Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Future Of IDS 125

A reader wrote to us about a summary article regarding IDS ? . This is an interesting article in so far as it attempts to prognosticate what the future will be for detection, and that draws in some interesting work on security modelling. T: Readers may also want to see this vnunet article on IDS products -- guess what comes out on top?
This discussion has been archived. No new comments can be posted.

Future Of IDS

Comments Filter:
  • The article says it's hard to setup snort. What's so hard about: apt-get install snort?
    • H:\>apt-get install snort
      'apt-get' is not recognized as an internal or external command,
      operable program or batch file.

      I think I see his problem!
    • by Waffle Iron ( 339739 ) on Wednesday December 05, 2001 @01:33PM (#2660410)
      That sounds a little like the South Park underpants gnomes' business model:


      Phase 1: apt-get install snort
      Phase 2:
      Phase 3: Security!

    • There's a difference between installing an IDS and effectively using one once its installed. Finding somebody who can intelligently deal with the output from any IDS (snort, portsentry, whatever) is harder than finding somewho can do the initial setup.

      The company [trellisinc.com] I work for is set up to do centralized monitoring of lots of different IDS's (including a spiffy one we developed in-house) for our customers who don't want to deal with/can't afford to hire their own people. There are only so many admins in the world who know how to deal with an attack, and they usually want a lot of money for that. =)
    • The article says it's hard to setup snort. What's so hard about: apt-get install snort?

      Nothing's hard about that, but that isn't setting up snort.

      Let me know when "apt-get setup snort" is working.
      • Don't hold your breath:

        $ apt-get setup snort
        E: Invalid operation setup

        It's "apt-get install snort". And if you had actually tried it before (which we all know you haven't due to your syntax slip) you would realize that it is in fact that easy. It asks you a few questions as far as when eth card/ip to listen in on and then you are up and running. The default rules are quite reasonable and of course you are free to tweak the thing till the cows come home.
        • It's "apt-get install snort". And if you had actually tried it before (which we all know you haven't due to your syntax slip) you would realize that it is in fact that easy.

          It wasn't a syntax slip, cretin. It was a sarcastic comment on the fact that an installation is very different from a setup, and the fact that as any security professional can tell you (and pay attention, boy, because one is) Snort requires some setup if one wants it to actually help protect one's network, not just produce a nice warm fuzzy feeling that bears little relationship to reality.

          And for the record, if I actually try "apt-get" anything I'll get a "command not found" error because I don't do Debian. Not due to any deficiency in Debian, just because the Fortune 500 company for which I administrate a couple hundred UNIX servers uses RedHat.
          • Read what I said again you limp wristed simp. It *DOES* protect out of the box. You state yourself you "don't do debian". Well understand this: debian packages are put together with certain settings and config files you won't find in a plain old tarball. There is a default ruleset that works quite nicely right off the bat. But you already knew that since you are the fortune 500 "expert" right?
    • If you've got webmin [webmin.com] installed, there is also a Snort Webmin Module [msbnetworks.net]

      Disclaimer: I'm the author and v1.1 needs to be released soon :)

  • by doctor_oktagon ( 157579 ) on Wednesday December 05, 2001 @01:21PM (#2660318)
    Check this out for full info on a whole range of IDS systems ... hardware & software.

    Network Intrusion [networkintrusion.co.uk] ran by some guy who is extremely helpfull on the Security Focus IDS mailing list.
  • by pdqlamb ( 10952 ) on Wednesday December 05, 2001 @01:21PM (#2660327)
    I wonder if the author would credit things like my NetWatchman [mynetwatchman.com] or Security Focus's Aris [securityfocus.com] as large scale correlation efforts? I know it would probably be tough to get much more specific, as you could generate a huge amount of traffic trying to correlate every wierd package that hit many boxes.
    • Both of the projects he's mentioning are brilliant. They encourage people to disclose alerts so that the numbers can be leveraged en masse to get vendors and ISPs off their asses.

      This is the flipside to things like predictive agents and automated vulnerability testers. It improves security by social mechanisms. I'm going to look into using ARIS today, and if I can figure out how myNetWatchman works, I'll consider it too.

      I hope other readers are forming solid opinions about where IDSes ought to be headed by reading posts to this article. It has been informative for me, at least. (and I've been around this stuff for a while... sometimes I see packet headers in my sleep :-))
  • Um, details? (Score:4, Informative)

    by the_rev_matt ( 239420 ) <slashbot AT revmatt DOT com> on Wednesday December 05, 2001 @01:22PM (#2660330) Homepage
    That was one of the most content-free articles I've ever seen this side of USA Today. Any chance of tracking down a detailed side by side analysis of the products tested with pros and cons and maybe WHY they thought snort was so much better (not that I disagree, but vagaries don't tend to be terribly convincing when presenting to management).
    • Re:Um, details? (Score:4, Informative)

      by Flower ( 31351 ) on Wednesday December 05, 2001 @03:19PM (#2661021) Homepage
      Go to Snort's website. Note article "One Pig to Rule Them All." Find link directing you to here. [nss.co.uk] Fill in the required info and download 4MB pdf. It's going to take me awhile to digest the nearly 250 pages of this report.
    • It took me a while to download the report (/. effect no doubt) but now that I look at it, even a quick skim of the testing methodology shows some obvious flaws.

      Page 165: The Tests
      all available signatures enabled

      This is not a level playing field. The product that I helped build (ISS RealSecure [iss.net]) contains a number of signatures that are not intended to be turned on in normal usage. For instance, RealSecure can generate an even for every single HTTP GET request on your network, no matter how inane.

      This feature is intended to be used as a special purpose tool, for instance to analyze web usage over the short term. It is not intended to be turned on during normal IDS usage. If you do turn it on, it often overwhelms your console with tons of incidental data and rapidly fills your logs.

