IDS mailing list archives

Re: Target based IDS review and discussion in Information Security


From: Martin Roesch <roesch () sourcefire com>
Date: Fri, 9 Jan 2004 13:48:30 -0500

Just read the article and I have a few comments.

First, I find it troubling that the history and full meaning of the term
"target-based IDS" (which I coined in 2000) was omitted. That this
article didn't review any fully target-based IDS products will almost
certainly leave readers with a misunderstanding of what target-based IDS
really is.

Target-based IDS has two components, a correlation mechanism *and* a
target-based IDS sensor, this article only reviews the former.

Second, while I recall that you were concerned that the full concept was too
complex for people (i.e. Information Security Magazine's readers) to
understand, I believe that shielding them from the entire concept is a
disservice.

For the benefit of the readers in this forum, I'll repeat myself from our
exchange in November:

"Additionally, since I came up with the term "Target-based IDS" I'd
like to define the components of a true TIDS.  TIDS is *not*
event->vuln correlation, that's event contextualization (or impact
assessment).  We perform event contextualization so that we can reduce
the number of events generated by a NIDS to a manageable amount, but
it's only one leg of a full blown TIDS solution.

There are three classes of problems in IDS that require us to
transition to TIDS:
1) Lack of impact assessment/prioritization
2) Lack of host context (OS identification, service detection)
3) Lack of network context (topology discovery)

Problem one stops us from getting use of the data generated by IDSes.
The entire value of IDS is in its output, if we can't reduce that
output to information that's useful to us as administrators then the
usefulness of entire system is limited.  Tenable and ISS [mfr: and
Cisco] both have solutions to solve problem 1 and Sourcefire is working
on one (RNA).

Problems 2 and 3 are what Ptacek and Newsham were talking about.  If an
attacker can know more about the targets he's attacking than the IDS,
he can use that knowledge to get around the IDS.  If you're going to
defeat that then you need to drive the host and network context into
the IDS process itself, post-processing won't buy you anything if the
IDS sensor isn't as accurate as possible.  This is the *heart* of TIDS,
you can't have a TIDS if you don't incorporate host/network context
directly into the IDS process itself, the accuracy of the system will
always be suspect and the 1st part of the triad will not be as useful
as it should be."

There are two vendors who are working on target-based IDS sensors that
I know of, Sourcefire (my company) and NFR (which is shipping a passive
fingerprinter with their latest release).  I think you probably should
have mentioned this in the article, as well as listed the vendors who
are working on full target-based IDS implementations (only Sourcefire
AFAIK but it wouldn't surprise me if NFR and others were headed this
way).

     -Marty

On Jan 7, 2004, at 4:25 PM, Joel Snyder wrote:

There has been a lot of discussion on this list about target-based IDS in the last few months. A review of three products I wrote for Information Security has just popped up and is available on the magazine's web site. The URL is:

http://infosecuritymag.techtarget.com/ss/ 0,295796,sid6_iss306_art540,00.html

Informed commentary and feedback is always welcome.

jms

--
Joel M Snyder, 1404 East Lind Road, Tucson, AZ, 85719
Phone: +1 520 324 0494 (voice)  +1 520 324 0495 (FAX)
jms () Opus1 COM    http://www.opus1.com/jms    Opus One



----------------------------------------------------------------------- ---- ----------------------------------------------------------------------- ----


--
Martin Roesch - Founder/CTO, Sourcefire Inc. - (410)290-1616
Sourcefire: Snort-based Enterprise Intrusion Detection Infrastructure
roesch () sourcefire com - http://www.sourcefire.com
Snort: Open Source Network IDS - http://www.snort.org


---------------------------------------------------------------------------
---------------------------------------------------------------------------


Current thread: