Re: Intrusion Detection

From: tqbfat_private
Date: Tue Apr 14 1998 - 14:34:04 PDT

  • Next message: Itai Dor-on: "Proxy server 2.0 research"

    > There are 2 basic categories of IDS (though I am beginning to believe
    > there is a 3rd): Anomaly Detection and Misuse Detection. The AD-IDS
    > approach is to try to "understand" what constitutes normal traffic
    > for the network, and look for things that aren't "normal." The MD-IDS
    
    Be careful that you don't limit consideration of intrusion detection to
    network traffic. While the bulk of the deployed systems are probably all
    network-based, the bulk of the systems that have been developed are not.
    There are lots of interesting prototypes that examine specifically the
    actions of a user on a single system, using audit trail information. 
    
    > in its simple form is fairly limited and easy to get around. What
    > they neglected to mention is that MD-IDS will catch a lot of the
    > "ankle biter" hackers until they get better tools or learn what
    
    ... well, we thought it was implied. =)
    
    > What can the various IDS detect? In theory, an AD-IDS will detect
    > anything and everything. Of course, while it is doing so, it will
    > generate high numbers of false alarms. In Theory an MD-IDS will
    
    I don't know that I agree with this. One of the basic flaws of "AD-IDS" is
    that not every attack involves "anomalous" transactions (of course this
    depends on the model you use to classify anomalies, which I guess is one
    of the tricky aspects of AD-IDS). A related issue is the fact that systems
    that "learn" to detect attacks can also "learn" to tolerate them. 
    
    As a concrete example, there is IDS literature that, in discussing a
    methodology for building anomaly detection systems, suggests that a good
    plan is to run down all the aspects of your {system,network,...} that you
    can quantify, and specific things to monitor that they came up with
    included things like network traffic levels. I suspect the minority of
    known attacks would cause unusual amounts of network traffic.
    
    I guess the point here is that AD versus MD is not a black-and-white issue
    of completeness versus accuracy. (Not that this is what I think you're
    saying). 
    
    -----------------------------------------------------------------------------
    Thomas H. Ptacek			     		Secure Networks, Inc.
    -----------------------------------------------------------------------------
    http://www.enteract.com/~tqbf				"mmm... sacrilicious"
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:54:20 PDT