      Page 166-167: Performance Under Load

      Another RealSecure specific problem here is that RealSecure deliberately drops redundant reports and does not count them, so that you do not get inundated with a million messages that tell you the exact same thing. Therefore I would expect it to fare very poorly in the boping count test.

      Others in this thread have pointed out [slashdot.org] the danger of using tools like SMARTBITS to generate background traffic. The problem is that unless you really know what you are doing, SMARTBITS is likely to generate traffic that is entirely unrealistic. (For instance, TCP data packets that don't correspond to an actual open session that the IDS would have been tracking). This can cause both unrealistically good and unrealistically bad performance, depending on what the background traffic actually is and how the IDS is built.

      The assertion early in this section that "if a sensor detects 100 per cent of attacks at 100 per cent load in this test" (of minimum length packets) that it "can handle anything that islikely to be thrown at it" is patent BS. Yes this is the worst case scenario of "packets per second", but packets per second is not the most important metric here.

      I also note on page 177 and 178 in a footnote that neither RealSecure nor BlackICE were "re-tested for Edition 2", yet they are not reluctant to conclude that SNORT is better than the commercial products. I think we've got an apples and oranges problem here.

      I also question whether their assertion that all products were tested with their latest signature updates can possibly true, if they didn't retest all the products. Most of the commercial vendors release new signatures on a regular basis.

      (This is also true for the Cisco, CA, Symantec, Enterasys and other products in the comparison, if you read the footnotes carefully).

  • by NetJunkie ( 56134 ) <jason.nashNO@SPAMgmail.com> on Wednesday December 05, 2001 @01:23PM (#2660337)
    I'm about to deploy an IDS system at my work. When I met with the director and CIO about this they asked for recommendations, of course. I first suggested Snort. It's free, it works well, and I had used it before. But, since it didn't have someone standing behind it, the CIO wasn't interested. They rather spend $20K on another product. To them it is more important to be able to say "Hey, we were using product X from company Y! Don't blame us!" if something goes wrong.

    In places where the budget is a bigger concern I still implement Snort. I can't possibly afford to stick a commercial product on every subnet that I'd like to.
    • by cmg ( 31795 )
      Check out http://www.sourcefire.com if you are in that kind of situation
    • by iabervon ( 1971 ) on Wednesday December 05, 2001 @01:45PM (#2660495) Homepage Journal
      If budget isn't a concern, why not install Snort in addition to something else? That way you'll know when to blame company Y and what to blame them for missing. An IDS isn't like a fileserver where you can only really use one or another.
    • CEO's like $$$ (Score:4, Interesting)

      by jabbo ( 860 ) <jabbo@yahoo. c o m> on Wednesday December 05, 2001 @02:13PM (#2660663)
      That made it pretty damn easy for me to push Snort where I work.

      Only choads that are getting kickbacks from manufacturers are going to push for overpriced commercial solutions in shops that don't have an existing IDS installation or a compelling reason to use the packaged solutions (NetRanger, OpenView, their ilk).

      A packet is a packet... NFR and Snort are both designed by well-respected engineers who are more interested in accuracy and correctness than in unit shifting. I trust them for that.

      When you get right down to it, unless you're rolling in dough, why blow $20,000 per management station plus consulting costs to implement something your network administrator can probably set up in a week for free? (I know I can) It's stupid. Save the cash for your coke dealer or a rock for the missus.
      • by Krelnik ( 69751 ) <`moc.gnirpsdnim' `ta' `yelrafmit'> on Wednesday December 05, 2001 @02:47PM (#2660866) Homepage Journal
        That's all well and good, but have you ever tried to put SNORT with a large number of signatures enabled on a really high speed link that is well utilized?

        I am afraid if you do you are in for a RUDE awakening. The fact of the matter is that these $20,000 solutions cost that much for a reason, and the reason is they've spent years optimizing them for high speed links. This is something the hobbiest programmers who work on Snort cannot compete with. For instance, what open source coder has a SMARTBITS [spirentcom.com] on their desk? Something like that is essential to test these things, but they cost upwards of $10,000.

        So I would say yes, if all you want to do is monitor a T1 or two, and you're willing to tinker alot, something like Snort would work. But if you have a SERIOUS network with lots of bandwidth, you're gonna have to pony up the dough.

        Disclosure: I helped build one of the systems [iss.net] that Snort supposedly beat, and I analyzed the source code for another one [networkice.com] that was bought by that company. Snort CANNOT beat either one in a high bandwidth situation. I've seen the code, I've run the tests, trust me.

        I no longer work for that company so have little to gain by saying this.

        • I don't mean to flame you, but then why not head over and give the Snort ppl some pointers? I'm sure they would welcome code that helped improve system performance.
          • Unfortunately (for Snort) I helped build one of these commercial systems when I was at my previous employer. Therefore helping the guys improve Snort might put me in violation of my employment agreement. So I can't.

            And I don't think you were flaming, its a very legit suggestion.

            • Really? Even if you did not use the same code? If you went to the snort guys for example and gave them some general advice or performance tips? Would it violate your contract to say to snort "under these curcumstances we beat the pants off of you because we ran such and such subsytem more efficiently".

              Does your contract prevent you from pointing out where snort was slower and under what kinds of loads.
        • Any IDS vendor that is using a smartbits to test their NIDS should be flogged and then shot in the kneecap.

          Why? Because a smartbits doesn't generate "real" application traffic. They don't do ftp, http, smtp, h.323, etc. So what point is there in using it to test/benchmark the throughput of a NIDS which needs to look into these protocols? None- which is why a smartbits is used to test routers, switches and things of that nature- not NIDS or firewalls.

          Fact is I've used both ISS and Snort, and frankly they both suck. Both false positive up the wazoo. Only now that ISS is integrating the technology from NetIce are they able to have decent accuracy- and even then they've got a long way to go.

