-Caveat Lector-

 When run on supercomputers, the infamous PROMIS software
 may (hypothetically) permit fed spooks real time 'targeted'
 monitoring of, and stealth access(!) to, ANY online PC or
 network server that doesn't have an effective firewall --
 if PROMIS is being used to manage the Echelon system....


 Ref:  BlackICE firewall software - http://www.networkice.com

 -------- Forwarded Message -----------------------------------------
 From:         Roy Lehrer <[EMAIL PROTECTED]>
 To:           [EMAIL PROTECTED]
 Date:         Wed, 20 Oct 1999
 Subject:      Re: APPS: Black Ice Defender

 Gary VM wrote:
 > I must be missing something.  I'm also on a dial-up connection,
 > and I've never experienced any nuke attempts.  Isn't this mainly
 > a problem for people who use a cable modem or have a similar 24/7
 > connection, or who use ICQ or a similar service that 'advertises'
 > your computer's availability?  How would anyone know I am on
 > the 'net at a given moment, let alone knowing what my assigned
 > IP number is at that moment?


 While individual systems connecting by modem are not as vulnerable
 to an attack they are not exempt from being attached and can in
 fact be attacked.  Some 'nukers' just scan millions of IP addresses
 which means they can randomly hit upon yours while you are on-line.
 While this IP is valid only for your current log on, a good nuker
 is nuking you just as soon as he gets a response that a random IP
 address has open port.  So although it would be difficult to direct
 an attack specifically at your IP address, it can happen as part of
 a random attack of any found IP address with open ports.


 --------------------------------------------------------------------

 http://www.cnn.com/TECH/computing/9910/11/network.ice.idg/index.html


 Returning fire with Network ICE

 by Tere Parnell
 October 11, 1999

 (IDG) -- You're under fire from network intruders trying to steal
 information or wreak havoc.  Your priorities are clear:

    + Alert: Detect the intrusion immediately.

    + Contain collateral damage and repel attack:  Stop the attack
      by ceasing all communication with the intruder.

    + Launch counteroffensive:  Find the identity of the intruder
      and prosecute.

 We used these battle plans to evaluate four of the hottest
 intrusion-detection systems available.  BlackICE and ICEcap from
 Network ICE win the Silver Star for valor in combat and a World
 Class Award for their excellent tracking and alerting capabilities.

 BlackICE is a specialized detection product -- an agent-based
 system that does one thing and one thing only: detect intruders.
 When BlackICE finds uninvited guests, it reports the intrusion to
 ICEcap, a management module that analyzes intrusion information
 gathered from all agents and uses it to spot widescale attacks on
 the network.

 The other products we tested were no slouches, either.  Intruder
 Alert from Axent Technologies is like a toolbox for security
 experts, with great flexibility in designing network security
 policies.  Centrax from CyberSafe is one-stop shopping:
 It includes security auditing, monitoring, intrusion detection
 and alerting all in one.

 By contrast, while eTrust Intrusion Detection from Computer
 Associates offers real-time alerts, its strong suit is security
 monitoring and policy management, though it does some intricate
 decoding and detective work.


 Sounding the alert

 Hackers rarely approach your network with weapon in hand.  Instead,
 they test backdoors and forgotten windows.  They quietly record
 traffic patterns and IP addresses and make seemingly innocuous
 inquiries of devices and users.

 To identify these slippery foes, you must employ an intrusion-
 detection system with sophisticated sensibilities.  The product
 must be able to alert you not only to obvious break-ins, but also
 to suspicious events that may seem innocent, but could hide a
 hacker.

 For example, discovering a password-cracking program hard at work
 is definitely cause for alarm.  But suppose a machine receives a
 pcAnywhere ping.  The event could just be an honest remote
 pcAnywhere user -- or it could be a hacker looking to connect to
 unprotected pcAnywhere clients.  Either way, the situation merits
 an alert for further investigation.

 The alerts issued by BlackICE are very specific, even straight out
 of the box.  For example, it displays messages such as "BackOrifice
 attack," "pcAnywhere ping" and "Unix scan."  When you see an alert
 like that, there's no doubt in your mind what event has occurred
 and -- in most cases -- no doubt as to its significance.  If you
 want to custom configure alerts for other situations, you can, but
 you probably won't need to.

