Security Basics mailing list archives
RE: IDS
From: "Nick Duda" <nduda () VistaPrint com>
Date: Thu, 27 May 2004 13:37:49 -0400
I disagree 100%. Snort IDS signatures are written much faster then commercial. Jump onto the snort sig mail list. After all once the payload is established you write your own sig. No need to wait on the commercial.I've seen sigs written within an half hour of a worm release. - Nick -----Original Message----- From: shankarnarayan.d () netsol co in [mailto:shankarnarayan.d () netsol co in] Sent: Wednesday, May 26, 2004 12:26 AM To: Endre.Szekely-Bencedi () hu-tcs com; security-basics () securityfocus com Subject: RE: IDS Hi, Snort definitely is a good IDS, but given that Snort is free, it is going to be difficult to get signatures as quickly and as easily as you would on a commercial IDS. Given snort is free, it takes time before people detect and then write signatures for the attacks. Snort does give you the capability to add and modify signatures as you please - but this is also available in commercial signatures. Additionally, there are many types of IDS - what are you looking at - there is the adaptive/ anomaly detection IDS which understands and gets a baseline of the activities that go on your network and then flag anything that is unusual as an attack - ofcourse this could lead to a lot of false alarms - but this is the new way that the industry is going to - how effectively you can fine tune this is dependent on your efficiency The other side is the signature based IDS where the attacks are detected based on signatures only and the third category is a combination of the two - So pick what you want based on what data you want to protect and you level of confidence - what is the level of criticality of the data, what type of users you have on the network - if they are more of the networking software development kind OR if they are the protocol stack writers, are they the extremely nosy bunch that regularly plays on the production network, do they frequently download off the web and try these tools on the network etc............... IDS' are aplently - but it is necessary what type of IDS you wan to test before you jump into it - examples also include the Dragon IDS (there were eval copies available till sometime back - dunno if they are still there), there are the Cisco IDS, Black ICE, Real Secure, Net Prowler etc So long.............. shankar -----Original Message----- From: Endre Szekely-Bencedi [mailto:Endre.Szekely-Bencedi () hu-tcs com] Sent: Monday, May 24, 2004 3:47 PM To: security-basics () securityfocus com Subject: IDS Hi List, I'd like to ask you to recommend some IDS I could test. Our company is about 100-120 PCs large at the moment, that could increase to up to 400 in the near future. I am currently trying eTrust IDS v1.5 but it reports many false alarms, also it just reports the half of the traffic as 'other protocols' so I really can't get much useful information from that. Is Snort's software any good? It is free, and that's just nice. I was thinking to try it one of these days when I'll have a bit of spare time. Should I bother with the Windows version or I should just put it on a Unix machine? Any other tips, software that can do traffic logging/analysis/intrusion detection? Thanks. PS: Please, CC me the answers as I don't have much time to read mails usually so I might delete it along with the many other mailing list mails if I'm hurrying. Greetings, Endre Szekely-Bencedi _____________________________________ Tata Consultancy Services H-1054 Budapest, Kalman Imre u. 1. Tel.: +36 1 4751214 FAX: +36 1 475 1111 Email: Endre.Szekely-Bencedi () hu-tcs com _____________________________________ "THIS E-MAIL MESSAGE ALONG WITH ANY ATTACHMENTS IS INTENDED ONLY FOR THE ADDRESSEE and may contain confidential and privileged information. If the reader of this message is not the intended recipient, you are notified that any dissemination, distribution or copy of this communication is strictly prohibited. If you have received this message by error, please notify us immediately, return the original mail to the sender and delete the message from your system." ------------------------------------------------------------------------ --- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ---- ------------------------------------------------------------------------ --- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- IDS Endre Szekely-Bencedi (May 25)
- Re: IDS defiance (May 26)
- Computer Forensics Consulting steve (May 26)
- RE: Computer Forensics Consulting John McCracken (May 27)
- RE: Computer Forensics Consulting Hugo Deckx (May 31)
- RE: Computer Forensics Consulting John McCracken (May 27)
- <Possible follow-ups>
- RE: IDS shankarnarayan . d (May 27)
- RE: IDS Nick Duda (May 27)