          Not to mention trying to compare NetIce to Snort is like apples and oranges. NetIce does protocol analysis and snort is mostly signature based. Anyone in the industry who is honest will tell you that sigs will detect more attacks but require more processing time than PA. The [networkcomputing.com]
          recent test by Network Computing is a good indication of this. (NetICE found 5/9, snort 8/9, Dragon, another sig based system found 9/9 attacks)
          • > Any IDS vendor that is using a smartbits to test their
            > NIDS should be flogged and then shot in the kneecap

            I am aware of the fact that SMARTBITS alone is not sufficient to properly test a network IDS. I was merely giving an example of the expense someone has to incur to set up proper simulation environments to exercise their products so they will have good behavior in real-world networks.

            SMARTBITS, while not sufficient by itself to properly test an IDS, is a tool that lets you push Ethernets to (and beyond) their theoretical limits. This is VERY DIFFICULT to do with other solutions.

            > > Not to mention trying to compare NetIce to Snort is like apples
            > > and oranges. NetIce does protocol analysis...

            I see that, like many, you have fallen prey to Network ICE's excellent marketing machine. Yes, it does do protocol analysis, but it is not unique in this respect. RealSecure (ISS'es product prior to buying Network ICE) did protocol analysis before BlackICE even existed. NETICE was just better at getting that marketing message out. (Reminder: I've seen the source code to both products, and wrote large hunks of one of them).

            • No, I'm not saying SMARTBITS isn't sufficent to test a NIDS alone- I'm saying that using a SMARTBITS is compelete assinine to test a NIDS since SMARTBITS is designed to test routers and switches not devices which deal with layers 3 and up such as NIDS and firewalls.

              If you can find me one NIDS review by a reputable 3rd party where they hooked up a NIDS to a SMARTBITS and reported the results I'll take it back.

              As for ISS/NetICE/Snort... my point was this:
              - ISS false positives so much that it is completely worthless. Now that they've got the NetICE tech, they should be able to fix this- time will tell.
              - Snort false positives way too much too (see an earlier post by me on this topic)
              - NetICE missed 45% of the attacks that NWC threw at it. Pathetic. I blame this for lack of signatures (which ISS/Snort/Dragon have and did significantly better in the test).
              • > If you can find me one NIDS review by a reputable 3rd party where
                > they hooked up a NIDS to a SMARTBITS and reported the results I'll take it back.

                Well for one, the review we are talking about, which you can download here [nss.co.uk], used a SmartBits (among other things) to generate background traffic during the performance tests. See pages 167 and 228 in the report.

                • Looked at the report. And their performance section is crap. Why? Simple... they used a SMARTBITS.

                  Say you have a NIDS and you know about various protocols: ftp, telnet, ssh, http, smtp, snmp, h.323, etc.

                  Now you have an ethernet frame which reaches the NIC, it has an ip header in it. You pass it up to the NIDS.

                  The NIDS says, cool, something to look at. And runs it's various signatures/protocol analysis (PA) against the packet. But NIDS vendors aren't totally incompetent- they realize it doesn't make sense to apply ftp sigs/PA against anything other than ftp. Same goes true for every other protocol. This not only reduces false positives, but significantly improves performance as well (since you do fewer tests/packet).

                  So what happens when a SMARTBITS generates traffic? Well it can't create a vaild TCP stream, let alone a vaild HTTP connection, so the NIDS isn't going to do all those expensive checks for any SMARTBITS generated traffic. The result is that all the SMARTBITS traffic is never processed like "real traffic" which artificially inflates the performance of the NIDS.

                  NSS even realizes this is a problem (if you read between the lines) on pg 167 when they say "future tests will continue to enhance the 'real world' packet mix ... by including complete sessions".

                  This is why a SMARTBITS works great for testing routers/switches/etc- they don't bother looking into the data portion or even the header info for protocols above layer 3.
        • by jabbo ( 860 ) <jabbo@yahoo. c o m> on Wednesday December 05, 2001 @07:35PM (#2662452)
          I can't speak to higher-end solutions, because as I mentioned in my response, I suspect they'll already have an architecture in place (eg. when I was at IBM Burlington, before Snort was even born, the setup they had created for monitoring ingress and egress traffic was far beyond what I've seen before or since).

          But for my live production hosts, dual-homed on UUNet and Qwest, and all monitored, Snort + Barnyard + ACID have kept up without clipping traffic or interfering with operations. And yes, we DO saturate both of those links on occasion (though not always).

          That's all I can speak to. When I worked at XOOM we saw traffic up to about 0.75Gbps steady and never bothered running an IDS, just were real fucking careful about what went live and keeping everything audited. An HP OpenView installation with some sort of IDS support was looking like $300K in bills. We said "fuck that" and to this day I wouldn't do any differently.

          But, my situation may be very different from yours. If you need a $20K solution and its presence saves you $40K, you sure as hell don't need my blessing to buy it!
    • I am the network and systems security administrator of a fortune 500 company that sells paperclips, and I can tell you that running snort in a major enterprise that has over 2000+ subnets is a joke.

      Simply aggregating the data from that many networks is a hassle, even if I only do it from the Internet and Store facing networks. Correlating data produced by Snort when you have over 20 gigs of aggregate backbone traffic is completely unreasonable.

      I heartily recommend ISS Real Secure Network Sensor. I am in the process of deploying 230 Network Sensor and Host Sensor agents. With the addition of the "Black Ice" technology, acquired when they purchased Network Ice, it is the best solution on the market.

      With their new Site Protector console, Data from all agents is correlated with scans performed by ISS Internet Scanner (works like CyberCop Scanner, or Nessus) and I don't get alerted if a system is not vulnerable!

      I can add new systems, run an Internet Scanner scan once a week, and rest easy that if I get paged at 1am, a hacker really has breached the gates...

      If Site Protector does not provide enough data correlation for you, you can get netForensics self titled product, or Open Systems Private Eye, and correlate the ISS data with your Cisco IDS's, Checkpoint and PIX firewalls, VPN boxes and routers.

