Intrusion Detection Systems mailing list archives
Re: IDS standards (was: IDS taps in a switched network...)
From: rgula () network-defense com (Ron Gula)
Date: Mon, 01 Nov 1999 20:14:23 -0800
At 07:38 PM 11/1/99 -0500, you wrote:
Even if the switch can buffer petabytes of data, it still hasto exit out aspy port that operates at 100 Mbit/s. Sure, a buffer can empty out its contents and eventually trigger an alarm, but by then thevulnerable segmentmay well be off the air.In the amount of time it takes the common security admin to notice the alarm, and do the leg work, it would be off the air anyhow.Not if the IDS automatically triggers some action to stop an attack. For this to happen, the IDS must be able to see the attack in the first place. Seeing something dribbling out of a buffer 10 seconds after the fact doesn't cut it.
This is an awful lot to ask of a switch. Real time responses to attacks make great marketing, but don't work in the real world. IDS's are not that sensitive to the many different types of DOS attacks. Making an arbitrary decision to filter an IP can open yourself up for an IDS-DOS. I'm also concerned about the delta in time it may take for a switch or firewall to add in an ACL of some sort. Even if an IDS could detect attacks perfectly in zero time, the switch may still have a bunch of evil packets sitting in output queues, input queues and transiting it's backplane. If there is a concern about fast attacks on high bandwidth networks, taking 500ms to add in an ACL may be to long. Making filtering decisions about a network should require some knowledge of the network topology so the switch/ids does not allow false positive attacks from BGP peers, upstream DNS servers, business partners, etc., to cause IDS-DOS outages. This knowledge of the local network is a 'radical departure' for most switch manufactures. Switches are getting more sophisticated, but I think they still have some ways to go before they understand what is happening from an enterprise perspective. Ron Gula Network Security Wizards
Current thread:
- RE: RE: IDS taps in a switched network (The right tools for the job) David Newman (Nov 01)
- RE: RE: IDS taps in a switched network (The right tools for the job) Marcus J. Ranum (Nov 01)
- RE: RE: IDS taps in a switched network (The right tools for the job) Jackie Chan (Nov 01)
- IDS standards (was: IDS taps in a switched network...) David Newman (Nov 01)
- Re: IDS standards (was: IDS taps in a switched network...) Jackie Chan (Nov 01)
- Re: Re: IDS standards (was: IDS taps in a switched network...) Marcus J. Ranum (Nov 02)
- Re: IDS standards (was: IDS taps in a switched network...) Ron Gula (Nov 01)
- Re: IDS standards (was: IDS taps in a switched network...) Stuart Staniford-Chen (Nov 02)
- Re: IDS standards (was: IDS taps in a switched network...) Alexander Bochmann (Nov 09)
- RealSecure Database Issue ColFlagg () chubb com (Nov 10)
- Re: RealSecure Database Issue Jackie Chan (Nov 11)
- Re: RealSecure Database Issue mht () clark net (Nov 12)
- Tripwire Alexey Chalimov (Nov 12)
- My first message Wilfredo Sillerico Gálvez (Nov 17)
- Submission Deadline EXTENSION for 12th Annual FIRST Conference michele sensalari (Nov 18)
- Re: My first message Technical Incursion Countermeasures (Nov 18)
- Identifing things that go Dump Comp (Nov 19)
- IDS standards (was: IDS taps in a switched network...) David Newman (Nov 01)
