Intrusion Detection Systems mailing list archives
RE: Good source of intrusion detection and response steps?
From: FKnobbe () Home com (Frank Knobbe at Home)
Date: Sun, 9 Apr 2000 13:12:33 -0500
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-----Original Message----- From: Matt Baney [mailto:baney () shai-seattle com] Sent: Monday, March 27, 2000 1:11 PM I think I worded my original question poorly or wasn't very clear. What I'm looking for would be something more like a cookbook solution for Attack-X given a certain system configuration and IDS tools available.
Matt, I don't think there is an 'Attack-X'. Each incident is different. One good thing about the recent DDoS attacks was that they all used the same software (tfn, stacheldraht, etc), so the appearance, signature and recognition were the same. But if you compare different intrusion scenarios, they all differ. I suggest you group the tools into categories, i.e. disk based analysis, network based analysis, etc, and then pick your favorite tool from each category. Your favorite tool is the one with the least learning curve, the most flexibility, the one you can use in an instant without much effort (oh, and which you can afford :)
What should I do after the initial warnings, what steps should I take to preserve as much evidence as possible but at the same time detect and stop the intrusion,
It is not always a good thing to stop the intrusion. This greatly depends on the scenario. You might pull the plug and investigate what's left (typically hard drive content analysis), or you might isolate the system, but leave the attacker working on it and monitor the system (typically network traffic content analysis). In regards to the procedure, we already listed several links.
[...] I guess what I'm looking for is an expansion of the vulnerability/attack database idea, that contains vendor/tool specific information about what the user would see when this attack happens, and instructions of how to respond to the attack?
Actually, that is a great idea. I think we could use a database that lists intrusions and the steps (and tools) used to investigate it. Security is still a folk art, and we all learn by experience. We also try to learn from each other (in security probably more so than in any other information technology category), and such a intrusion roster would be a great idea (of course stripped of the names of companies, etc). Regards, Frank -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.1 Comment: PGP or S/MIME (X.509) encrypted email preferred. iQA/AwUBOPDIEURKym0LjhFcEQKiMgCZAT5GP5GPdkG3XMCLwAVekCTjSLUAn0X3 unYILDqq8svBxFMEhEaIAliV =4i65 -----END PGP SIGNATURE-----
Current thread:
- RE: Good source of intrusion detection and response steps? Frank Knobbe at Home (Apr 09)
- <Possible follow-ups>
- RE: Good source of intrusion detection and response steps? Frank Knobbe at Home (Apr 09)