      While Snort is great to see what is coming into my house, I would never deploy it in an enterprise where your security administrators want to do more than sift IDS logs...
    • Commercial support for Snort is available from both SiliconDefense (http://www.silicondefense.com) and Sourcefire (http://www.sourcefire.com) Martin Roesch's company. This may allay your boss's fear about vendor support...
  • ya know.... (Score:3, Insightful)

    by the_argent ( 28326 ) on Wednesday December 05, 2001 @01:25PM (#2660346) Homepage
    My biggest issue with IDS's is "So, what now?"
    For example, Yesterday I get hit with about 90 attempts to get cmd.exe on my webserver from one specific IP addy. So, a quick nslookup / whois later and I get the server name and contact info for the suspected malicious box.
    Since it's from a major site, I decide to contact them to let them know they may have a potentially compromised box on thier network.
    Three v-mails and two emails later, no word back from them.

    I'm all for IDS's, but aside from possibly dishing out some Louisville Slugger style 'cease and desist' requests, what good is the info?

    argent out
    • >what good is the info?

      You could firewall their entire netblock into oblivion.

      If you run an internet router, drop all their port 80 packets.

      If more service providers would do this then perhaps lazy companies would smarten up pretty quick if the internet they've paid for becomes useless.
    • I'm all for IDS's, but aside from possibly dishing out some Louisville Slugger style 'cease and desist' requests, what good is the info?

      At the very least: trend analysis. It's always good to keep an open eye to what the Script o' the Day is.

    • THe point of the IDS is not so you can crack down on anyone trying some exploit against your site.. it's so you might actually detect someone actually breaking into your servers.

      The point is to be aware, not to come down on them. If they knocked on the door, trying some exploit.. it's not worth your time to chase them down if it has no effect. On the other hand.. what if it turns out to be a rival company?

      I think the general idea is to be aware of what's going on. If you are aware, you can be prepared.

      If you look at a system like SNORT... it's not *really* and IDS. It's just something that checks for many, many common attack signatures. It tells you *nothing* about whether someone has intruded into your system. It's not really an IDS.

      Now. the Linux IDS stuff... that locks certain files at the kernel level and notifies admin if anything tries to change.. THAT is an intrusion detection system. Someone has intruted, tried to modify something they shouldn't.. now you KNOW you have an intruder.

      Triggers and such set up in some systems to detect when someone is where they shouldn't be is the real goal of an IDS.. not to tell you some new worm is trying to exploit your webserver.
      • by monkeydo ( 173558 ) on Wednesday December 05, 2001 @02:00PM (#2660583) Homepage
        SNORT is a Network IDS. What you are describing is Host IDS. Two different things. SNORT tells you what is going on in your network. HIDS tells you what is going on on and to your host.

        The point is to be aware, not to come down on them. If they knocked on the door, trying some exploit.. it's not worth your time to chase them down if it has no effect. On the other hand.. what if it turns out to be a rival company?

        The point is _detection_ as in the three prongs of security, Protection, Detection, and Response.

        Having a firewall (protection) without IDS (detection) is betting that your firewall is blocking everything bad, and not wanting to know if it isn't. Putting sensors inside and outside of your firewall allows you to see what is being attempted and what is being blocked. The IDS will flag things as possible attacks that will pass through the firewall, what you do when you IDS alarms is as important as having it in the first place.

        The Firewall is the lock on your front door, the NIDS is your motion detector, and response is the alarm company sending the police.

      • A true IDS is comprised of both a network agent AND a host agent. One of you got the leg, the other got the ear.

        Regards,
        ToeDruid
    • Re:ya know.... (Score:2, Insightful)

      by Zeshan ( 156109 )
      An IDS allows one to observe "the big picture" - to see if concerted attacks are coming from one particular source, or whether one is facing attack from what appear to be unrelated sources (as with Code Red). It enables one to selectively block hosts/subnets/ports as appropriate, to spot "well known" attacks and thus identify new attacks.

      And of course, and IDS logs can be valuable when it comes to forensic investigations.

      Zeshan
    • Re:ya know.... (Score:2, Insightful)

      by MadMorf ( 118601 )
      I have been using Snort for about 6 months and several times per week, in a normal week, I end up emailing log exerpts to SysAdmins and Abuse accounts all over The World...

      I get a very good response rate, possibly as high as 80%...100% if you consider that the offending activity generally stops shortly after I have reported it...

      Maybe it's the tone you're using...
    • My biggest issue with IDS's is "So, what now?"
      For example, Yesterday I get hit with about 90 attempts to get cmd.exe on my webserver from one specific IP addy. So, a quick nslookup / whois later and I get the server name and contact info for the suspected malicious box.


      What is the big deal here? You have an Intrusion Detection System, you detected an intrusion. Now, let them know you dectected them. I wrote a simple script that pings the host back on the port they scanned, kind of says "hey, im here, im watching you, DON'T mess with me, im not a moron".
  • Cool... the distributed IDS model (lots of listeners spread throughout the network reporting back home for analysis) is what we [trellisinc.com] engineered our product for. It's the only effective way to keep an eye on the whole network so you can see a distributed attack or an internal-to-internal attack.
  • by jabbo ( 860 ) <jabbo@yahoo. c o m> on Wednesday December 05, 2001 @01:29PM (#2660375)
    I would have thought SecurityFocus could handle a /.'ing, but I guess not. It's a shame since they are one of the good, unbiased sources for security info out there.

    Anyways, I want to throw in a shill for ACID [sourceforge.net] for anyone who runs Snort. It makes my job SO INCREDIBLY MUCH EASIER that, well, I bother to do it every day, maybe two or three times a day, and haven't had any major incidents to speak of. If you run Snort, you ought to log to a centralized database that can handle the traffic from all your sensors, and then grind through it with ACID for starters. Yes, you should keep a packet vault; yes, you should run Nessus; yes, you still need to use TripWire or Integrit for filesystems. But having a friendly, capable frontend to Snort sensors is a HUGE help.