 A nice feature of the Network ICE products and Axent's Intruder
 Alert is the online downloads for the latest attack signatures by
 which intruders can be identified.  We had trouble finding specific
 attack signatures on the Intruder Alert site, but we found it easy
 to find exactly what we wanted on the Network ICE site.

 Intruder Alert and CyberSafe's Centrax have great alert
 capabilities, but they're effective only after you've set security
 policies, configured alerts and written alert messages properly.
 In other words, the products provide the tools for you to build
 your own intrusion-detection system.

 Whether you have the talent in-house to build such a system --
 or the budget to hire consultants for the job -- is another issue.
 Intruder Alert's Users Manual states:  "Rules can be linked
 together to detect sophisticated attacks such as a network probe or
 SYN attack."  We questioned why you should have to design and build
 a mousetrap from scratch for such common pests.

 While all the products were fairly easy to install, we found
 Intruder Alert and Centrax somewhat cumbersome to manage.  For
 example, if Centrax sends you an unknown or unclear alert message,
 as happened to us in our tests, you may have trouble figuring out
 what's going on -- especially if you must turn to its audit logs
 for clarification, as we did.  Although its audit logs are
 excruciatingly thorough, the product tends to assume that mere
 humans can spot illicit activity with very few hints.

 In Centrax's logs, an alert is described but not identified.
 So you see what is happening in terms of ports queried or other
 actions, but not what this means.  This function compromises the
 value of its real-time alerts because it takes considerable savvy
 to know whether the event description constitutes a true security
 crisis or just a bit of extra scrutiny.  This is bad news if you
 don't have trained security staff.  Though, for a price, CyberSafe
 -- as well as Axent and Network ICE -- offer professional security
 consulting services.

 CA's eTrust Intrusion Detection is more than a monitoring system
 and provides something other than full-fledged intrusion detection.
 For example, the product does more than decode network protocols
 and service traffic; it actually captures all packets and presents
 them in their original formats.  ETrust monitors all TCP/IP traffic
 and alerts the network administrator to violations of established
 policies.  However, eTrust doesn't support the very finely grained
 policy crafting of Axent's Intruder Alert.

 But don't dismiss eTrust.  Because it presents captured packets in
 their original formats, network managers could use eTrust to read
 e-mail, see the content of Web pages that users viewed or identify
 documents accessed by users.  These abilities make for easy
 surveillance of suspicious characters on your network.  Though for
 garden variety intrusion detection, it means you need to spend a
 good deal of time upfront developing bulletproof security policies
 and entering them into eTrust.


 In the heat of battle

 We launched a variety of nasty attacks on each of the systems to
 assess their ability to detect and defend against hostile forces.
 The only products that caught every attack we made and sent the
 appropriate alerts were Network ICE BlackICE and ICEcap.  All other
 products missed some intrusions due to our poor crafting of the
 policies.

 In a BackOrifice attack, for example, CyberSafe's Centrax and
 Axent's Intruder Alert never knew what hit them because we had not
 adequately configured policies to detect this type of attack.  In
 fact, the two products were extremely cumbersome to configure.
 BlackICE and ICEcap however, caught the attack and alerted us
 immediately.

 We admit that all missed attacks were due to our lack of expertise
 in using these complicated systems correctly, and after a few
 attempts, we were always able to mend our software shields.  But in
 the real world you don't have the luxury of getting it right on the
 second or third try, especially when you're dealing with a new type
 of deadly attack.  That's why we were so pleased with Network ICE's
 product; it was ready for battle from the moment it was installed.

 In the throes of battle, it's easy to become preoccupied with the
 safety of the enterprise proper.  However, you can't afford to
 forget about the safety of your scouting parties.  That's why we
 loved the personal firewall afforded by BlackICE for remote dial-up
 users.  Remote access presents an increasingly large security hole,
 and BlackICE is unique in providing thorough intrusion detection
 for remote and mobile users.

