IDS mailing list archives
RE: Announcement: Alert Verification for Snort
From: "Andrew Hall" <andrew.hall () m5networks com au>
Date: Fri, 24 Oct 2003 11:19:04 +1000
I think what you are really after is to be found in a good security information management (SIM) tool. An IDS is good at what it does ... ie in raw detection of "events" ... by what ever means that is (string matching, heuristics, protocol anomaly etc) but as mentioned by others on the list the context is critical to determine if the event is really an "incident". And again, without context the priority of an incident can not be determined. Integration with a VA tool or passive fingerprinting is only a partial solution - and many IDS tools have been able to do that for a while now (either plugging in with Nessus - Snort, Dragon or their own proprietary VA scanner - ISS, Symantec). Yes, combining VA and IDS will drastically reduce the number of alerts to see on a console, but you will still suffer from false positives and false negatives. No externally probing or passively finger printing tool is going to be 100% accurate across your network. Accuracy drops even further if you are relying on the tool to determine specific versions of an application. The vast majority of remote exploits are highly version specific, and a VA tool is not going to give that level of reliable accuracy to determine if an "event" is really an attack likely to cause impact. Where passive finger printing and VA is better suited is in trying to determine attacks leaving your network - where you have no idea about that what is running on the other side of the world, but you are happy for the VA tool to make an educated guess as to whether it is apache or IIS running somewhere. The only machine on your network which knows exactly what software / versions etc is running and the time of attack AND the impact of an attack is the machine in the network which has received the attack. To determine if an attack is truly effective you need to correlate logs on actual hosts with the other sources of network information. Ie consider a buffer overflow attack to a web server. 1. External IDS pattern matches overflow to web server 2. Firewall logs an accept 3. Inner (different vendor) IDS pattern matches overflow to web server 4. Syslog on web server shows apache to has restarted 5. Host based IDS on web server says whole bunch of noops recieved 5. Asset register shows that this web server is the most important asset in the company Each line item above means nothing in itself ... but drawn together they show a true critical incident in your network. So why not just rely on host based IDS? Because each of the above mentioned security tools in a network will detect different things in different manners. What one misses the other may pick up - security in depth. They also provide a better context to the ultimate event - ie you can trace the path of the attack back through your network, and you can correlate that particular attack characteristics (attack type, source IP, etc) across your other network devices. Finally, there is the good old debate of why an IDS is even being deployed in a network. I argue that an IDS has three main purposes all of which are essential; - Real time event notification - Trending analysis - Forensics If you want "real time" event notification you need heavy filters and good event correlation to determine when an event is really an incident If you want trending you need to store certain meta data information about events viewed which goes to assist in your security device tuning - and in report generation If you want forensics you need to be capturing and storing as much data as possible, since what an IDS does not pick up today as an attack may actually be an attack - those 1000's of "false positives" may not be so false when they are analyzed in detail and put in context with a successful attack I argue that the only way to get this flexibility is to use a SIM tool ... something which can store large amounts of raw data / logs, yet present a highly filtered and highly correlated view of all the data in your network. Sorry for the length of the post ... Andrew -----Original Message----- From: Sam f. Stover [mailto:sstover () atrc sytexinc com] Sent: Thursday, 23 October 2003 8:54 PM To: Martin Roesch Cc: Sam f. Stover; Christopher Kruegel; focus-ids () securityfocus com Subject: Re: Announcement: Alert Verification for Snort In the not too distant past I would have agreed with this - but I think as IDS implementations grew, the way people describe FPs has changed. I think today's IDS *needs* to know "the additional information about the context and relevance" - because the event you are referring to is what I'll call an "effective FP". Effective because any time I spend trying to track down an IIS attack on an apache box is wasted effort. I completely understand your point Marty, because an attack did occur, and the IDS did log it. However, if it is going to log it, then I want it to tell me that the severity of the attack is lessened because it didn't succeed. Even better, I want to see the 404 or 403 error, so I can show my boss why I didn't even bother to look into it. I want my IDS to differentiate between an IIS attack on my apache box and an IIS attack on an IIS box. I don't really care how it does it. The two main methods, as I see it, are passive fingerprinting or integration with another tool like a vuln scanner. Both have their drawbacks w/ relation to different environments - which could probably fuel a complete thread. The IDS landscape has changed. Ten years ago, the type of event mentioned was probably not considered a FP. But at that time, IDS was an infant and people weren't dealing with events on the scale of millions per day like they are today. Current-day NIDS need to evolve to solve the problems that current-day users are facing. IMHO 10 years ago, NIDS administrators could afford to be a bit more interested in all kinds of attacks. IDS was a new and exciting technology. I think it's lost some of it's glamour since then and people have to use it as just another tool. And the people I talk to don't have the time nor resources to run down half of the "real" attacks, much less look into attacks that will never succeed. Just my $0.02 ____ S.f.Stover sstover () iwc sytexinc com --------------------------------------------------------------------------- Network with over 10,000 of the brightest minds in information security at the largest, most highly-anticipated industry event of the year. Don't miss RSA Conference 2004! Choose from over 200 class sessions and see demos from more than 250 industry vendors. If your job touches security, you need to be here. Learn more or register at http://www.securityfocus.com/sponsor/RSA_focus-ids_031023 and use priority code SF4. ---------------------------------------------------------------------------
Current thread:
- Re: Announcement: Alert Verification for Snort, (continued)
- Re: Announcement: Alert Verification for Snort Barry Fitzgerald (Oct 24)
- RE: Announcement: Alert Verification for Snort Craig H. Rowland (Oct 24)
- Re: Announcement: Alert Verification for Snort Robin Sommer (Oct 24)
- Re: Announcement: Alert Verification for Snort Raistlin (Oct 23)
- Re: Announcement: Alert Verification for Snort Martin Roesch (Oct 23)
- Re: Announcement: Alert Verification for Snort Michael Krieger (Oct 24)
- Re: Announcement: Alert Verification for Snort Stephen P. Berry (Oct 24)
- Re: Announcement: Alert Verification for Snort Bill Royds (Oct 24)
- Re: Announcement: Alert Verification for Snort Konrad Rieck (Oct 23)
- Re: Announcement: Alert Verification for Snort Michael Stone (Oct 23)
- RE: Announcement: Alert Verification for Snort Andrew Hall (Oct 23)
- Re: Announcement: Alert Verification for Snort Sam f. Stover (Oct 24)
- RE: Announcement: Alert Verification for Snort PPowenski (Oct 24)
- Re: Announcement: Alert Verification for Snort Martin Roesch (Oct 24)
- Re: Announcement: Alert Verification for Snort Richard Bejtlich (Oct 24)