    If you're running a lot of sensors and they get a ton of attacks in production, you should also look into the Barnyard plugin for Snort. It's nice for keeping things from slowing down.

    If I were to take a stab at what would MOST help IDS and ISS research in the near future, I'd guess at the integration of tools like Nessus and Snort with a predictive intelligent agent like Intravenous [packetninja.net] or similar. I wish I could comment intelligently on the article, but mostly I wanted people using Snort to be aware of HOW helpful the ACID frontend is, so that more people use it, and I have less subnets to blackhole ;-).

    • ACID looks great...but it requires PHP. :^/

      Does anyone have good information on how to compile Apache with mod_perl and PHP and SSL?

      • Don't know about the SSL side (haven't done it yet), but grab the sources for:
        Apache, Mod-Perl, PHP, (for PHP, make sure you have the proper graphics librarys installed also so that Acid can display graphs. What you need is in the Install file in the Acid Source.

        Here's what I used.. (Subsitute what ever version is current below)

        #Mod-Perl Install
        perl Makefile.PL \
        APACHE_SRC=../apache_1.3.20/src \
        DO_HTTPD=1 \
        USE_APACI=1 \
        PREP_HTTPD=1 \
        EVERYTHING=1 \
        [...]

        make
        make test
        make install

        #PHP 4 Install
        ./configure \
        --with-mysql \
        --with-apache=../apache_1.3.20 \
        --enable-track-vars \
        --enable-inline-optimization \
        --enable-ftp \
        --enable-sockets \
        --with-gd \
        --with-jpeg-dir=/usr/lib \
        --with-zlib-dir=/usr/include \
        --with-png-dir=/usr/lib \
        --with-freetype-dir=/usr/lib

        make
        make install

        #Apache Install
        ./configure \
        --enable-module=most \
        --enable-shared=max \
        --activate-module=src/modules/php4/libphp4.a \
        --activate-module=src/modules/perl/libperl.a

        make
        make install

        #add to Httpd.conf
        #AddType application/x-httpd-php .php

        Note, please decend into the top level of each source tree before executing command to configure, make and install.
        I know this is off-Topic, but there are several folks out there that can't figure out how to compile these together to get Acid to work correctly.
      • Another good one is apachetoolbox.com, it's a nice little shell script that does all that automatically.
  • by doctor_oktagon ( 157579 ) on Wednesday December 05, 2001 @01:30PM (#2660384)
    Installing and monitoring a large-scale IDS installation is a complex and involved process which is not simple!

    Snort may be cheap and easy to install, but many corporations buy IDS on the strength of the management and reporting capability.

    One of my clients went with Cisco Netranger IDS because it offers excellent Monitoring screens that are then staffed by a 24/7 response unit waiting for alerts on the border/dmz/back office networks. It then made it straightforward to sit semi-skilled staff in front of the consoles to monitor activity and alert a skilled technician (i.e. me in this case) if an amber or red warning occurred.

    While Snort may be free, you would have to roll your own management stations (though I guess someone has done this), and thus management costs creep in.

    PleasePleasePlease remember software costs are rarely in the price ... it's the process and management of deployment and operational running that costs the earth!

    DANGER: I'm not flaming snort, I just haven't had to chance to try and scale it up into an enterprise-type situation.
    • See my earlier comment about ACID. Multisensor correlation and alert grouping, emailing of packet traces to offenders or CIO's, pretty much all you could ask for.
      <p>
      Try it. <a href="http://acidlab.sourceforge.net/">ACID homepage</a> You may be pleasantly surprised at how easy Snort is to scale up. I have numerous sensors, all in production, all logging on all interfaces, all the time, and haven't had any major incidents on my subnet. I credit this partly to having early warning of when some idiot tries to attack my boxen, as well as to using <a href="http://firedrake.org/thothproject/">Thoth</a > for host monitoring, which makes it trivial to check that all my daemons are up-to-date, and all kernel patches are installed.
      <p>
      Someone pisses me off consistently, they get blackholed. This is something I'd recommend doing by hand, of course, but for people whose business I don't need or want, it's a great way to end the problem right then and there. :-)
      <p>
    • Note: I fucked this up the first time by posting it as 'Extrans' when I meant to use HTML formatting. D'oh. Anyways, I've got karma to burn, so here's another whack at it...

      See my earlier comment about ACID. Multisensor correlation and alert grouping, emailing of packet traces to offenders or CIO's, pretty much all you could ask for.

      Try it. ACID homepage [sourceforge.net] You may be pleasantly surprised at how easy Snort is to scale up. I have numerous sensors, all in production, all logging on all interfaces, all the time, and haven't had any major incidents on my subnet. I credit this partly to having early warning of when some idiot tries to attack my boxen, as well as to using Thoth [firedrake.org] for host monitoring, which makes it trivial to check that all my daemons are up-to-date, and all kernel patches are installed.

      Someone pisses me off consistently, they get blackholed. This is something I'd recommend doing by hand, of course, but for people whose business I don't need or want, it's a great way to end the problem right then and there. :-)

  • by IgnorantKnucklehead ( 324494 ) on Wednesday December 05, 2001 @01:31PM (#2660389) Homepage Journal
    Once a system is compromised there is no way I would trust anything on it again until I pulled it off of the 'Net and did a complete reinstall. IDS is good to let you know your box is cracked and perhaps what may have been accessed/tampered with, but it's the last stage in security. Build yourself a good firewall, be careful with your access rights, and have a good password policy.
  • The future of IDS obviously lies in improving overall Webcurity.
  • by JimPooley ( 150814 ) on Wednesday December 05, 2001 @01:42PM (#2660476) Homepage
    The future of IDS is that he will stand down as leader of the Conservative Party after they lose the next election, at which point he'll get a big fat job with some big firm in The City and disappear into obscurity.

    What?

