Intrusion
• intruders, they try to intrude into the privacy of a
  network.
• Whether the network itself is private (e.g. a Local
  Area Network) or public (the Internet) does not
  matter.
• What matters is the intent of the attacker, of trying
  to intrude. It is generally said that the two most
  widely known threats to security are intruders and
  viruses
• Masquerader:
• A user who does not have the authority to use a
  computer, but penetrates into a system to access a
  legitimate user’s account is called as a masquerader.
• It is generally an external user.
• Misfeasor: There are two possible cases for an internal
user to be called as a misfeasor:
• A legitimate user, who does not have access to some
  applications, data or resources accesses them.
• A legitimate user, who has access to some applications,
  data or resources misuses these privileges.
• Clandestine user: An internal or external user who
  tries to work using the privileges of a supervisor
  user to avoid auditing information being captured
  and recorded is called as a clandestine user.
Some of the popularly known methods of password guessing are
as follows:
1. Try all possible short password combinations (2-3
characters).
2. Collect information about users, such as their full name,
names of family members, their hobbies, etc.
3. Try default passwords that are provided by the supplier of a
software product (e.g. Oracle comes with scott as the user
name and tiger as the password).
4. Try words that people choose as passwords most often.
Hacker bulletin boards maintain these lists. Also, try words
from dictionary.
5. Try using phone numbers, dates of birth, social security
numbers, bank account numbers, etc.
6. Tap the communication line between a user and the host
network.
7. Use a Trojan Horse.
8. Try numbers on the vehicle license plates.
               Audit Records
• Audit records are used to record information about
  the actions of users. Traces of illegitimate user
  actions can be found in these records, so as to
  detect intrusions so as to take appropriate actions.
 • Native audit records: All multi-user operating
   systems have accounting software built-in. This
   software records information about all user
   actions.
• Detection-specific audit records: This type of audit
records facility collects information specific only to
intrusion detection. This is more focused, but may
duplicate information.
                Intrusion Detection
• Intrusion prevention is almost impossible to achieve at all times.
  Hence, more focus is on intrusion detection.
• Following factors motivate efforts on intrusion detection:
• (a) The sooner we are able to detect an intrusion, the quicker we
  can act. The hope of recovering
• from attacks and losses is directly proportional to how quickly we
  are able to detect an intrusion.
• (b) Intrusion detection can help collect more information about
  intrusions, strengthening the intrusion prevention methods.
• (c) Intrusion detection systems can act as good deterrents to
  intruders.
• Intrusion detection mechanisms, also known as Intrusion
  Detection Systems (IDS) are classified into two categories:
  Statistical anomaly detection and Rule-based detection. This is
  shown in Fig. 9.50.
• Statistical anomaly detection: In this type, behavior of users over
  time is captured as statistical data and processed. Rules are
  applied to test whether the user behavior was legitimate or not.
• Rule-based detection: A set of rules is applied to
  see if a given behavior is suspicious enough to be
  classified as an attempt to intrude.