Intrusion Detection Systems mailing list archives
Re: Assessment tools/Scanners
From: gshipley () neohapsis com (Greg Shipley)
Date: Tue, 12 Oct 1999 03:22:36 -0500 (CDT)
On Mon, 11 Oct 1999, Martin Roesch wrote:
Not sure what you are asking here - almost all of the commercial ID products are looking for knowns, and knowns only. They are signature-based.....Allow me to interject for a second. I wouldn't say that all commercial IDSs are necessarily straight jacketed into signature detection only, almost all of them have some sort of facility to perform anomaly detection as well. Even Snort can do primitive anomaly detection, such as alerts on bad TCP flag combinations or looking for tiny fragments. I think that the ability to develop anomaly detection schemes with a tool is pretty important, and you can do that with both NFR and Dragon (and to a lesser extent, Snort). Sure, they provide the capability to look for set "patterns" in packets, but they can also be tuned to look for things you should *never* see.
Ok, sorry about that - let me clarify: they are all "signature based." I guess we are sort of debating semantics here - and I guess it depends on your definition of "knowns" and "anomaly detection." We could build an entire IDS suite that checks for RFC-compliant packets and protocols, and yes, it would have its use (although we'd probably spend most of our time clearing out alerts generated by MS products), but I'm not sure if this is going to achieve the desired affect. I'd argue you would have a higher success rate of "anomaly detection" by correlating log data and using statistical analysis (behavioral ID, user profiling, etc.) techniques, no? Most of the current ID products that I know of still work off of fixed sigs. So you have things like LOKI and BO2k that can cruise through ICMP, and in theory, you could flag those packets as an anomaly. But I've also seen NT spew some flat-out AMAZING stuff in NATted environments, which I'm sure would set off a billion alarms as well. This could be really interesting, and really messy, at the same time. :) Dunno - this is an area where I think in theory works, in practice may be kind of difficult....although I do realize that it IS working, to some degree, in some products right now...
The advantage of the NFRs and Dragons of the world is that you can, fairly easily, code up your own "sig" for an attack. I know ISS RealSecure v3.2 has some of this flexibility, but not as flexible as, say, NFRs n-code. Are there any products that do network-level statistical profiling, to look for "unknown" attacks? Not that I know of, but that's just me....This requires codifying the statistical "signature" of a new attack, which can be a fairly daunting task. Questions like "what header fields do I keep track of?", "what are the characteristics of a post-buffer-overflow root shell session?", "how much traffic represents a valid statistical sample?", etc need to be answered before you can define a method of statistical analysis for intrusion/anomaly detection. Doesn't CMDS try to do some sort of statistical analysis?
Yes, CMDS does, but not on the level you are thinking (and that WOULD be cool). CMDS does more based on log and event entries, rather then raw network traffic. I'd argue that if someone could pull off a statistical-based analysis of raw network-traffic, that product would be ground-breaking, but wow, talk about a task.... My (attempted) point is that by allowing for customization, you give the user/client some power. Does the average org have the skills to code a new sig? Absolutely not - and that's been one of my complaints with NFR - lack of a large groups of sigs (which will most likely be solved with those new L0pht sigs). But at least by giving that level of flexibility those organizations that do have the staff, or those that feel this is important, can code things up on their own - they are not at the mercy of the IDS vendor.
every check. And even then, make no mistake, you CAN mutate attacks to the point that network-based ID will fail.Definitely, but the vast majority of script kiddies don't do this either because they're lazy or because they don't have the "skillz". Whether
Sure, sure, but you do get the propagation factor. Take a look at the Bind attacks, for example. You had the initial scripts that evolved out of the BUGTRAQ postings. Then you had a BSD/Linux based exploit (and I'm not kidding) that actually had a menu. Then you get a crew like ADM, that may have written some exploit code initially, but went back and RE-wrote them. Now you have the first generation of the attack...and then a 2nd and 3rd generation down the road. Now, if you ftp to one of ADM's sites you'll see some new(er) bind exploit code. This may be a poor example because of the nature of the Bind attack (pardon my ignorance here, as I am NOT an adequate coder of sigs), but you see where I am going, no? I may be a script kiddy, and my IDS vendor may have nailed that first attack, but if the attack signatures are susceptible to mutation, we still have a problem with script kiddies. I guess what I'm trying to say is that we shouldn't under-estimate the "script kiddie" generation. If I'm a good script kiddie, I'll keep up with the exploit script mutations - and they DO happen "in the wild." But I agree with you, a lot of this does pertain to your posture and what resources you are willing to invest in network defense. -Greg
Current thread:
- Re: Anomaly detection [was Re: Assessment tools/Scanners], (continued)
- Re: Anomaly detection [was Re: Assessment tools/Scanners] Dug Song (Oct 12)
- Pricing intrusions Stuart Staniford-Chen (Oct 12)
- Re: Pricing intrusions Marcus J. Ranum (Oct 13)
- Re: Pricing intrusions Fernando Trias (Oct 13)
- Fragmentation Question Greg Shipley (Oct 13)
- Re: Fragmentation Question Dug Song (Oct 14)
- Re: Pricing intrusions Ryan M. Ferris (Oct 14)
- Re: Pricing intrusions Stuart Staniford-Chen (Oct 13)
- Re: Assessment tools/Scanners Martin Roesch (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
