IDS mailing list archives
RE: automatic signature generation
From: "Ackley, Alex" <aackley () epmgpc com>
Date: Tue, 22 May 2007 13:24:15 -0400
I'm not sure if it's feasible but it certainly sounds like the correct way to do things. From the firewall end, after the initial starting of allow all...deny bad... we moved to the much more secure of deny all...allow good function. Our networks are all in the first stage still of allow all...deny bad. If you can generate rules for proper traffic and deny everything else; then you have the basis for moving to a deny all... allow good scenario for the network which would certainly cut down on the attack vectors. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Sanjay R Sent: Sunday, May 20, 2007 6:55 AM To: Focus-Ids Mailing List Subject: automatic signature generation Hi List: There have been few studies to propose the automatic generation for misuse based IDS, like snort (in fact, it is the hot area of research among IDS researchers). Suddenly, it came into my mind, whether is it feasible to generate (Good) signatures for all types of attack in an automatic way (in a black-box environment, where we don't have the source-code of the vulnerable application)? Perhaps, It is easy (relatively) to automatically generate signature for flooding type of attacks. The main cause of my doubt is the observation that it is not feasible to generate attacks automatically. Usually, an attacker spend hours to analyze the application and then write an exploit. We don't have any tool that take, as an input, the application to be exploited, and gives us an working exploit (of course, Metasploit helps us to create exploit). Therefore, the early thought that comes into my mind is "creating an automated signature generation tool is as difficult as creating an automated attack generation tool". I would like to know your opinion on this. -Sanjay ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaig n=intro_sfw to learn more. ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- automatic signature generation Sanjay R (May 22)
- Re: automatic signature generation Tim (May 24)
- Re: automatic signature generation Sanjay R (May 24)
- Re: automatic signature generation Jose Nazario (May 24)
- RE: automatic signature generation Oleg Kolesnikov x 133 (May 28)
- Re: automatic signature generation Hugo Francisco González Robledo (May 24)
- RE: automatic signature generation Ackley, Alex (May 24)
- Re: automatic signature generation Eric Hacker (May 24)
- Re: automatic signature generation Sanjay R (May 24)
- RE: automatic signature generation Joshua Barnes (May 24)
- RE: automatic signature generation Ofer Shezaf (May 28)
- Re: automatic signature generation Tim (May 24)