IDS mailing list archives
RE: Recent Gartner IDS/IPS report
From: "Carey, Steve T GARRISON" <steven-carey () us army mil>
Date: Wed, 18 Jun 2003 15:24:48 -0500
My 2 cents......until technology catches up (which I doubt it will be by 2005, despite what Gartner states) there is no single solution for IDS or IPS (or a firewall). We use a suite of tools that includes both and a firewall. In our environment we have been very successful in spotting new and old exploits, true, learning to identify an attack was costly (at first) but in the long run, well worth the expense (which includes periodic classes to maintain and learn new techniques). But consider the cost if we had not identified a compromised system and it continued to stay compromised because the firewall or an IPS did not identify it (real world example, had a compromise that made it through a firewall and IP tables). This whole argument (that Gartner started with an incomplete and not real world report) is like saying that human guards will be replaced by camera's, because it is cheaper to run a camera. Course someone has to look at the output from a camera, but who's counting. Camera's are good and guards are good, but together they make for tighter security. Point being...everyone knows how to have good physical security, because they can see it, however, when it comes to electronic security, because it can not be seen, it is harder to justify, harder to implement, etc., etc.. Steven T. Carey LCIRT-R Team Leader Comm (256) 876-5811 Cell (256) 947-0225 -----Original Message----- From: Stephen Samuel [mailto:samuel () bcgreen com] Sent: Wednesday, June 18, 2003 2:27 PM To: Gary Golomb Cc: focus-ids () securityfocus com Subject: Re: Recent Gartner IDS/IPS report Gary Golomb wrote:
An IPS is not an extension of an IDS, it's an extension of a firewall. And, that does NOT mean a firewall with an IDS on/next to it.
In my mind's eye, an IPS and an IDS are essentially the same technology with one big difference. For attack scenarios which are identifiable both a reasonably short time, *and* with a high degree of certainty, the IPS will be expected to shut down (or otherwise respond to) the connection. As Gary points out, an IPS doesn't have the luxury of responding to some kinds of incidents -- either because they have too high of a false-positive rate (even .1% can be highly problematic with high enough traffic of certain types), or because by the time you realize what's going on, the attack may have already done it's dirty work. Although it doesn't hurt to have two different methodologies between the IPS and IDS to recognize similar attacks, my gut feeling is that if your IPS is bocking something that your IDS wouldn't report, then you have one of two problems: 1) your IPS is blocking on false positives (generally bad) 2) Your IDS is set to be too insensitive (bad, as a corollary to Gary's comments). I see an IPS as testing for that subset of IDS-recognizable issues that can be meaningfully responded to in the moment, with the addition of triage algorithms to decide whether it's serious enough for an automated response. The last bit would be a choice of response mechanisms for different attacks. -- Stephen Samuel +1(604)876-0426 samuel () bcgreen com http://www.bcgreen.com/~samuel/ Powerful committed communication. Transformation touching the jewel within each person and bring it to life. ------------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com -------------------------------------------------------------------------------
Current thread:
- Recent Gartner IDS/IPS report Gary Golomb (Jun 18)
- Re: Recent Gartner IDS/IPS report Stephen Samuel (Jun 18)
- Re: Recent Gartner IDS/IPS report Andreas Hess (Jun 22)
- Re: Recent Gartner IDS/IPS report Jeff Nathan (Jun 22)
- <Possible follow-ups>
- RE: Recent Gartner IDS/IPS report Carey, Steve T GARRISON (Jun 18)
- RE: Recent Gartner IDS/IPS report oherrera (Jun 19)
- RE: Recent Gartner IDS/IPS report Avi Chesla (Jun 19)
- RE: Recent Gartner IDS/IPS report Andre Yee (Jun 22)
- RE: Recent Gartner IDS/IPS report Golomb, Gary (Jun 22)