intrusion detection system n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Intrusion Detection System PowerPoint Presentation
Download Presentation
Intrusion Detection System

Loading in 2 Seconds...

play fullscreen
1 / 99

Intrusion Detection System - PowerPoint PPT Presentation


  • 270 Views
  • Uploaded on

Intrusion Detection System. SY4003FP Intrusion & Access Control. Prepared by Sandy Tay. Content. Introduction to Intrusion Detection System (IDS) 4 operations of IDS IDS terminologies Features of IDS Type of Detectors. What is Intrusion Detection System (IDS).

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Intrusion Detection System


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Intrusion Detection System SY4003FPIntrusion & Access Control Prepared by Sandy Tay Intrusion & Access Control

    2. Content • Introduction to Intrusion Detection System (IDS) • 4 operations of IDS • IDS terminologies • Features of IDS • Type of Detectors Intrusion & Access Control

    3. What is Intrusion Detection System (IDS) • A system that detects and alerts the presence of intruders into a protected area. • Consist of 3 major components: • Detection devices • Central processing device (control panel) • Alarm/ notification devices. • Key factors for IDS: • Accurate • Timely • Allow for assessment and verification of alarm conditions Intrusion & Access Control

    4. Limitations of Electronic Detection (IDS) • Can’t provide instant alarm verification. • Small area detection • Once the detectors are mounted, unable to adjust detection area • Relatively high number of false alarms Intrusion & Access Control

    5. IDS Operations • Detection • Analysis • Report • Response Intrusion & Access Control

    6. IDS Operations • Detection • A detection device senses an event • Any change in their normal state (NO or NC) causes the control panel to issue an alarm Infrared motion sensor Intrusion & Access Control

    7. IDS Operations • Analysis • Control Panel received information from detection device and respond when event occurs. 3 major parts of a control panel • Controller (password protection, history log ) • Alarm unit (drive the notification devices) • Communicator (with central monitoring station) Intrusion & Access Control

    8. IDS Operations • Report • Local Visual or Audible reporting devices • Visual (Strobe light) • Audible (Siren/ buzzer) • Local command and control center • Remote Central Monitoring System • User via mobile services (SMS/email) Local Remote Intrusion & Access Control

    9. IDS Operations • Response • Security officers • Police • Fire brigade, Civil Defence • Sprinkle system activated Intrusion & Access Control

    10. IDS Terminologies Intrusion & Access Control

    11. IDS Zones • Provides an exact and immediate location of the possible problem/ Danger • Zoning is required: • To identify the location of the intrusion. • To enable different types of action definition or security policy in different areas. • To enable partial alarming (of certain Zones). • For ease of maintenance and trouble shooting. Intrusion & Access Control

    12. IDS Zones Intrusion & Access Control

    13. Types of Zones Intrusion & Access Control

    14. Types of Zones Intrusion & Access Control

    15. Types of Special Zones Intrusion & Access Control

    16. Zone Names • Naming the zones is important to localize the area • Typical zone names: Intrusion & Access Control

    17. IDS components • Consists of Detection Devices, Control Panel and Signaling Devices Detection Devices Control Panel and Keypad Signaling Devices Glass Break Detector Indoor/ Outdoor Siren e.g. PowerMax Pro Motion Detector Intrusion & Access Control

    18. Features of an IDS • Detection Devices • Intrusions from outside • Intrusions from internal Door contact Motion sensors Smoke Detector Intrusion & Access Control

    19. Features of an IDS • Control Panel • Function • monitor the state of detection devices • respond when an event occurs • Feature • Store history of events • Operator control • turn the system on or off • identify the alarm state of the system • locates the zone or specific device causing an alarm condition • suspend an alarm condition • perform a system reset Intrusion & Access Control

    20. Features of an IDS • Control Panel Intrusion & Access Control

    21. Features of an IDS • Control Panel • Inputs Control • Controller decides if detector status should be translated into an alarm state. • Response Control • User can define how every event will be handled. • Control panel filters the alarms and transfers only the relevant ones • Outputs • Local alarm connects to either Siren, strobe light Intrusion & Access Control

    22. Features of an IDS • Modes of Alerting • Audio (horn, sirens, bells) • Illuminated devices (strobes) • Central station monitoring • Local directed monitoring through • IP • PSTN • GPRS; • GSM Intrusion & Access Control

    23. Types of IDS • Wired or Hard-wired (HIDS) • Wireless (WIDS) • Hybrid (HyIDS) • IP-enabled (IPIDS) Intrusion & Access Control

    24. Types of IDS • Which type of IDS suitable for a project depends on • the customer constraints • the environment of building Intrusion & Access Control

    25. Types of IDS • Wired or Hard-wired (HIDS) • System uses physical cables to connect all equipments used. • Acceptable for: • Smaller buildings where installation of cables is not a problem • Existing buildings where addition cables is not a problem • Lower cost (relative for equipments) Intrusion & Access Control

    26. Types of IDS • Wireless (WIDS) • Uses wireless technology to connect all the detecting devices to radio transmitters. • Examples of wireless technology • RFID, UHF, microwave, Bluetooth • Government of a country needs to regulate the different frequencies used for different purposes Intrusion & Access Control

    27. Types of IDS Wireless (WIDS) Power Supply Battery Saving mode After triggering the transmitter, it disarms itself Detector rearms itself automatically after 2 mins Repeater (Optional) Repeater and receiver use DC power supplies Battery Operated WirelessMotion Detector Receiver Wireless window sensor Protocol Intrusion & Access Control

