Snort mailing list archives
Re: New Trend: Intrusion Prevention
From: Frank Knobbe <fknobbe () knobbeits com>
Date: 15 Dec 2002 21:16:33 -0600
On Sun, 2002-12-15 at 17:17, Kevin Black wrote:
[...] Both Hogwash and Guardian were referred to in this thread a few times as IPS so it was fair of me to refer to them as well. [...]
hehe... yeah, so it was. Sorry, I should have harped on the others as well. (My excuse is that Evolution 1.2 doesn't sort threads as well anymore as 1.1.x did... :P)
Any auto response is what I am talking about. Let me put forth a few examples using Snort sigs since this is a Snort mailing list: - POP3 PASS overflow attempt SID:1634 [...] - SMTP HELO overflow attempt SID:1549 [...] The IPS if built into the firewall making decisions would have blocked most if not all of your sites email until you determined what the problem was.
I think here we think in black and white again. I know we're talking 0's and 1's here, but an IPS does not have to fire on ALL signatures. And it doesn't matter if we have a high or low rate of false positives. In neither case should an IPS block on any signature. Instead, you should be able to control which signature you can block. This is of course only my personal wish list and I don't know if certain vendors care about it or not. Most software that I've seen is flexible enough where the decision which signature/rule/event should perform an action is left to the admin to make.
When I am talking about this I am not referring to a site where the admin and the net engineer and the sec analyst are the same person or sit next to each other. I am talking more about the larger environments where they may not even know each others faces. Companies like this are the commercial target, not the small shops. [...] In your IIS double decode example you need to be really careful. What happens if the security analyst doesnt know that the Web devs just added an "upload a picture" page?
Yeah, you are correct. You typically have the router folks, which often do firewalls, and then the IDS folks. I'm aware that they often don't play nicely with each other. And I see the requirement of communication, and the risk of communication breakdown which may result in network breakdown. Now that you mentioned it, I will be more careful in reading ads for IPS's and pay attention to which camp they market to (router/firewall/infrastructure or IDS/security). Personally I don't see those two camps merging. It will be interesting to see how the IDS-firewall merger plays out in the political arena.
I hate to get into specific examples. I was just stating the case that *at this point and time* the technology is young and is *not there yet*. It does not threaten IDS nor does it threaten firewalls it is more of a *feature*. *At this point and time* it is very necessary to be cautious of the setup as it could waste many peoples time.
hehe... I fully agree. Thanks for highlighting the political aspect of IPS. I was always focused on the technology part (since I looked at it in a geeky sorta way). But I never thought about how the device actually fit into the organizational structure. In other postings I've seen we only touched the technical aspect, never the human/political/culture aspect. Thank again for emphasizing that. Cheers, Frank
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- New Trend: Intrusion Prevention Sheahan, Paul (PCLN-NW) (Dec 13)
- Re: New Trend: Intrusion Prevention Alberto Gonzalez (Dec 13)
- Re: New Trend: Intrusion Prevention Martin Roesch (Dec 13)
- RE: New Trend: Intrusion Prevention Ofir Arkin (Dec 14)
- Re: New Trend: Intrusion Prevention Kevin Black (Dec 15)
- Re: New Trend: Intrusion Prevention Frank Knobbe (Dec 15)
- Re: New Trend: Intrusion Prevention Kevin Black (Dec 15)
- Re: New Trend: Intrusion Prevention Frank Knobbe (Dec 15)
- RE: New Trend: Intrusion Prevention Ofir Arkin (Dec 14)
- <Possible follow-ups>
- RE: New Trend: Intrusion Prevention Steve Halligan (Dec 13)
- RE: New Trend: Intrusion Prevention Nathan Whitehouse (Dec 13)
- RE: New Trend: Intrusion Prevention Ibarra, Michael (Dec 13)
- RE: New Trend: Intrusion Prevention twig les (Dec 13)
- Re: New Trend: Intrusion Prevention Erick Mechler (Dec 13)
- RE: New Trend: Intrusion Prevention twig les (Dec 13)
- RE: New Trend: Intrusion Prevention SecurityAdmin (Dec 13)
- RE: New Trend: Intrusion Prevention Bob Dehnhardt (Dec 13)
- Re: New Trend: Intrusion Prevention Alberto Gonzalez (Dec 13)
- RE: New Trend: Intrusion Prevention Chris Eidem (Dec 13)
- RE: New Trend: Intrusion Prevention Sheahan, Paul (PCLN-NW) (Dec 16)
