Intrusion Detection Systems mailing list archives

Re: BlackICE IDS (More comments ...)


From: rgula () network-defense com (Ron Gula)
Date: Sun, 05 Dec 1999 06:43:20 -0800



Let me pose a logic problem to everyone:  Does it make more sense to
place one system on each network that can handle 100k packets/sec OR
place one service on each desktop, where the desktops are each handling
100k packets a second and experiencing possible usability problems?  My
support staff would shoot me in my sleep if I put them through the
headache of supporting Yet Another Desktop Application -- esp. one that
can be handled at the network level.

I defiantly favor a dedicated system that can handle 100k/sec. I don't
want any of my desktops or servers sniffing because that is a process
that can be expensive to do. At the desktop, I am much more in favor of
IDS products like Tripwire.

My suggestion was and -- for now -- is a Network IDS, preferably in
the form of a dedicated IDA.  I also believe that the IDS technology
arena is so new that we're still fumbling around in the dark, looking
for a light switch that will allow us to see the problem in front of
us.  If you don't believe me, please read the Greg Shipley IDS Review in
Network Computing on Nov. 15th, where he all but says, "IDS technology
is not ready for release."

http://www.nwc.com/1023/1023f1.html

Hey - who is putting words in Greg's mouth now ;) ? My take on the 
article's overall IDS comments was that these tools were very useful,
but not 100% perfect. And if anyone ever nails a packet based IDS
perfectly, it still should be able to operate in concert for host IDS,
application IDS, vulnerability scanners and firewalls. 

Further, do you care to share your traffic file so we can all start
talking around the same data?  I for one would like to see how other
technologies perform with the same set of traffic.  Surely you, as one
of the founders, don't mind sharing your data so we can all start
comparing apples to apples.  If anyone want's to look at a point of
comparison, my company offers some standard tcpdump formatted logs from
SANS NS'99s IDNET contest.  They can be found at
http://www.hiverworld.com/snortlogs -- although, there's a lot of really
strange stuff in these logs, so YMMV.

This is a good point. We've been posting the logs we've captured from 
Defcon and several SANS conferences now as well. One of the criticisms 
we've seen is that we're posting what Dragon has collected and not the 
raw logs. Aside from the technical details of putting up 300MB tcpdump 
log files containing 10000 nmap scans of the same network, I think what 
Mr. Graham was talking about was a trace file that was sent *to* the
IDS as compared with files captured by an IDS.

Ron Gula
Network Security Wizards



Current thread: