Re: Intrusion Detection

From: Marcus J. Ranum (mjrat_private)
Date: Wed Apr 15 1998 - 14:19:48 PDT

  • Next message: Wright, Steven: "RE: Intrusion Detection"

    Eric Maiwald writes:
    >I think you are missing one important capaiblity of attack
    >recognition tools, if I place the tool inside my firewall,
    >I can configure it to tell me if my firewall is not behaving correctly.
    
    	Yeah! This is what I'm talking about!
    
    	What's interesting in this example (the firewall) is the
    assumption that your IDS can understand what "correct" behavior
    of the firewall is. What that means is that you'd be able to
    invert the firewall's policy, or somehow have an IDS that was
    coupled to your understanding of what should and should not
    work through the firewall. That's what I've been calling this
    "policy-based IDS" stuff: when you know a priori what should and
    shouldn't happen and look for cases where what shouldn't happen
    is happening. It could be that someone has gotten behind your
    firewall and is attacking out (!) or that someone is attacking
    behind your firewall because they got in through it or they
    got in some other way -- at that point you don't care because
    you know you shouldn't be seeing a high level of attacking
    activity on your network behind your f/w.
    
    	It's always dangerous to argue by analogy, especially in
    a mailing list, because they get stretched pretty far out of
    shape, but let me try because it illustrates how I think of the
    problem....
    
    Home Burglar Alarms
    	I have a burglar alarm. It triggers an alert when one of
    a limited set of conditions occurs:
    	1) a door or window into/out of the house is opened
    	2) glass is heard to break
    	3) certain interior doors/hidden switches are triggered
    
    	This alarm system is tailored to my requirements. I have
    cats. A passive infrared or microwave motion detector alarm
    would generate zillions of false negatives thanks to the
    furfoots. With the current system, I can still be fairly comfortable
    with my policy that nobody enters or exits (because the cats can't
    operate doors very well, though they could if they tried). They
    may periodically knock over something glass and generate a false
    positive but that is a low-likelihood event and I can justify
    the chance of the false alarm.
    
    	So, my security is entirely based on notifying me when my
    perimeter firewalls/doors have been breached. At that point I know
    my policy has been violated. Up until that point, I don't care what
    happens. So, a burglar could walk up on my porch and case the house.
    So could the UPS delivery. If my alarm went off whenever that happened,
    I'd very quickly learn to ignore it.
    ------------------------------------
    
    	I guess I could enhance my household security by adding a
    set of video cameras that recorded license plates on the road
    in front, and which recorded movement in the yard. That way I
    would have valuable forensic information in the event that my
    main security system was compromised. But I couldn't slave the
    cameras to the alarm: there are deer out here.
    
    	So, the trick is clarifying how your IDS should interact
    with your security policy. Out here where I live, maybe it'd
    not generate a lot of false positives if the alarm went off
    whenever someone touches a window or rattles a doorknob, let
    alone succeeds in opening a door. In an urban environment, that
    might not work. Succinctly:
    
    	We must balance the irritation of false positives against
    the value and significance of a genuine alarm
    
    	I believe that the best way to do that is to be able to
    clearly define what should and should not happen, as a
    precondition to installing the IDS. An IDS that isn't "tuned"
    right is going to be a nuisance or a doorstop. My previous mail
    was not intended to be a slap at misuse detection "network grep"
    IDS'! After all, I build a product that can do that kind of thing
    very well. I just want to see people get the best results possible
    out of them. And the best way to do that is to be very cognizant
    of the environment into which they are installed, and its operating
    principles ("policy").
    
    mjr.
    --
    Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
    work - http://www.nfr.net
    home - http://www.clark.net/pub/mjr
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:54:43 PDT