10 Intrusion Detection FAQ
10 Intrusion Detection FAQ
(http://www.sans.org/newlook/resources/IDFAQ/ID_FAQ.htm)
cause a UNIX system to become extremely vulnerable to network attack. To refine the
string signature to reduce the number of false positives, it may be necessary to use a
compound string signature. A compound string signature for a common Web server
attack might be "cgi-bin" AND "aglimpse" AND "IFS".
Port signatures simply watch for connection attempts to well-known, frequently
attacked ports. Examples of these ports include telnet (TCP port 23), FTP (TCP port
21/20), SUNRPC (TCP/UDP port 111), and IMAP (TCP port 143). If any of these
ports arent used by the site, then incoming packets to these ports are suspicious.
Header signatures watch for dangerous or illogical combinations in packet headers.
The most famous example is Winnuke, where a packet is destined for a NetBIOS port
and the Urgent pointer, or Out Of Band pointer is set. This resulted in the "blue screen
of death" for Windows systems. Another well-known header signature is a TCP packet
with both the SYN and FIN flags set, signifying that the requestor wishes to start and
stop a connection at the same time.
Well-known, network-based intrusion detection systems include AXENT
(www.axent.com), Cisco (www.cisco.com), CyberSafe (www.cybersafe.com), ISS
(www.iss.net), and Shadow (www.nswc.navy.mil/ISSEC/CID).
A good ID capability will use both host- and network-based systems. Figuring out
where to use each type and how to integrate the data is a real and growing concern.
best when they're implemented together. Having an intrusion detection system that
can alert you to unauthorized attempts on your system has little value unless an
incident response plan is in place to deal with problems. The most important part of
overall security organization is the security policy. You must know what you need to
protect and to what degree. All other layers of the security model follow logically
after the implementation of the organization security policy.
In summary, an intrusion detection system is just one component of an effective
security model for an organization. The overall security integrity of your organization
is dependent upon the implementation of all layers of the security model. The
implementation of the layered approach to security should be undertaken in a logical
and methodical manner for best results and to ensure the overall sanity of the security
personnel.
The work done by Common Vulnerabilities and Exposures (CVE) Editorial Board is a
result of a collaborative effort, which will advance and standardize attack names and
definitions across vendors. Since its implementations (1999), a large number of
organizations have declared that they are working to make their product or database
CVE-compatible. This list can be viewed at http://cve.mitre.org.
Tomorrow's IDS
Due to the inability of NIDS to see all the traffic on switched Ethernet, many
companies are now turning to Host-based IDS (second generation). These products
can use far more efficient intrusion detection techniques such as heuristic rules and
analysis. Depending on the sophistication of the sensor, it may also learn and establish
user profiles as part of its behavioral database. Charting what is normal behavior on
the network would be accomplished over a period of time.
Strength
Limits
Not a cure-all for most security ills
Produces false positive (false alarms)
Produces false negative (failed to alarm)
Large-scale attacks could overwhelm a sensor
NIDS cannot properly protect high-speed networks
All products have weaknesses
Not a replacement for:
well managed firewall
regular security audit
a strong security policy
As part of the Total Defense Strategy of an organization, they offer additional
protection and deterrence against:
Script kiddies
Hackers
Would-be hackers
Crackers
Industrial espionage
Elite Blackhat