Intrusion Detection Systems mailing list archives

RE: RE: IDS taps in a switched network (The right tools for the job)


From: gshipley () neohapsis com (Greg Shipley)
Date: Fri, 12 Nov 1999 01:16:59 -0600 (CST)




On Sun, 7 Nov 1999, Marcus J. Ranum wrote:

Will that version do TCP reassembly and sequence tracking? I have
wondered if someone would ever try to push that into a router. My

Not that I know of.  Er, hell, I just assumed no.  I mean, NetRanger won't
even do re-assembly, so I guess its a safe assumption.  I'll double check
though.

 
We were able to boot an NFR appliance CDROM on one of the ODS
devices. That was a huge surprise for us, since it was a version
that only would listen for an Intel Etherexpress Pro 10/100 card
on a generic Intel motherboard. It turns out that the "inspection
unit" is a PC with a NIC and there's a very short wire connecting
it to a span port inside. I'd be surprised if they don't do something

Right - that's what I saw.  They basically OEM routers, switches, and
workstations and rack'm all into one unit.  Cool, but nothing that out of
the ordinary - yet.  We'll see what they do.

the product. That way you'll get a feeling for what it does
when it's installed the way many sites will install it. Of course,
this also means that an unscrupulous vendor could play games
with their default configuration that would make it look better
on paper. I can think of lots of ways someone could do that. :(
Benchmarks can be cooked even without having to lift a finger.

Right - which is why I try to make sure the deployment is reasonable, and
isn't just a fresh install.  But this can be messy.  The other problem is
that this isn't how *most* security-minded admins operate.  At least, I
hope not!  :)

I mean, perhaps with MS Office you can assume that it should work great
out of the box.  But I like to think that people in the security community
are a little beyond the "install and drop" method of deployment.  I could
very well be wrong, but so far that isn't what I run into *most* of the
time in the field.  Its tough either way, but if I can stay objective and
still get close to the way people deploy it, I think its pretty fair.

 
There's a few other problems - what about anomalous conditions?
NFR's latest set of filters (we've got about 400 checks in 4.0
and another 400 coming in 4.1 real soon now) checks not just for
known problems, but for things that could indicate a known
problem. I'm not sure whether this is "anomaly detection"
or "misuse detection" - it's more like "protocol boundary checks"

Yeah - and a lot of the cool stuff, particularly in NFR, IS NOT in the
other ID products.  So even if the ID vendors build in checks for every
network-based attack in the CVE, these (or the DNS stats, mail stats,
etc.) go beyond this.  They are kind of like bonus sigs....and its not
really easy to classify and file them.

Yup.  Can't really categorize those. 

If anyone wants to check it (the review) out, its on-line now at:
http://www.networkcomputing.com/1023/1023f1.html

I welcome any comments,

-Greg



Current thread: