Sorry Kyle, this is in response to your mail, but not "directed" at you :)

On Wed, 6 Sep 2000, Haugsness, Kyle wrote:

> So if you need to watch some big pipes, start taking a look at other
> products such as Network Flight Recorder (hi Marcus), Network Security
> Wizards' Dragon, or even snort.

Currently NFR's solution is also based on the load balancer.  NFR admits
that their product cannot accurately watch for things like portscans
across multiple hosts in a load balanced setup:

NFR's response to me:
# Just following up to make sure you got my last email (about 2 weeks ago)
# saying that you were correct in that our load balancing solution would
# not work in the situation you described.
<snip>
# However,  this still works fairly well because generally portscans
# involve a large number of ports.
<snip>

I'm not sure which Internet that NFR's connected to, but it must be
something other than the one I'm on.  Programs like wu-scan exist for the
sole purpose of doing single port scanning across entire network segments 
looking for hosts with a specific exploit.  This is not the first program
like this, nor will it be the last.

Network-based IDS seems to still be aimed at the small network, although
every commercial host-based IDS I've found doesn't include port-level
watching on the host.  I'd really like one of the commercial IDS people
make a host IDS with port-level detection built in, but I've yet to find
one... unless you run the FREEWARE portsentry (unix-only) with it,
then most commercial IDS can watch logs and report.. but at that point,
why bother since portsentry can already run custom commands on it's
own (like e-mailing the NOC that scans are in progress).

- Aaron Schultz
- [EMAIL PROTECTED]
------
  /"\  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
  \ /   ASCII Ribbon Campaign
   X   - NO HTML/RTF in e-mail
  / \  - NO Word docs in e-mail

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to