Intrusion Detection Systems mailing list archives
Re: Assessment tools/Scanners
From: vin () shore net (Vin McLellan)
Date: Sun, 10 Oct 1999 13:18:09 -0400
Ryan M. Ferris <ryan25 () wenet net> suggested twisting the arms of IDS
vendors to obtain their internal test suites to validate the effectiveness
of their signature library in identifying the known threats, exploits, and
attacks.
Dug Song <dugsong () monkey org> replied:
but the problem is that vendors aren't using or developing test suites that determine how their systems FAIL. this is evident from the ways we've found to trivially elude them.
Would you mind elaborating on this point further, Dug?
(I've enjoyed your papers, btw. Thanks for the effort.)
How does one develop a test suite that will identify the Failure
when an IDS module does not identify the threat behind a novel attack? (Or
an old attack presented in a novel manner?)
With a rule-based system, how does one go beyond the list of known
attacks to alarm vulnerabilities as well as known threats?
(I have alway presumed that the need to identify areas of potential
vulnerability -- as opposed to known exploits -- was a major reason the
leading IDS vendors have hired or contracted with various gray-sombrero
hacker groups. NFR is getting backend filters from Mudge and the lunar
luminaries of the L0pht; ISS has its Xtrodinary X-Force; and Axent has its
sharpshooter SWAT group. Does this work? Have these groups or similar
gray-cloaked warriors contributed to the state of the art or pushed the
envelope?)
Why is it so difficult to develop an evaluation criteria which can
rate IDS packages in terms of which can (a) effectively generalize from
known exploits in order to place alarms on similar but not identical
attacks, and (b) alarm areas of potential vulnerability, even if no exploit
has yet been published?
Has anyone tried to evaluate these product historically, to see what
percentage of new and novel attacks have been caught because one or several
IDS packages reached beyond the list of known exploits and detected
anomalities? (Too early for this, maybe?)
Do you know if anyone is doing this now to track the _future_
success or failure of these IDS packages in identifying novel attacks,
without generating a flood of false alarms?
Suerte,
_Vin
"Cryptography is like literacy in the Dark Ages. Infinitely potent, for good
and ill... yet basically an intellectual construct, an idea, which by its
nature will resist efforts to restrict it to bureaucrats and others who deem
only themselves worthy of such Privilege."
_A Thinking Man's Creed for Crypto _vbm
* Vin McLellan + The Privacy Guild + <vin () shore net> *
Current thread:
- RE: Assessment tools/Scanners Staggs, Michael (Oct 08)
- RE: Assessment tools/Scanners Greg Shipley (Oct 08)
- <Possible follow-ups>
- Re: Re: Assessment tools/Scanners Greg Shipley (Oct 08)
- RE: Assessment tools/Scanners Staggs, Michael (Oct 08)
- Re: Assessment tools/Scanners Vin McLellan (Oct 10)
- Re: Assessment tools/Scanners Dug Song (Oct 10)
- Re: Assessment tools/Scanners Marcus J. Ranum (Oct 10)
- Anomaly detection [was Re: Assessment tools/Scanners] Stuart Staniford-Chen (Oct 11)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Dug Song (Oct 12)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Stuart Staniford-Chen (Oct 12)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Dug Song (Oct 12)
- Re: Assessment tools/Scanners Dug Song (Oct 10)
- Pricing intrusions Stuart Staniford-Chen (Oct 12)
- Re: Pricing intrusions Marcus J. Ranum (Oct 13)
- Re: Pricing intrusions Fernando Trias (Oct 13)
- Fragmentation Question Greg Shipley (Oct 13)
