Intrusion Detection Systems mailing list archives
Re: Assessment tools/Scanners
From: roesch () clark net (Martin Roesch)
Date: Wed, 13 Oct 1999 14:39:40 -0400
"Ryan M. Ferris" wrote:
Two major problems here: a) complicated attacks and attack forms become push button simple quickly: Today's black hat is tommorrow's script-kidde. (Personally, I think if you read it in phrack, it's script-kidde already...) Today's nation-state is tommorrow's black-hat and so on.
I agree, but once it becomes a push button attack it's usually easy to characterize into some sort of signature. Take NMAP's fingerprinting system, I only have a signature for one of the test packets that it uses, but NMAP has an *infrastructure* of OS signatures built around that particular fingetprinting methodology, so it's difficult for them to change it now. I take advantage of this and detect fingerprinting attempts with a single packet signature (out of seven sent per f/p attempt).
This is just software development evolution. What took raw assembly and C yesterday is now tommorrow's push button kit *.exe. (i.e. www.rootkit.com)
I've heard it called the software arms race. :)
b) "people with money" don't have that many other options. Pop quiz: Someone name all the IDS (commercial or otherwise) that will reliably (say 90% or more with 5% or less false positive rate) detect: TCP/IP hijacking TCP/IP fragmentation and re-assembly frag router attacks arp cache and route poisoning now name me the IDS that will reliably catch the same attacks (at the same rate) at 25% (10/100baseT) utilization:
If you have the money and the inclination, you can implement solutions to these and a host of other problems. Starting with a good security architecture and multi-layered defenses, building custom intrusion and anomaly detection, implementing fun stuff like SSO and PKI, etc. We all know that intrusion detection isn't the end of network security, it's just a component that happens to be popular right now. When I was at GTE Internetworking, we built our own IDS for the company's Global Network Infrastructure (coast-to-coast OC-192 backbone and associated infrastructure). There are no commercial solutions for huge networks like this, but GTE had the money and on-staff (good!) security people, and they built their own custom solution. That was a company that had the money (and expertise) to have other options. If a business depends on networking, it had better think hard about skimping on security.
So while it is true that "you have to do something", the question becomes: Is the something you did an 'out of date' shield that will now miss current hacker penetration? If so, then the process is horribly flawed, you should forget about detection and concentrate on prevention and/or re-invent the conception of an IDS. Compare this type of viral detection software. Can a virus maker survive that does not include the latest virus signatures? Only if you have a long term government contract perhaps. (And even then, viral signature detection patches are now almost produced overnight in the case of a new outbreak.) Why do we hold IDS development to a different standard?
I'd say that any ID technology capable of detecting a subset of your threat environment is at least marginally useful/better than nothing. The challenge is getting the people who buy and implement these systems not to lull themselves into a false sense of security. An IDS that detects a decent amount of hostile traffic is pretty good, one that doesn't detect anything is useless, and one that detects everything is a fantasy. ;) We tend to treat the technologies we discuss here like they're monolithic solutions. I don't think this is a good way to consider any security technology, it doesn't work like that. You have to set up layers and peform defense in depth if you're interested in having "real" security, and even then it sometimes fails for specific solutions. I guess I'm not sure what to say, there are no one stop solutions, you're never completely safe once you're on a network. Should we give up networking? I don't think so, so we have to present some sort of solutions to people who want to be networked but are also interested in doing so securely. I think that Open Source is a path to truely good security products. It's the only way to cut past marketing hype and see products under the "hot lights" of public scrutiny. I can't hide that Snort has limitations, for instance, but I don't recommend it as the only solution to anybody's security needs. If you're going to run Snort, you should probably be running ArpWatch and PortSentry to fill in some of the coverage gaps that it has. This gives you an "ok" network based IDS when considered all together, but it still doesn't do things like IP defrag and TCP stream reassembly. Is it useless? No. Is it a complete solution? Hardly. Can it detect a wide variety of attacks and probes? Definitely. Should people use it? If they understand the risks associated with the gaps that it has or their lack of funding forces them, its not a bad starting solution.
Question: Is is possible to do anomaly detection at layer 1? Could a ASIC on a NIC be built to decode signalling at layer 1 so that IDS and anomaly detection could be responded to in hardware?
I'm sure that you can do some sort of anomaly detection at layer 1, but
I'll leave it to the PhD's out there to outline the theory so people
like us can get the engineering specifics together and implement
something practical.
-Marty
--
Martin Roesch
roesch () clark net
http://www.clark.net/~roesch
Current thread:
- Re: Pricing intrusions, (continued)
- Re: Pricing intrusions Ryan M. Ferris (Oct 14)
- Re: Pricing intrusions Stuart Staniford-Chen (Oct 13)
- Re: Assessment tools/Scanners Greg Shipley (Oct 11)
- Re: Assessment tools/Scanners Martin Roesch (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
- Re: Assessment tools/Scanners Dug Song (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
- Introduction mcondy (Oct 12)
- Re: Assessment tools/Scanners Ryan M. Ferris (Oct 13)
- Re: Assessment tools/Scanners Martin Roesch (Oct 13)
- RE: Assessment tools/Scanners Bill Royds (Oct 11)
- Re: Assessment tools/Scanners Stuart Staniford-Chen (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
