Intrusion Detection Systems mailing list archives
Re: Assessment tools/Scanners
From: roesch () clark net (Martin Roesch)
Date: Mon, 11 Oct 1999 11:25:57 -0400
Greg Shipley wrote:
Not sure what you are asking here - almost all of the commercial ID products are looking for knowns, and knowns only. They are signature-based.....
Allow me to interject for a second. I wouldn't say that all commercial IDSs are necessarily straight jacketed into signature detection only, almost all of them have some sort of facility to perform anomaly detection as well. Even Snort can do primitive anomaly detection, such as alerts on bad TCP flag combinations or looking for tiny fragments. I think that the ability to develop anomaly detection schemes with a tool is pretty important, and you can do that with both NFR and Dragon (and to a lesser extent, Snort). Sure, they provide the capability to look for set "patterns" in packets, but they can also be tuned to look for things you should *never* see.
The advantage of the NFRs and Dragons of the world is that you can, fairly easily, code up your own "sig" for an attack. I know ISS RealSecure v3.2 has some of this flexibility, but not as flexible as, say, NFRs n-code. Are there any products that do network-level statistical profiling, to look for "unknown" attacks? Not that I know of, but that's just me....
This requires codifying the statistical "signature" of a new attack, which can be a fairly daunting task. Questions like "what header fields do I keep track of?", "what are the characteristics of a post-buffer-overflow root shell session?", "how much traffic represents a valid statistical sample?", etc need to be answered before you can define a method of statistical analysis for intrusion/anomaly detection. Doesn't CMDS try to do some sort of statistical analysis?
I'm working on some of this data now, but I'll put this question to the list: what would you guys LIKE to see? IMHO, the only way to thoroughly validate a vendor's set of signatures is to run each and every attack past them. And to do so, you either have to possess or write exploit code for every check. And even then, make no mistake, you CAN mutate attacks to the point that network-based ID will fail.
Definitely, but the vast majority of script kiddies don't do this either because they're lazy or because they don't have the "skillz". Whether or not you are concerned about the set of people outside the script kiddie domain is a function of your site's security posture and the threat model that you used to develop your site's security architecture. If you're concerned with script kids, then you need one level of protection, if you're worried about nation-state level attacks you should probably unplug from the internet. Somewhere in between those two is a happy medium of functionality versus cost versus risk of undetected compromise.
And hell, as Dug pointed out, if you pipe stuff through fragrouter you'll get past almost everything but NFR and Dragon.
Hey, Snort will detect that someone is running their packets thru
fragrouter! ;) (Of course, that's *all* it tells you....)
-Marty
--
Martin Roesch
roesch () clark net
http://www.clark.net/~roesch
Current thread:
- Re: Anomaly detection [was Re: Assessment tools/Scanners], (continued)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Stuart Staniford-Chen (Oct 12)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Dug Song (Oct 12)
- Pricing intrusions Stuart Staniford-Chen (Oct 12)
- Re: Pricing intrusions Marcus J. Ranum (Oct 13)
- Re: Pricing intrusions Fernando Trias (Oct 13)
- Fragmentation Question Greg Shipley (Oct 13)
- Re: Fragmentation Question Dug Song (Oct 14)
- Re: Pricing intrusions Ryan M. Ferris (Oct 14)
- Re: Pricing intrusions Stuart Staniford-Chen (Oct 13)
- Re: Assessment tools/Scanners Martin Roesch (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
