Intrusion Detection Systems mailing list archives
RE: RE: IDS taps in a switched network (The right tools for the job)
From: mjr () nfr net (Marcus J. Ranum)
Date: Sun, 07 Nov 1999 21:49:42 -0500
- Cisco is supposedly trying to get their CBAC/IDS stuff into Cat5500/6000 builds mid next year. Who knows if it will happen, but its a cool thought. The current build of IOS that has the ID sigs (12.0.5T on some platforms) has about 60 signatures.
Will that version do TCP reassembly and sequence tracking? I have wondered if someone would ever try to push that into a router. My guess is that the RAM and CPU requirements of doing so will be too much for a typical router - state tracking on a busy FDDI can take many megs of buffer space when the network gets congested and sessions start retransmits.
- The ODS stuff that I've seen (again, haven't gotten a chance to pound on it yet - stay tuned) uses a multiple-segment "backplane." Essentially, its not really embedded in the switch, it just has an inspection unit (read: machine with many NICs) attached to each "plane." I wish someone from ODS was on this list....lemme see if I can get some more accurate info on this. Point being though, from what I saw, it was NOT *in* the switch.
We were able to boot an NFR appliance CDROM on one of the ODS devices. That was a huge surprise for us, since it was a version that only would listen for an Intel Etherexpress Pro 10/100 card on a generic Intel motherboard. It turns out that the "inspection unit" is a PC with a NIC and there's a very short wire connecting it to a span port inside. I'd be surprised if they don't do something better in a future version. The problem, however, is similar to the one I alluded to in the router case above - if you put the IDS logic into your main data path you've got to have a lot of extra RAM and CPU. Or you have to do very rudimentary IDS. So it makes sense to put the ID logic on a separate card - that way you can chew up all the cycles and RAM you like without interfering with the main data path.
Unfortunately, (boy am I opening myself up to criticism here - yikes) in our testing we just turned everything on, and ran with it. Our only other option was to strip them all down to the lowest common denominator, and that is NOT what happens in the real world. Not to mention its unfair to the vendors that do have a wide range of sigs....
I think your approach is reasonable. One of the product testing concepts I am really fond of is the "just hit return" install. Perform the absolute minimum configuration necessary to test the product. That way you'll get a feeling for what it does when it's installed the way many sites will install it. Of course, this also means that an unscrupulous vendor could play games with their default configuration that would make it look better on paper. I can think of lots of ways someone could do that. :( Benchmarks can be cooked even without having to lift a finger.
If/when the CVE stuff matures, and if/when vendors get their internal sigs lists/DBs compliant, we can one day list out hundreds of sigs and do a real apples to apples comparison. Until then, however, someone is either going to a) go insane trying to map ID product sig lists or b) continue doing testing that attempts to be as fair as possible, but not ideal.
There's a few other problems - what about anomalous conditions? NFR's latest set of filters (we've got about 400 checks in 4.0 and another 400 coming in 4.1 real soon now) checks not just for known problems, but for things that could indicate a known problem. I'm not sure whether this is "anomaly detection" or "misuse detection" - it's more like "protocol boundary checks" subject lines of SMTP messages should probably not be longer than a certain amount, FTP RETR commands should not (probably) contain non-ascii characters, or more than MAXPATHNAMELEN bytes, etc, etc. It's difficult, maybe impossible, to categorize those kinds of checks other than "something is weird" checks - just like the kind of "something is weird" alerts you'll get with pure statistical anomaly detection systems.
There are just SO many factors....and let's not forget this: ID vendors are not perfect. Not all of the sigs that we tested worked right. Some didn't work at all. We found the problems and they are now fixed, but know that these products aren't even 100% accurate at what they do look for. So many things to consider......
I don't think any of the vendors claim their products are perfect. What I think we're all finding is that this, like most security technologies, is under a period of rapid evolution. Things will continue to get better, as we all see what works, and steal ideas from eachother. :) Kinda reminds me of the early days of the firewall biz: lots of cross-pollination, a few dead ends, and a lot of innovation. mjr. (being a trend setter is a b**ch) -- Marcus J. Ranum, CEO, Network Flight Recorder, Inc. work - http://www.nfr.net home - http://www.clark.net/pub/mjr
Current thread:
- behavior-based intrusion detection, (continued)
- behavior-based intrusion detection Fernando Trias (Nov 01)
- Neural Networks Pug (Nov 02)
- Re: Neural Networks Guy Bruneau (Nov 02)
- RE: Neural Networks Bill Royds (Nov 03)
- IDS Stefano Maifreni (Nov 02)
- RE: RE: IDS taps in a switched network (The right tools for the job) Marcus J. Ranum (Nov 02)
- Re: IDS Emmanuel Gadaix (Nov 03)
- More swicth stuff Ron Gula (Nov 01)
- RE: RE: IDS taps in a switched network (The right tools for the job) tim shea (Nov 03)
- RE: RE: IDS taps in a switched network (The right tools for the job) Greg Shipley (Nov 07)
- RE: RE: IDS taps in a switched network (The right tools for the job) Marcus J. Ranum (Nov 07)
- The story of a small boy ... sealed envelops ... ------------ SURVEY RESULTS Max (Nov 11)
- RE: RE: IDS taps in a switched network (The right tools for the job) Greg Shipley (Nov 11)
