IDS mailing list archives

Re: IDS is dead, etc


From: "David W. Goodrum" <dgoodrum () nfr com>
Date: Tue, 05 Aug 2003 13:11:37 -0400

I realize we're mostly talking about Snort here, but NFR implemented a passive finger printer in it's 3.2 version of the NID (released earlier this year). We use it for two main reasons:

One, provide the customer with more information (i.e. I see nimda alerts, but it also says that the dest OS is RedHat, therefore the end user can ignore it). Two, we use it for fragmentation re-assembly, so that we can re-assemble fragmented attacks using the same method as the victim OS. There's more info on our website if you're interested.

Regarding application fingerprinting, our WWW package does offer the ability to detect what the destination server "says" it is, and alert appropriately. i.e. don't alert on iis attacks against apache servers. Additionally, we _can_ fingerprint the sources application by looking at the User Agent field. This might be helpful if you're getting potential false positives, you can identify whether they come from a legitimate browser, or from somebody using netcat (which would not supply a user agent field unless the netcat user manually entered it.)

-dave


Burak DAYIOGLU wrote:
On Sun, 2003-06-22 at 18:44, Martin Roesch wrote:

I would love to see a fingerprinting tool that identified the client and
server Operating System / Application and reduced the priority of alerts
for false positives when it is known that the system is not vulnerable.
The alerts still flag, so we see the drive-by-shootings, but as their
priority is reduced they are less significant.

Anyone got any development ideas on this front?

I'm working on just such a program/product called RNA (Real-time Network
Awareness) right now, we've got a press release outlining the technology
(which isn't available yet) on the Sourcefire web site.  I'll spare everyone
the marketing here, if anyone wants more information just drop me an email.


I have had implemented such an extension, as Giles refer, in 2001 to
Snort while doing my M.Sc. thesis. I have integrated p0f of Zalewski as
a preprocessor plugin to Snort to "learn" protected hosts' operating
systems. With the help of Max Vision, we have extended Snort signatures
to include proper target O.S. information.

We have had some success with the issue. Interested people can check my
thesis (http://www.dayioglu.net/publications/thesis.pdf)or the paper
about it (http://www.dayioglu.net/publications/iscis2001.pdf).

I bet Roesch has been doing much more than this... :)

with regards.

--
David W. Goodrum
Senior Systems Engineer
NFR Security
Mobile: 703.731.3765
Office: 240.747.3425


---------------------------------------------------------------------------
Captus Networks - Integrated Intrusion Prevention and Traffic Shaping - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
- Automatically Control P2P, IM and Spam Traffic
- Ensure Reliable Performance of Mission Critical Applications
Precisely Define and Implement Network Security and Performance Policies
**FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo
Visit us at: http://www.captusnetworks.com/ads/31.htm
---------------------------------------------------------------------------


Current thread: