Thanks to
this
thread, I've taken a revamped interest in network security. It's always seemed to me to be one of those things that most books and courses just don't cover very well. I picked up the Hacking Exposed 4th Ed. as suggested by that book, and it seems to be exactly what I'm looking for. When taking a defensive position, I always try to go the Art of War route and know my enemy. Theory is great, but if I don't know the tricks as well as the bad guys, I'm at a serious disadvantage, and alot of authors seem to be.... reluctant to tell you how to actually break a system, and I simply don't have time to scour the web for my own reading material or figure it out myself. So the Hacking Exposed is a nice primer that seems to focus me in exactly the direction I need to go.
Now, for my newbie question..... I'm planning on attacking my home network as a learning tool. I've always thought it was pretty secure, but I'm guessing I'm going to be enlightened on that point of view shortly. Now my question comes from the fact that, until I got hold of Hacking Exposed, I honestly had no no idea what an IDS was actually supposed to do. Now I see that it sits and sniffs packets for suspicious traffic. Ok, cool.
Now, I obviously can't afford a hardware IDS. However, I have a little box that I can run Linux on, so snort seems to be the way I'm going to have to go. My question is basically this:
Does the NIDS have to be running on the same box/device as the entry point to the network?
Right now, I'm using a hardware (Cisco) router as my interface to the outside world. I've got it locked down pretty well via ACL's, and it's got the firewall/ipsec ios subset. The problem is, as I see it, is that my network is fully switched. So if I just toss snort on a linux box sitting on the network, it's not going to see the traffic.
Now, I suppose that I could have a copy of some form of IDS software running on each host that's accessible from the outside world, but that seems to be a huge duplication of effort, and I don't see that solution scaling very well in the real world. I'd really rather not replace the cisco router with a linux box.
Anyway, basically my question boils down to, in a real world setting, where do folks deploy an IDS? What's the most effective method for catching suspicious incoming traffic?