    28. Types of IDS • Wireless (WIDS) • Data Protocol • 12- Bit Code • Enables sending of only the identify of the transmitter. (system code + channel code) • Only information is : alarm or low battery • Battery require to check every 6 months • 36-bit code • 24-bit for identify + 12-bit for supervision (alarm, battery status, tampering, inactivity, periodical test) Note: Selected system code ensures that the central control receiver can only respond to transmitters set to the same code Intrusion & Access Control

    29. Types of IDS Wireless (WIDS) Installation of Wireless IDS Points to consider Direct data transfer path among the equipment Area should be free from disturbances. Perform walk test with receiver and watch the red LED for reception. Flickers-> Constant disturbance. Remedy: Look for another area to install the receiver Light constantly Remedy: Do not install a wireless system. Propose alternative solution. Avoid direct sunlight on detectors and receivers Batteries in transmitters have to be changed periodically. Frequency of wireless devices must match the manufacturer of the control panel. Intrusion & Access Control

    30. Types of IDS Wireless (WIDS) 1) Receiver Location • Place receiver in the geographical center of the transmitters. • Place the receiver (and antenna) at least the height recommended in the installation instruction. • When 2 receivers are used, place them at least 3m (10 feet) apart. • Check signal is good from sensor to receiver. • Do not install the wireless receiver in close proximity to sources that may cause interferences Intrusion & Access Control

    31. Types of IDS Installation of WIDS (Receiver) Do not install the wireless receiver in close proximity to sources that may cause interferences Intrusion & Access Control

    32. Types of IDS Wireless (WIDS) 2) Repeater Location • Install a repeater where there is good communication between the transmitters and the receiver or other repeaters. • Mount repeater and antenna at least the height recommended in the instructor manual. • Install it near a 230VAC source (for the chargeable battery). Intrusion & Access Control

    33. Types of IDS Wireless (WIDS) 3) Transmitter Location • Perform the walk test to select best location for detection • if metal object is present, install transmitter at least 1m away from it. Intrusion & Access Control

    34. Types of IDS • Wireless (WIDS) Intrusion & Access Control

    35. Types of IDS • Hybrid (HyIDS) • Combine the better features of Wired and Wireless IDS. Intrusion & Access Control

    36. Types of IDS • IP-enabled(IP- IDS) • allows user to use the existing network infrastructure to deploy IP-devices • Low startup costs • User can monitor activity on site real time • Possible to integrate with CCTV and access control system. Intrusion & Access Control

    37. Types of IDS • IP-enabled(IP- IDS) • Benefits • Cost efficient • Flexible and scalable • Easy to integrate with other systems • Greater verification and response efficiency Intrusion & Access Control

    38. Alarm Monitoring Center • 2 types • Centralized • Decentralized Intrusion & Access Control

    39. Network IDS • Centralized IDS • Collects all data from the sensors to a Central management system for storage and processing Intrusion & Access Control

    40. Network IDS • Decentralized IDS • 1 or more devices that perform both the data gathering, processing and reporting functions of the IDS. • Best suited for smaller WLANs due to cost and management issues. Intrusion & Access Control

    41. Network IDS • Advantages Intrusion & Access Control

    42. designed to generate an alarm condition in response to a deliberate action by the users detects  intrusion,  equipment malfunction,  rate of temperature change  smoke  fire IDS Detectors Intrusion & Access Control

    43. IDS Detectors 1. Interior detectors Detect intrusion into a building or facility Indoor use. Less susceptible to false and nuisance alarms 2. Perimeter detectors respond to outside intruders crossing a boundary higher false alarm rate often require the use of two or more sensors for effective detect Intrusion & Access Control

    44. Detection Devices 1. Sensors Produce a signal in response to a stimulus within its detection zone. Detection method By: Infrared radiation Microwave radiation Ultrasonic frequencies, etc 2. Amplifying Unit To increase the signal received from the sensor Intrusion & Access Control

    45. Detection Devices 3. Relay The relay activates any device that produces an alarm 4. Output Terminal Wiring connection between the device and the electrical circuit to the control unit Intrusion & Access Control

    46. Detector Devices Features Light Emitting Diodes (LEDs) indicator The Tamper Switch Timer Anti Masking feature Intrusion & Access Control

    47. Detector Devices 1. Light Emitting Diodes (LEDs) indicator Test light that turns itself on every time the sensor detects movement. used for walk-test LED selector Walk-test LED Intrusion & Access Control

    48. Detector Devices 2. The Tamper Switch Detect attempts to remove some alarm components such as detector covers, switch covers 2 types of tamper switch: Internal tamper switch – detects cover removal External tamper switch – detects whole unit removal from the wall. Intrusion & Access Control

    49. Detector Devices 3. Timer Controls the amount of time an element will remain activated before turning itself OFF. Examples: The timing for the LED light remains ON. The amount of time an alarm sounds. The amount of time a light-controller alarm remains activated. Intrusion & Access Control

    50. Detector Devices 4. Anti-masking Effective protection from masking Cause detector to signal when there is attempt of masking. Technology used Short range active IR Detector sounds a short chirp every few minutes If the signal is sensed, possible masking condition is declared. Detector will emit an alert (visual, audio) until the trouble condition ends. Intrusion & Access Control