Re: [logs] most popular reports...?

From: Anton A. Chuvakin (anton@private)
Date: Tue Aug 31 2004 - 10:37:48 PDT


>Well, part of this is obviously the heavily-entrenched `signature'
>mentality which characterises the (vast) majority of system monitoring/log
>analysis/intrusion detection/antivirus/spam handling products today.

And, it seems there is a reason for that. The signature stuff actually
works (to some extent...)! IMHO, what is more important for its commercial
viability, it also seems easier to _demonstrate_ that it does work ("See
how many CodeRed attempts we got...  horrible, isn't it ... yeah, I know
its a 3 year old worm..." :-)) On the other hand, it seems that
_sometimes_ 'anomaly detection' is just another way of saying 'it MIGHT
work, just not today' :-) Reading many of the anomaly detection papers
that were published over the last 20 years, makes one wonder why all
_leading_ commercial NIDS are signature-based (or built upon the
signature-based cores with some anomaly pieces added). Note that I don't
discount statistical anomaly detection (I think it rocks!), I am just
somewhat skeptical about its current state as applies to producing
_actionable_ alerts...

>My contention:  if you can't enunciate such a thing, then the concept of
>`anomaly' is almost certainly poorly defined.
Even if you can, but chose a poor model - your anomaly detection will
likely boil down to an "improved random event generator" :-)

Best,
--
Anton A. Chuvakin, Ph.D., GCIA, GCIH
     http://www.info-secure.org
   http://www.securitywarrior.com



_______________________________________________
LogAnalysis mailing list
LogAnalysis@private
http://lists.shmoo.com/mailman/listinfo/loganalysis



This archive was generated by hypermail 2.1.3 : Tue Aug 31 2004 - 11:57:06 PDT