Firewall Wizards mailing list archives

FW: Intrusion Detection Systems: What you Should Know


From: "Eric Toll" <etoll () syracusesupply com>
Date: Thu, 21 Oct 1999 11:19:41 -0400

Intrusion Detection Systems: What you Should Know
(ICSA Inc. White Paper and Robert Graham Web Site) 

     "Those reporting their Internet connection as a frequent point of attack rose for the third straight
     year; from 37% of respondents in 1996 to 57% in 1999." 
     - from the 1999 CSI/FBI Computer Crime and Security Survey 

The widespread misconception that "there is nothing interesting for a hacker on my computer" is dangerous for at
least two reasons. First of all, hackers may use your system as a starting point for breaking into other systems and for
disguising the origin of the attack. Moreover, most of us have some data worth stealing -- credit card numbers and
other financial information, passwords, etc. Why bother breaking into a well-guarded system of a large corporation
when you can achieve the same result by robbing a few dozen little guys?

Before rushing into deploying an Intrusion Detection System (IDS), you should thoroughly weigh potential benefits
against total cost of using such systems.

     Why firewalls aren't enough. Not all access to the Internet occurs through the firewall. Some systems have a
     dial-up access point located behind the firewall. Not all threats originate outside the firewall. Many security
     incidents are traced to insiders. Security breaches of other server software can be exploited to gain access to
     essential system resources. "For example, in April of 1999, many sites were hacked via a bug in ColdFusion.
     These sites all had firewalls*" says Robert Graham, a computer security expert (http://www.robertgraham.com).

     IDSs are not silver bullets. Intrusion detection systems are only one part of the security infrastructure (other
     parts are physical security, user and access authentication, encryption, anti-virus systems, firewalls, etc.). None
     of the IDS solutions available offer you complete protection. IDSs are classified into "anomaly detection" and
     "misuse detection" categories (http://www.nfr.net/forum/publications/id-myths.html).

         Anomaly detection systems utilize heuristic algorithms to detect "abnormal" network traffic and alert the
         administrator. They tend to generate large numbers of "false positives" -- false alarms -- and sooner or later
         become ignored. To properly configure those systems and then constantly monitor and analyze their reports
         you will have to hire a dedicated security specialist, or your investment in IDS will be useless. 
         Misuse detection systems work in a similar way to virus scanners, trying to match network patterns with
         their database of "attack signatures." They don't bother you with many false alarms, but cannot detect
         something they do not "know" about. As a result, they provide your system with protection only from known
         automated hacking tools and "script kiddies" (mostly young, inexperienced hackers armed with tools created
         by more experienced hackers). More serious attackers can avoid any type of activities that trigger the alarm.

     Intrusion detection is not the only benefit of deploying a good IDS. What comes with it is the ability to perform
     vulnerability assessments of your systems and close the security breaches before they are exploited, a greater
     degree of integrity to the rest of your security system, and tools for gathering information for building a sound
     security policy. 

If your company cannot afford (or cannot justify) purchasing and supporting a comprehensive IDS solution, using a
simple misuse detection system might be a good option. You may be still vulnerable to the attacks of experienced
hackers, but they are much more rare that those of automatic bots and script kiddies. However, if you run a
mission-critical online system that just lures hackers with its informational content, consider hiring security experts 
and
deploying a best-of-breed IDS.

The following resources will help you better understand the area of intrusion detection, its terms and definitions, and
where IDS fits in the overall picture of network security.

  1.First, read ICSA, Inc.'s white paper "Introduction to Intrusion Detection & Assessment" at
     http://www.icsa.net/services/consortia/intrusion/educational_material.shtml. 
  2.Next, check out Robert Graham's FAQs on Network Intrusion Detection Systems at
     http://www.robertgraham.com/pubs/network-intrusion-detection.html. 
  3.Finally, take a look at Network World Fusion's survey of the leading commercially available IDSs at
     http://www.nwfusion.com/reviews/1004bg.html. 



Current thread: