Intrusion Detection Systems mailing list archives
Re: comparison of NFR vs RealSecure
From: carric () com2usa com (Carric Dooley)
Date: Mon, 13 Mar 2000 22:58:28 -0500
I will insert comments below: Carric Dooley Network Security Consultant "The probability of someone watching you is proportional to the stupidity of your action." -Anon? -----Original Message----- From: Thomas Nau <thomas.nau () rz uni-ulm de> To: ids () uow edu au <ids () uow edu au> Date: Monday, March 13, 2000 1:02 PM Subject: IDS: comparison of NFR vs RealSecure
FAQ: See http://www.ticm.com/kb/faq/idsfaq.html IDS: See http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html HELP: Having problems... email questions to ids-owner () uow edu au NOTE: Remove this section from reply msgs otherwise the msg will bounce. SPAM: DO NOT send unsolicted mail to this list. --------------------------------------------------------------------------- --- Will someone please offer a comparison of NFR vs RealSecure with focus on the following topics (we run the usual switched 100-1000Mbit network but sniffing will only be done in several 100 segments) - speed
ISS should be fine up to about 40Mb on a 100Mb link.. you supplement this by using the system agents (these run on key servers reporting to the central console). NFR claims to handle up to a 70Mb saturated backbone.. there is not equivalent to system agents that I know of.
- update frequency and reliability of attack signature
ISS has just gone to a modular update scheme which will give them to release updates anytime there is a new major exploit... (they were the first to have code against BO2K). NFR has a "roll your own" approach. Once you learn the scripting language, you can react as soon as you know about the exploit without waiting for an update. You can also get your initial package of signatures from L0pht Heavy Industries.
- integration of FW-1 (means setup filter on the fly)
Absolutely.. it will create rules on the fly via the OPSEC protocol SAMP, and can modify router ACL's as well. I am not sure if NFR ties into FW-1...
- multi-sensor single evaluation node environment
This is referred to as a distributed architecture, and ISS uses an "engine/console" architecture with agents and engines reporting to a central console (color coded by engine/agent and seperated into 3 windows for critical, medium and minor events) You can set this up distributed as well.. it requires either a Solaris or Linux management server and then a windows client to access and manage the system as well as view the logging and alerts (the engines are essentially a PC that you boot off their CD and configure with a public and mgt. interface). I am not particularly fond of the interface and it requires a steeper learning curve than NFR.
- available API (integrating own type of alerts, actions, ...)
You can write custom progs kicked off by keyed events.. i.e. if this event happens, execute "myprog.exe"
- last but not least cost and administrative overhead
ISS is not cheap (at roughly $8K-$9K per engine and $1,500 for the console.. I think roughly $300-$400 for system agents). I prefer their IDS because it integrates well with their other products and can talk to a meta-engine that correlates and reports on all the data it is fed (Decisions is the name of that product). It is easy to deploy and does not require a Phd to figure out. It is also relatively easy to make changes and customize the already pre-packaged policies. For a large enterprise I think it's the only viable choice. NFR is much cheaper (I want to say something like $3500/engine), but I could be totally wrong.. I know Mr. Ranum is on this list and I am sure he would be happy to discuss price with you. It is also EXTREMELY easy to deploy and manage. Like I said, you can write your own sigs with the custom scripting language, and all you need to have a few decent PC's with a fairly standard config for your engines (PII, 128MB, 4G HDD, 3C905, etc.). It boots right off the CD and within minutes you are up and running. In all, I have to say I like them both, but they suit different sets of needs. If you are smaller .com company that is $$ conscious, and you have a couple "coder/hacker linux head" types on staff, NFR is a good fit. If you are Nations Bank or Pepsi, I think ISS is the logical choice.
Thanks, Thomas ====== PGP fingerprint B1 EE D2 39 2C 82 26 DA A5 4D E0 50 35 75 9E ED ====== Thought you got rid of all year 2k bugs and problems? Here's a new one: Windows 2000
Current thread:
- Re: comparison of NFR vs RealSecure -reply Mark.Teicher () predictive com (Mar 13)
- Re: comparison of NFR vs RealSecure -reply Marcus J. Ranum (Mar 14)
- <Possible follow-ups>
- Re: comparison of NFR vs RealSecure Carric Dooley (Mar 13)
- Re: Re: comparison of NFR vs RealSecure Marcus J. Ranum (Mar 14)
- RE: Re: comparison of NFR vs RealSecure C.M. Wong (Mar 16)
- RE: Re: comparison of NFR vs RealSecure Marcus J. Ranum (Mar 16)
- Date: Fri, 17 Mar 2000 17:02:14 +0800 tongchangda (Mar 17)
- Detection Methods tongchangda (Mar 17)
- Re: Re: comparison of NFR vs RealSecure Marcus J. Ranum (Mar 14)
- Filter Capability Dangler, Terry Y. (Mar 16)
- RE: Re: comparison of NFR vs RealSecure -reply Mark.Teicher () predictive com (Mar 17)
- RE: Re: comparison of NFR vs RealSecure -reply C.M. Wong (Mar 20)
- Date: Tue, 21 Mar 2000 17:59:28 +0800 tongchangda (Mar 21)
- RE: Re: comparison of NFR vs RealSecure -reply Mark.Teicher () predictive com (Mar 21)
