© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
to be implemented on the IPS to block similar future attacks. The outcome is a
multi-layered approach to monitoring network traffic passing through the boundary
of a network or subnetwork.
The main intent is to have the IPS block traffic known to be unnecessary or
malicious, while the IDS remains sensitive alerting on traffic that may be difficult to
categorize without risking termination of legitimate communication. Conceptually,
the IPS is tuned somewhat conservatively and the IDS has a more aggressive tuning.
The IDS also provides a checks and balances of its respective IPS.
Since the rules
implemented in the IPS also exist in the IDS, if the IPS fails the IDS will continue
monitoring. If the IDS suddenly sends numerous alerts the IPS is most likely in fail-
over mode or has witnessed a system crash. Without a layered approach,
traffic
would pass through the network unmonitored until the IPS was brought online again.
As shown in figures 5 and 6, the IPS is deployed on the external side of the
router or network edge. This allows the IPS to drop packets prior to them hitting the
router and prevents the router from having to process extraneous packets thus
lightening the load on the routers processor(s). It also provides a means for the
analyst to research traffic “in the wild”, as well as seeing any probes and scans
coming from external systems. If a brute force attack is posed against the IPS, the
router avoids having to deal with such nonsense as the IPS actively drops the attack
traffic on the floor. Unsuccessful network reconnaissance attempts may be fed into
a heuristic of other security controls. Perhaps the organization's competition is in
Nicholas Pappas
25
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies