Hi Crispin,

I think you also need to clearly define when you want to be alerted to 
these incidents in your request.

For example, do you want a report done daily, or do you want real-time 
intrusion detection?

If the latter, take a look at:

http://www.checkpoint.com/products/firewall-1/realsecure.html

Thats one IDS system, there are many cheaper alternatives i'm sure, 
allthough i havent had any experience with them personally (well, apart 
from Snort :-)).

Lance Spitzner has an excellent white paper regarding a simple intrusion 
detection method you can configure to give you real-time notifications on 
your Firewall-1.

His whitepaper can be found at:

http://www.enteract.com/~lspitz/intrusion.html


Hope this helps some.


Chris.


At 02:42 PM 6/6/00 +0800, you wrote:


>Greetings,
>      I am looking for _security_ focussed FW-1 log analysis tool.
>
>In particular, I am looking for a tool which highlights the security incidents
>from a firewall-1 log, I dont care about bandwidth utilisation, web site hits,
>top X sources/destinations (except where this might indicate a scan/hack
>attempt.)
>
>I am specifically looking for something that lets me focus on the Security
>incidents in the log (as (initially) shown by Scans). I have other logs that
>show me attempts against Bind, Syslog, SMTP etc, but the tools for Firewall-1
>seem to be focussed towards Mgmt & accounting, not security.
>
>I am hoping that someone has a perl script that they already use for this...
>
>Please note: I am currently receiving over 1,500,000 lines of (already 
>abridged)
>logs each day, with an additional 5-10 million lines to come each day as 
>soon as
>I get the log filter working correctly. This number will just grow over time,
>and I would not be surprised to be receiving 50-80 million lines per day 
>within
>12 months!
>
>If anyone wants some of the details of a suggested implementation, I have 
>listed
>them below
>
>Regards,
>      Crispin Harris
>__________________________________________________
>Security Technical Specialist,     [EMAIL PROTECTED]
>CSC Australia            2 Mill St, Perth, WA, 6000
>Ph: +61(0)8 9429-6478    Mobile: 0413-629-298    Fax: +61 (0)8 9481-1332
>
>P.S.
>I have looked at WebTrends and TeleMate.NET and while both these tools provide
>good management reports, they are basically useless for detecting network 
>scans
>etc.
>
>P.P.S
>I have previously modified a copy of 'fwlogsum.pl' (By Peter Sundstrom
><[EMAIL PROTECTED]>), and customised it to a particular environment, 
>however,
>I am not a programmer, and I really do not have the time to spend programming
>something like this from scratch.
>
>
>==========================
>A Suggested implementation
>==========================
>I have been thinking about the specifics of my report, and this is the 
>sorts of
>stuff I want:
>
>  - see each source which has more than "low_water" number of destinations
>(host:port).
>  - If the host:port was hit more than once, I want to know the number of 
> times,
>the first and the last times.
>  - Because there could be "num_srcs * 16384 * 65535 * num_tries" entries 
> in the
>log, I only want the first 'LOG_LIMIT' number of dest:port pairs kept.
>  - I want to be able to provide an exclude list: <Src[,Dst[:port]] |
>[Src,]Dst[:port]> (i.e. Source and or Dest (with optional port) can be 
>excluded)
>
>==========================
>Pseudo-Code
>==========================
>(This pseudo-code is a bastardised mixture of Shell Script, perl, Java & C,
>sorry about any confusion that may arise)
>
>for each (Src) {
>   if ( ! grep "Src DstPort.dest.Src" Exclude_list) {
>     # This "Src Dst:Port" is not excluded
>     if ( num_dst.Src > low_water_mark ) {
>       # We
>       print Src, "Total LogEntries: ", count.Src;
>       for each (dest.Src) {
>         print "\t", DstPort.dst.Src, first.dst.Src (count.dst.Src > 1 ?
>count.dst.Src, last.dst.Src \n : \n);
>} } } }
>
>==========================
>Object Definition
>==========================
>(If I was writing in Java I would do something similar to this:
>Object Src {
>      String[20]     name;
>      IPAddress address;
>      int       num_dsts;
>      long      count;
>      DstList[LOG_LIMIT]  dst; /* Very UGLY - but this does illustrate what I
>want */
>}
>Object DstList {
>      String[20]     name;
>      String[20]     DstPort;
>      int       count;
>      Time      first, last;
>}
>
>
>During the collection phase, I would limit the number of separate dst.Src
>entries collected to (aproximately 1000)
>
>
>
>Computer Sciences Corporation
>This email is confidential. If you are not the intended recipient,
>you must not disclose or use the information contained in it.
>If you have received this mail in error, please tell us
>immediately by return email and delete the document.
>
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

Chris Keladis

System/Security Administrator
Custom Management Centre
Cable & Wireless Optus.

Phone: (02) 9775-5312
Mobile: (0402) 067-375
E-Mail: [EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to