    Intrusion Detection Systems? You mean this isn't about Iain Duncan Smith?
    • Yes, I was a bit confused by all this. I'm not sure that these people know what their talking about, and it is potentially libelous.

      Basically, they are saying that Iain Duncan Smith has been hacking into computers and taking Snort, right?
  • I agree, snort is the best. But the area that needed inprovement for the sysadmin is the frontend. You might want to check out http://www.demarc.org/ Their frontend is very nice. But does take a bit to get installed correctly.
    • Cmon snort is very primitive, but it's very good at what it does. We really need a system that does time-domain, frequency and network-wide corellation, as well as finding the meta-patterns for attacks and sharing them w/ other network IDS. Btw, are there any RFC's for IDS data interchange?
  • All in all this article is nothing more than an excuse for open-source zealots to toot their own horns a bit. Don't get me wrong, but Snort is a great application - you won't find a better feature/price ratio.

    The thing is that it's just a summary - no methodology is discussed - no results from the tests with any of the vendors - no reasons at all are given for crowning Snort the king.

    Hell, for 10 minutes of work, I'll put up a web page that says Apache running off my wristwatch is the ultimate in web serving. Doesn't make it true...
    • by Flower ( 31351 )
      Find the report. [nss.co.uk]

      From a brief initial read, it seems to be a fair review. It requires more work than the commercial offerings but is more flexible. And for their tests, they got comparable performance to the commercial products. To give a brief quote:

      Configured correctly, it also turns in a performance every bit the equal of (and often superior to) commercial products costing many thousands of pounds.

      You are right however, the current links are mostly fluff.

  • Since SecurityFocus is already /.'d I've mirrored the article on my site. http://www.computersecuritynow.com/article.php?sid =192 [computersecuritynow.com]
  • Not likely. This is an assertion I've seen being made by the IT media for the last two years that I've been doing IDS. IPsec & IPv6 were touted as making IDS obsolete.

    The fundamental fact is that we will never get to the point where all traffic sent out over the great big I is encrypted. Its a matter of simple economics. Things like publicly available web sites, DNS, and even email don't need to be encrypted, nothing is gained by protecting that data. That's why it's a public service. Therefore, content providers (those deploying IDS) will never fork out the $$$ to buy equipment which can handle the load produced by millions of daily transactions that come down to just to encrypting index.html and decrypting GET index.html requests.

    As an IDS analyst for the last two years in a Fortune 10 company, I can tell you from first-hand experience that 90%+ of the attacks we see on a daily basis are HTTP-based. DNS comes in second, because guess what? It's one of the needed public services offered by content providers on the Internet. Why encrypt data you're offering out to the whole world?

    Nice article for CIOs, but I'm getting tired of hearing that encryption is going to get rid of NIDS. It's an omega point that we'll just never get to.
    • Why encrypt data you're offering out to the whole world?

      Just because it goes over the internet doesn't mean it's no private. Financial, insurance, and login information, among many others. All of these things go through "public" web sites. I work for a bank. Most of our web traffic travels under the covers of SSL.

      Right now, we're implementing an SSL terminator near the front door. SSL doesn't have to terminate on the web server. If it doesn't, you have the ability to let your SSL move across the web farm, not being server-bound anymore, never mind the overhead SSL imposes on a web server. Does moving SSL traffic unencrypted across the network between firewall and server squick me? You betcha. Does it squick me as much as not seeing IDS on the majority of our traffic? No way.

      Even with IPv6 and IPsec, IDS isn't going away anytime soon, for exactly the reason outlined above.
  • by Anonymous Coward on Wednesday December 05, 2001 @02:17PM (#2660698)
    So, having read both of the articles, I don't see anything in here about the "future" of IDS. Everything in the IDS world relates to pattern matching and speed.

    The problem with that is that the number of alerts does not determine the efficiency and efficacy of an IDS does. As Stefan Axelsson points out in his paper "The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection [raid-symposium.org], the real limiting factor in IDS performance will ALWAYS be the number of false positives generated.

    Unfortunately, not many people seem to be working in the direction to deal with that problem. Most of the major IDS vendors are talking only in terms of getting faster, and having more rules.

    The only company I've actually seen that is looking at any new paradigm to deal with this problem is nCircle [ncircle.com]. Their system has an IDS and a vulnerability scanner working together to accomplish the reduction in false positives.

    It's not a perfect system, but it performs significantly better than any of the IDS products that I've seen. And it definitely shows some sort of vision into the future, and into dealing with the real problems with the way IDS is currently done.

    Just my $0.02...
  • They (VNU) seem to be blocking on the HTTP_REFERER header. Copy & paste the URL into a separate browser tab (or window for the non-moz / Konq users :) and hit return. Or use wget.
  • by Mr. Sketch ( 111112 ) <`mister.sketch' `at' `gmail.com'> on Wednesday December 05, 2001 @02:28PM (#2660766)
    I was browsing the other vnunet articles and saw that according to another article on vnunet.com writing Linux viruses is easy. They claim that "It is a stable OS, but it's not a secure OS." so it will most likely be a target next year.

    I could try submitting this to /. but they'll probably think we've had enough security articles for one day and it'll get rejected and no one will read it.
    • Here's [vnunet.com] the link, sorry. I was sure I did a preview and it showed up, oh well.
    • I read the article you linked to, and I'd have to reject it. It was an interesting idea, but a poor article (okay, that doesn't in any way mean it wouldn't be posted to /.)

      First, the guy who gave that quote is from McAfee. They are complacent. They sell loads of software for one platform, and have no interest in writing software for Linux. Scaring people away from it will keep down the market. Either that, or they don't know how to improve upon the existing security.

      Second, advocating security through obscurity again backs up their market share. It's also been proven time and again to not work.

      This is not to say that the article wasn't without it's good points. Social engineering can work just as well with Linux users as Winxx users. As the Linux base grows, they will become a more welcome target (especially if they are a firewall protecting all of those juicy WinXY boxes behind them). And yes, Li0N and Ramen 'prove' that Linux is not 100% secure. But only a few psychos claim that anyway.

