
IDS mailing list archives
Re: Intrushield vs. ISS once more...
From: Adam Powers <apowers () lancope com>
Date: Fri, 07 Jan 2005 10:17:05 -0500
Well Thomas, given the fact that we¹re Arbor's largest competitor and greatest threat, you seem to know very little about how the StealthWatch technology works or of what it¹s capable. StealthWatch certainly does provide aspects of both statistical and rate-based anomaly detection. These techniques typically require several ³flows² to form a pattern which ultimately lead to an alarm or alert. The pattern forming process could take anywhere from 1 second to 24 hours depending on the type and volume of attack traffic. But it doesn¹t stop there... StealthWatch also provides a myriad of other ³single flow² alarms that work in combination with ³multi-flow² alarms (flows being either NetFlow-based or from a SPAN/mirror port). An example is the ³Trap Host² alarm. StealthWatch keeps a database of all hosts that are active on a given internal segment. If it sees another internal host attempt to communicate with a host that does not exist, an alert (or alarm) is raised instantly. All that¹s needed is a single packet or NetFlow record. The operator can adjust the sensitivity of this alarm by specifying how many ³trap hosts² are allowed to be hit in a single day before an actual alarm is raised. Other examples include the StealthWatch OS fingerprinting alarms. Since OS fingerprinting is based on the first TCP SYN, only a single packet is needed to raise an alarm or alert. StealthWatch offers the capability to alarm on such OS anomalies as multiple OSs, unknown OSs, NATed addresses, etc. Yet another example includes the such policy driven alarms as ³Out of Profile², ³Zone Violation², ³Watch Host/Port², and the ³Mac Address Violation². So ³atomic² attack detection is absolutely possible with StealthWatch. Sure, sign-based systems are better suited for alarm driven packet capture, but you can rest assured that *some* anomaly detection systems offer this capability as well. As a side note, starting with StealthWatch 4.5 (May 2005) the first 128 bytes of payload in each direction of each flow will be captured and saved to disk for later retrieval and analysis (31 days by default, can be extended indefinitely). -- Adam Powers Senior Security Engineer Advanced Technology Group o. 770.225.6521 e. apowers () lancope com On 1/5/05 10:24 AM, "Thomas Ptacek" <tqbf () arbor net> wrote:
A system like Lancope's (statistical anomalies) doesn't generate alerts based on individual packets or even individual connections. It's detecting rate shifts based on time. This is detection based on context (useful for some things, don't get me wrong). What's the likelihood that the forensic information you're actually looking for is contained in the 15kB of data associated with the connection that happened to trip a threshold?
-------------------------------------------------------------------------- Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. --------------------------------------------------------------------------
Current thread:
- RE: Intrushield vs. ISS once more... Maynor, David (ISS Atlanta) (Jan 03)
- Re: Intrushield vs. ISS once more... Thomas Ptacek (Jan 06)
- Re: Intrushield vs. ISS once more... Dennis Cox (Jan 06)
- Re: Intrushield vs. ISS once more... Adam Powers (Jan 08)
- Re: Intrushield vs. ISS once more... Thomas Ptacek (Jan 10)
- Re: Intrushield vs. ISS once more... Mike Frantzen (Jan 08)
- <Possible follow-ups>
- RE: Intrushield vs. ISS once more... Murtland, Jerry (Jan 03)
- Re: Intrushield vs. ISS once more... Chris Brown (Jan 04)
- Re: Intrushield vs. ISS once more... Chris Mills (Jan 06)
- Re: Intrushield vs. ISS once more... Jason (Jan 06)
- Re: Intrushield vs. ISS once more... Jason (Jan 06)
- RE: Intrushield vs. ISS once more... Chris Brown (Jan 06)
- Re: Intrushield vs. ISS once more... JM (Jan 08)
- Re: Intrushield vs. ISS once more... Thomas Ptacek (Jan 06)