 The product displays alerts on a remote client's screen rather than
 attempting to send the alerts back to an enterprise management
 console.  This allows a remote user to respond to the attack
 directly.  In future releases, we would like to see a reporting
 feature that sends information about a remote attack back to a
 central management console as well, so information about the attack
 can be analyzed to prevent future attacks.

 Detecting an intrusion and alerting the network manager to the fact
 is only half the battle.  You have to stop the attack and launch a
 counteroffensive.

 The most impressive defensive work we observed was accomplished by
 Axent's Intruder Alert and CyberSafe's Centrax.  While Network ICE's
 products and CA's eTrust Intrusion Detection immediately terminate
 offending sessions, Intruder Alert and Centrax do that and more.
 For example, you can configure Intruder Alert to issue strings of
 commands based on the type of attack -- to reboot a system
 experiencing a denial-of-service attack, for instance.

 Once you've repelled an attack, how do you launch a counterattack?
 BlackICE and Centrax turn the tables on hackers by tracking them
 back to their lairs and identifying them.  Network ICE was
 particularly good at tracking attacks despite our evasive
 maneuvers.  We especially liked the ability of Network ICE to track
 hackers inside or outside the network.

 Furthermore, we liked eTrust for its ability to reach so far into
 the (supposedly) private workings of each and every user on the
 network.  It provided the most thorough (and perhaps legally
 delicate) information on intruders and their workings.

 In fact, we suggest using BlackICE to track the alleged hackers
 inside your network, then using eTrust to trap them.

 Finally, speaking of trapping, CyberSafe can employ a "decoy file"
 method that leaves a dummy file with a tantalizing title, such as
 "PAYROLL.DAT" lying around unprotected in the open.  We found this
 a bit obvious, but it could be useful for entrapping users who are
 just browsing the network for sensitive information.

 Each program produces reports noting questionable activity.  The
 two standouts for excellent and easy-to-use reports were Network
 ICE's ICEcap and CA's eTrust Intrusion Detection.  The latter was
 particularly flexible, probably due to its origins as a protocol
 decoder.  For example, you can view network usage by just about any
 type of resource you want, including protocol, client and server.

 ETrust offers a variety of canned report formats, with
 well-organized information to aid in finding and prosecuting
 abusive users.


 Post mortem

 Each of the tested products has its strengths and weaknesses, and
 we recommend them accordingly.

 For switched networks, we recommend the agent-based systems from
 Network ICE, Axent and CyberSafe.  CA's eTrust Intrusion Detection
 is a product ideally used for alerting you of violations of
 business practices, such as the use of forbidden terminology in an
 e-mail.  Axent's Intruder Alert and Centrax's CyberSafe are
 excellent tools for security consultants and shops with large,
 highly-trained, up-to-date security staffs.

 But for shops that don't have, and can't afford, resident security
 experts, we recommend Network ICE's BlackICE and ICEcap.  They're
 as close to a security consultant in a box as we've seen.



 -------------------------------------------------------------------
 RELATED IDG.net STORIES:

      BlackICE Defender protects your PC against hack attacks
      (PC World Online)
      http://www.idg.net/go.cgi?id=170604

      Start-up Network ICE takes the stage with security applications
      (Infoworld.com)
      http://www.idg.net/go.cgi?id=170605

      Start-up puts hackers on BlackICE
      (Network World Fusion)
      http://www.idg.net/go.cgi?id=170606

      Getting the drop on network intruders
      (Network World Fusion)
      http://www.idg.net/go.cgi?id=170607

      Intrusion detection: a matter of taste
      (Network World Fusion)
      http://www.idg.net/go.cgi?id=170608


 -------------------------------------------------------------------
 RELATED SITES:

      Network ICE
      http://www.networkice.com/

      Axent
      http://www.axent.com/

      CyberSafe
      http://www.cybersafe.com/


 -------------------------------------------------------------------
 � 1999 Cable News Network. All Rights Reserved.


 *** NOTICE:  In accordance with Title 17 U.S.C. Section 107,
 this material is distributed without profit to those who have
 expressed a prior interest in receiving the included information
 for research and educational purposes. ***


.

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance�not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to