Intrusion Detection Systems mailing list archives

RE: RE: IDS taps in a switched network (The right tools for the job)


From: rgula () network-defense com (Ron Gula)
Date: Sun, 31 Oct 1999 07:44:46 -0800




David Newman said:

I agree that the 12-Tap is an effective way to monitor 12 ports at a time.
But many enterprise switches (and virtually all boxes for ISPs and carriers)
have many more than 12 ports. In my opinion it's better to have
hardware-based monitoring built right into the switch.

A few comments/questions here: 

- Does anyone know if switches like the 2924 have buffering? I've always
  thought that they must. If there is buffering, then over short time
  spans, they can handle more than an aggregate of 100MB/sec. 

- Many of these switches have real nice monitoring tools that can tell you
  when the specific interfaces are dropping packets. It's also a good way
  to see if your IDS is dropping packets because you can simply compare the
  packet counts. That is if your IDS is counting packets like NFR, Dragon,
  and NetProwler.

- I saw one of ODS's products at last week's Shadowcon which had 10 100baseT
  links and a 1000baseT monitor/span/spy port. 

- As far as building IDS right into the switch, I'm all for it, but I think
  it is a radical departure for switch manufacturers. Consider Cisco's 
  attempts to put IDS onto a router card. I have not used this product, but
  the word is it that it detects <50 attacks. 

- Many vendors have contacted us to port Dragon over to silicon. Very few
  of them wanted to tackle gigabit networking and most of them wanted to
  make cheap boxes that could keep up with cable modem and DSL rates. We've
  talked to a few vendors to put Dragon into a switch and are willing to 
  talk to some more if any are on this list. 

The bottom line is you really need to know what you are doing if you want
to sniff traffic. There are many subtle 'gotchas' that can make monitoring
difficult like asymmetric routing, dropping packets on spanned ports, 
dropping packets at your IDS and so on. In many cases though, less than %100 
monitoring of packets is an acceptable risk. Very few attack or scan attempts 
are a single packet. Yes, someone cane Fin-Syn me all day with one packet an
hour, but they still risk being detected. 

//Ron



Current thread: