FW: Intrusion Detection Systems: What you Should Know

From: Eric Toll (etollat_private)
Date: Thu Oct 21 1999 - 08:19:41 PDT

  • Next message: Dominick Glavach: "Re: RealSecure on Solaris"

    Intrusion Detection Systems: What you Should Know
    (ICSA Inc. White Paper and Robert Graham Web Site) 
    
         "Those reporting their Internet connection as a frequent point of attack rose for the third straight
         year; from 37% of respondents in 1996 to 57% in 1999." 
         - from the 1999 CSI/FBI Computer Crime and Security Survey 
    
    The widespread misconception that "there is nothing interesting for a hacker on my computer" is dangerous for at
    least two reasons. First of all, hackers may use your system as a starting point for breaking into other systems and for
    disguising the origin of the attack. Moreover, most of us have some data worth stealing -- credit card numbers and
    other financial information, passwords, etc. Why bother breaking into a well-guarded system of a large corporation
    when you can achieve the same result by robbing a few dozen little guys?
    
    Before rushing into deploying an Intrusion Detection System (IDS), you should thoroughly weigh potential benefits
    against total cost of using such systems.
    
         Why firewalls aren't enough. Not all access to the Internet occurs through the firewall. Some systems have a
         dial-up access point located behind the firewall. Not all threats originate outside the firewall. Many security
         incidents are traced to insiders. Security breaches of other server software can be exploited to gain access to
         essential system resources. "For example, in April of 1999, many sites were hacked via a bug in ColdFusion.
         These sites all had firewalls*" says Robert Graham, a computer security expert (http://www.robertgraham.com).
    
         IDSs are not silver bullets. Intrusion detection systems are only one part of the security infrastructure (other
         parts are physical security, user and access authentication, encryption, anti-virus systems, firewalls, etc.). None
         of the IDS solutions available offer you complete protection. IDSs are classified into "anomaly detection" and
         "misuse detection" categories (http://www.nfr.net/forum/publications/id-myths.html).
    
             Anomaly detection systems utilize heuristic algorithms to detect "abnormal" network traffic and alert the
             administrator. They tend to generate large numbers of "false positives" -- false alarms -- and sooner or later
             become ignored. To properly configure those systems and then constantly monitor and analyze their reports
             you will have to hire a dedicated security specialist, or your investment in IDS will be useless. 
             Misuse detection systems work in a similar way to virus scanners, trying to match network patterns with
             their database of "attack signatures." They don't bother you with many false alarms, but cannot detect
             something they do not "know" about. As a result, they provide your system with protection only from known
             automated hacking tools and "script kiddies" (mostly young, inexperienced hackers armed with tools created
             by more experienced hackers). More serious attackers can avoid any type of activities that trigger the alarm.
    
         Intrusion detection is not the only benefit of deploying a good IDS. What comes with it is the ability to perform
         vulnerability assessments of your systems and close the security breaches before they are exploited, a greater
         degree of integrity to the rest of your security system, and tools for gathering information for building a sound
         security policy. 
    
    If your company cannot afford (or cannot justify) purchasing and supporting a comprehensive IDS solution, using a
    simple misuse detection system might be a good option. You may be still vulnerable to the attacks of experienced
    hackers, but they are much more rare that those of automatic bots and script kiddies. However, if you run a
    mission-critical online system that just lures hackers with its informational content, consider hiring security experts and
    deploying a best-of-breed IDS.
    
    The following resources will help you better understand the area of intrusion detection, its terms and definitions, and
    where IDS fits in the overall picture of network security.
    
      1.First, read ICSA, Inc.'s white paper "Introduction to Intrusion Detection & Assessment" at
         http://www.icsa.net/services/consortia/intrusion/educational_material.shtml. 
      2.Next, check out Robert Graham's FAQs on Network Intrusion Detection Systems at
         http://www.robertgraham.com/pubs/network-intrusion-detection.html. 
      3.Finally, take a look at Network World Fusion's survey of the leading commercially available IDSs at
         http://www.nwfusion.com/reviews/1004bg.html. 
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:44:41 PDT