      The reason that I think the general premise of the article (Linux will see big cracks soons) is that doing cracks on M$ stuff is so trivially easy at this point, and it hits a lot of machines. Spreading stuff via .vbs scripts makes anybody a hacker (just like writing vbs programs makes anybody a programmer). Hitting a bazillion Outlook users is way easy. The kidz doing these things aren't interested in seeing how something works, or how to break it. (IOW, they are reading 2600 'for the pictures', not the articles;)

      As long as Linux (and BSD and others) remain non-trivial to crack, M$ will remain the platform of choice.
  • The State of IDS (Score:3, Interesting)

    by SkewlD00d ( 314017 ) on Wednesday December 05, 2001 @02:42PM (#2660839)
    Hi, I currently work in the UC Davis [ucdavis.edu] sec lab [ucdavis.edu] (current project(s): HACQIT).

    The basic problem with all IDS is in the confidence level of determining if something is an attack or just random garbage. Also, IDS have to be fast. If there's too much traffic (if you've been /.'d), you may not be able to check all attacks. Some methodogies start from the approach that deviating from a set of known safe operations is considered suspect. Other IDSes approach it from checking against a known-attack database. We're currently working on genetic algorithms and expert systems to correlate sensors and systems to detect and respond to attacks. The best approach I've seen is a complete kernel-level instrumentation of all system calls that's transparent and mostly undetectable. It would probably be DoS-able as well. The main prob is that you realy gotta have another comp to offload IDS checking.

    Right now, nearly all IDSes are extremely primitive and consist of nothing more than snort [snort.org] rules [snort.org] and Perl [perl.com] scripts that call ipchains [samba.org] or something.

    Btw, I went to RAID 2001 [raid-symposium.org] this year (hosted at UCD), it was fairly interesting.
  • prognosticate? (Score:1, Offtopic)

    by ragnar ( 3268 )
    Heh... I thought he made that word up, but it appears to be in the dictionary [dictionary.com]. (popup ad warning)
  • by adturner ( 6453 ) on Wednesday December 05, 2001 @03:16PM (#2661003) Homepage
    I'm sure i'm going to get mod'd down or marked flamebait for this, but here it goes...

    Has anyone ever bothered to actually READ the Snort signatures? I actually spent quite a few hours going over them and found a number of things:

    1) Massive false postives. Almost all of the HTTP signatures only look for a request to a vulnerable CGI/ASP/etc, not for the actual exploit. This means perfectly normal/valid requests generate alerts.

    2) Many sigs are easy to avoid. For HTTP sigs that actually try to look for the exploit it's generally a matter of putting a fake &var=value between the ? and the exploited param since Snort can only do simple string matching.

    3) Many sigs are just plain stupid. I love the one that looks for the string "I love you" everywhere in all SMTP traffic. Heaven forbid someone at your company email their wife/husband/etc.

    4) There's a number of sigs that have hard-coded strings for specific BROKEN exploits. Basically, they'll detect the broken exploit, which will catch the scriptkiddies, but anyone with half a brain who fixed the exploit won't be detected.

    Unforunately, tuning the IDS (turning off signatures) isn't a valid means of reducing false positives since it makes you completely blind to the attack. Which means you either get deluged with alerts or miss legitimate threats to your network.

    Honestly, I got so fed up with Snort and wasting my time with it, that I finally decided to get rid of it and spend the saved time being more proactive in securing my systems.
    • The problem with snort and almost all other IDS systems is pattern matching.
      In other words, every packet that enters the system (detection area, based on whether the detection is network based or host based).

      The cause and effect is two fold. A packet with a string contained therein may be detected falsely as an attack can be masked by using unicode or shell code, etc.
      the second effect is that since each packet or stream is matched against every pattern in the database, is that the engine is easily bogged down and with some simple techniques, can be made to drop packets in order to not kill itself off.

      There is no perfect solution for this that I know of..
      however, there are more efficient ways to handle both these problems.

      Packet and Stream disassembly can be used to reduce the amount of overhead and greatly reduce the anmount of mis-detections (both false positive and false negative).

      First, breaking down the stream to determine protocol, source, destination, payload, etc..

      once a stream is broken up, analyzing it for content is much simpler and quicker becuase you dont have to check all the unklreated traffic against all the signatures in the database.. only those which pertain to the specific protocol in use, if any matching is necessary at all.

      Now.. this technique can be done right and be done very wrong. do it wrong and youll spend much more time disassembling things and using more resources than the pattern matching engines.

      Doing it right means quickly limiting the amount of matching that needs to be done and reducing overhead even in high traffic situations.

      Of course, as with any method, there are weaknesses. This method can reduce cpu and memory requirements, increase accuracy and reduce false negatives and false positives.

      As another colleague pointed out, IDS is an early warning system. In any of its incarnations, its nearly innefective without escalation and constant monitoring.

      LW-
  • Links (Score:3, Interesting)

    by GrEp ( 89884 ) <crb002@gm a i l.com> on Wednesday December 05, 2001 @03:24PM (#2661046) Homepage Journal
    Here are some links to Intrusion Detection systems being developed at Iowa State. They [issl.org] are offering fellowships [issl.org] for those interested in doing graduate work in computer security. Here is a link to one of their papers on distributed intrusion dection.

    Automated Discovery of Concise Predictive Rules for Intrusion Detection [iastate.edu]
  • Snort & BigBrother (Score:2, Informative)

    by haeger ( 85819 )
    Snort combined with the equally free BigBrother [bb4.com] gives every admin exactly what he wants. Secure net with an easy to monitor interface. If I'm not mistaken there was an article in SysAdmin [sysadminmag.com] not long ago about hooking Tripwire into BigBrother [samag.com]. The same should be able to do with Snort, shouldn't it?

    /Haeger
  • I've been doing enterprise network security monitoring for over three years, in military and commercial sectors.

