literature review on intrusion detection systems. IEEE Access, 9, 157727-157760, 2022.
- Martins, I., et. al. Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems, 133, 95-113, 2022.
- Ahmad, Z., et. al. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), 4150, 2021.
- Open Source Security Event Correlator (OSSEC), https://www.ossec.net/ [Accessed 03/07/2024]
- Tripwire, https://www.tripwire.com/ [Accessed 03/07/2024]
- Wazuh, https://wazuh.com/ [Accessed 03/07/2024]
- SolarWinds Security Event Manager, https://www.solarwinds.com/security-event-manager [Accessed 03/07/2024]
- Snort, https://www.snort.org/ [Accessed 03/07/2024]
- Suricata, https://suricata.io/ [Accessed 03/07/2024]
- Zeek, https://zeek.org/ [Accessed 03/07/2024]
- Cisco NetFlow, https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html [Accessed 03/07/2024]
- sflow, https://github.com/sflow/sflowtool [Accessed 03/07/2024]
- IPFIX, https://github.com/topics/ipfix [Accessed 03/07/2024]
- Wireshark, https://www.wireshark.org/ [Accessed 03/07/2024]
- TCPDUMP, https://www.tcpdump.org/ [Accessed 03/07/2024]
- Ettercap, https://www.ettercap-project.org/ [Accessed 03/07/2024]
- PRTG Network Monitor, https://www.paessler.com/prtg [Accessed 03/07/2024]
- ManageEngine OpManager, https://www.manageengine.com/ca/network-monitoring/ [Accessed 03/07/2024]
- SolarWinds Network Performance Monitor, https://www.solarwinds.com/engineers-toolset/use-cases/network-monitoring-tools [Accessed 03/07/2024]
- Cisco Secure Network Analytics, https://www.cisco.com/site/us/en/products/security/security-analytics/secure-network-analytics/index.html [Accessed 03/07/2024]
- McAfee Network Threat Behavior Analysis, https://www.mcafee.com/ [Accessed 03/07/2024]
- Darktrace, https://darktrace.com/ [Accessed 03/07/2024]
- New Relic APM, https://newrelic.com/platform/application-monitoring [Accessed 03/07/2024]
- AppDynamics, https://www.appdynamics.com/ [Accessed 03/07/2024]
- Stackify Retrace, https://stackify.com/retrace/ [Accessed 03/07/2024]
- Syed, N. F., Baig, Z., Ibrahim, A., & Valli, C. (2020). Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, 4(4), 482-503.
- de Neira, A. B., Kantarci, B., & Nogueira, M. (2023). Distributed denial of service attack prediction: Challenges, open issues and opportunities. Computer Networks, 222, 109553.
- Mallik, A., Ahsan, A., Shahadat, M. M. Z., & Tsou, J. C. (2019). Understanding Man-in-the-middle-attack through Survey of Literature. Indonesian Journal of Computing, Engineering, and Design, 1(1), 44-56.
- Roy, S., Sharmin, N., Acosta, J. C., Kiekintveld, C., & Laszka, A. (2022). Survey and taxonomy of adversarial reconnaissance techniques. ACM Computing Surveys, 55(6), 1-38.
- Haddon, D. A. (2020). Attack Vectors and the Challenge of Preventing Data Theft. In Cyber Security Practitioner’s Guide (pp. 1-50).
- DarkTrace, https://darktrace.com/es [Accessed 03/07/2024]