by a virus that is using the local mail server to
send spam, or a buggy Transmission Control Protocol
(TCP) stack in an Operating System (OS) that is in-
correctly fragmenting packets are a few examples of
possible intrusions.
IDSs are usually divided into two major cat-
egories, Host-based Intrusion Detection Systems
(HIDSs) and Network-based Intrusion Detection
Systems (NIDSs) (Singh, 2005). This paper focuses
on NIDS.
3 CONVENTIONAL IDS
PLACEMENT
IDS placement is one of the most important aspects
in the design of a secure network infrastructure. The
balance between monitoring coverage and resources
allocated is not an easy subject. This is specially true
when dealing with network-based IDS. For HIDSs,
the decision is relatively easier. Host-based IDS
should, usually, be placed on the hosts that provide
services crucial to the organisation.
The next subsections discuss the rationale behind
the design of the proposed solution. Starting from
small and rather simplistic networks and building up
to large and more complex networks.
3.1 Basic Network Setups
Usually small to medium-sized networks use a setup
consisting of a central switch connecting the gate-
way and other computers/segments. Instead of the
switch hardware, there might be an ethernet hub. Us-
ing a shared-medium also implies that all devices con-
nected to the hub will listen to all the networks traffic
that flows through it. In this scenario an IDS may sim-
ply be connected to the hub to be able to monitor the
entire network (assuming that there are no switches
on either segments). This scenario is, however, rather
simplistic.
When using a network switch, packets arriving in
one port are sent to the port where the packet’s target
might be found. In this scenario, simply connecting a
NIDS to a port on the switch won’t suffice, since all
traffic routed to the other ports won’t be monitored,
namely the traffic going to and from the gateway.
There are mainly three ways that allow one to use
a NIDS to monitor traffic leaving and entering the net-
work. Note that, in this section, it is assumed that
the network is trusted (which is generally the case for
small to medium sized networks), and therefore mon-
itoring traffic between network devices is not neces-
sary.
Hubs Due to its properties, using a hub between the
switch and the gateway allows all incoming and
outgoing traffic to be copied off to the IDS. This
is a simple and inexpensive way to go about solv-
ing this problem. However hubs can easily de-
grade network performance, therefore this solu-
tion is presented merely as an example.
Taps The tap solution is very similar to the hub. A
network tap is a hardware device which provides a
way to access the data flowing across a link. Taps
have at least three ports; the A and B port are used
to establish the connection between the two net-
work segments; the remaining ports, also called
monitor ports, are used to connect the IDS. One
important aspect to note, is that if the network link
is an 100 mbps full-duplex link, then the aggre-
gate traffic comprising of the traffic in both direc-
tions would be 200 mbps. This is a problem if the
tap only has one monitor port. In these cases, taps
usually have two ports that monitor each direction
of the traffic; the IDS can use channel bonding to
monitor all traffic. Furthermore, taps don’t inter-
fere with the communication link between the two
segments. Also, good taps are fault tolerant, the
connection between ports A and B is hardwired
in, which means that in case of a power failure the
communication link between the two connected
segments will not be broken.
Port Mirroring This solution depends on the switch
capabilities, namely if port mirroring is an avail-
able feature. It consists on replicating data from
one or more ports onto a single port, referred as
the monitoring port. This feature is also known
as: Monitoring Port, Spanning Port, Switch Port
Analyzer (SPAN) port and Link Mode port. In
this setup the switch can be configured to copy the
traffic passing through the port where the gateway
is connected, to the monitoring port. Both direc-
tions (TX and RX) of the traffic are copied, thus
achieving the same monitoring capabilities of the
previous solutions.
3.2 Medium and Large Network
In large networks, IDS placement is a much more
complex task, specially if the network is a public or
easily accessible at the physical level (such as Uni-
versities, e.g.). There are several hundred of installed
workstations, various points where laptops can be
connected to the network and, more recently, wire-
less access points for users to connect their laptops or
Personal Digital Assistants (PDAs).
With this scenario, simply monitoring the Inter-
net connection is not enough, attacks perpetrated by
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
103