    First, most IDS users focus on eliminating "false positives." This mindset, and especially ISS' goal of "zero false positives," is misguided.

    I treat every IDS event as an "indicator," in the military intel idea of "indications and warnings." If I tell my IDS to find "X", and it reports "X", is that a false positive if "X" doesn't mean compromise? No, it's my responsibility to evaluate that indication by performing correlation and looking at the bigger picture.

    Second, most IDS developers seem to focus on the detection aspect, i.e., can we detect at gigabit speeds? Can we detect Unicode-encoded attacks? This is necessary but not sufficient to perform network security monitoring.

    IDS vendors need to understand that ESCALATION is the goal, not just detection. If the IDS doesn't provide enough supporting data to help me make a judgement without physically inspecting the target, why bother alerting at all? Why flash the red alert light if I must call the customer or do computer forensics to find out if the box is hacked?

    Expect more rants in the form of a book (hopefully) late next year or sometime in '03.

    Helevius

  • You can get the real IDS report from the NSS group at http://www.nss.co.uk [nss.co.uk]. at no charge.
  • I found this to be underdocumented when recently configuring snort.

    in snort.conf:

    change

    var EXTERNAL_NET any

    to

    var EXTERNAL_NET !$HOME_NET

    Otherwise, you'll see all your local hosts matching rules meant for external traffic. That's a little confusing.

  • Security consultant NSS Group tested 16 IDS products from big vendors including Cisco, ISS, Computer Associates and Symantec, along with one freeware open source product called Snort.


    Why oh why do they always call it freeware wrongly [gnu.org]?
  • Much of what he writes is the Network ICE business plan from three years ago:
    • To combat switches, we created the concept of putting network-IDS on the host.
    • We also produced the first gigabit IDS (several customers are running today at a full 1-gbps, many are above 500-mbps).
    • The issue of "noise" is always an issue (especially "true positives" -- how many care about port 80 probes from the Internet these days?), but BlackICE has exceedingly few false positives -- it is not a major issue our customers complain about (the "protocol-analysis" technique we use results in a fraction of false-positives that "pattern-search" technology most other IDSs use).
    • The author claims "more rules hurts performance". Nope, BlackICE doesn't have that problem -- it doesn't even have the ability to turn off rules. You can either disable protocol-analysis modules (like HTTP, FTP, etc.), or you can ignore events after they trigger (like PHF), but you can't really turn off individual rules from triggering in the first place.
    • The future of networking is IPsec. BlackICE already integrates well with virtually all VPN engines, and we are working tightly with Microsoft to make sure that we can always decrypted traffic (making sure APIs are always available). We are doing nifty stuff with SSL integration with web-servers as well. Again, this is part of the idea of putting network-IDS on the host.
    • The author mentions Hogwash, which is inline Snort. He isn't aware that BlackICE Guard inline IDS has been shipping for much longer.

    As I said, this was the Network ICE business plan from three years ago. We built a product to address these issues, we shipped it, we were successful, and this product is being mixed with the rest of ISS's technologies to become RealSecure 7.

    I hate to come out with a "vendor" message, it is just that the author is most familiar with Snort, where these things are issues. He makes the assumption that other products are just commercialized versions of Snort. This isn't true -- at least in the case of our commercial product, it isn't related to Snort at all. He is maybe describing "The Future of Snort", but this is three years old for BlackICE.

  • Several comments (Score:2, Informative)

    NOTE: I'm the author of Snort, so I may be opionated on this topic...

    I just got in from a busy day and what do I find but a little Snort action on ole Slashdot...

    So, I've got a few comments about the comments:

    Snort signatures and the quality thereof. Anyone who complains about the quality of Snort signatures is a lazy bastard, they're open source and easy to modify, if you find that much wrong with them make the appropriate changes and mail them back to me or Brian Caswell [mailto], our own official Snort Rules Nazi. Just because we write Snort sigs doesn't mean you have to use them, the original concept behind Snort and the rules files that came with the distro was that the users could look at examples of how to write them and develop their own set for the site they were protecting. This has gotten way out of hand over the past three years and has blossomed into the approximately 1300 rules we have now. The quality isn't always the best, but we're working on it (and if you've been tracking them over the past 6 months they've gotten much better.

    Performance. People from ISS talking about the superior performance of their solution is laughable, it's been shown repeatedly in third party IDS [networkcomputing.com] roundups [nss.co.uk] that Snort performs on par with or better than almost all of the other commercially available NIDS solutions out there. In fact, I know of one large entertainment company that sank a decent chunk of money into hardware that's running Snort at OC-12 speeds on their network successfully with no packet loss at all. Moral of the story? IDS performance is tied directly to the configuration and horsepower of the sensor hardware. No big revelations there. The fact of the matter is that's Snort's capabilities and performance keep increasing as we continue to develop it. We're also about to revisit some major architectural components of the system as we begin development on Snort 2.0 this month, but that's a different topic...

    Love Snort but need a commercial company to back it? Check out Sourcefire [sourcefire.com], a company that I founded this year precisely to do that. We are selling network IDS appliances complete with a web-based GUI, data analysis console, and full blown configuration management system built in. We're also working on a Management Console appliance that will allow you to deploy and manage a distributed Snort NIDS infrastructure and manage all the data that comes out of the system and perform multi-sensor correlation.

    Rapid response. When the shit hits the fan on the Internet, Snort is usually the leader in getting out new sigs to the user community. Case in point, the W32/Voyager MS SQL worm [cert.org] that recently came out, we were the first with sigs to pick it up.

    So in the end, Snort gives you speed and accuracy (in that I mean you can identify specific exploits very precisely), has an active development and user community and is flexible to meet users needs. I think that this is a really good combo for most people's needs. Now that Sourcefire is out there, I think that the needs of "pro" users can be satisfied as well as those of the open source world.

    On the other hand I might be biased, as I did write the thing... ;)

    -Marty

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...