Could I raise something?

If less than 10% of network impacting events are security related then
shouldn't we be concentrating on behavioural changes rather than
attacks?

Let's say, for example, that someone reconfigures the core switches to
cache arp in a different way. And that this causes an outage of
business critical services for several hours. All the signature based
systems will be no help. Anything that looks at the pipes for
weirdness will.

This is a real world example.

The edge of the network where it faces the 'net has been done - to
death - maybe we should be looking at the rest of the network. To sit
on core L3 switches in M/R/WAN environments with behavioural anomaly
detection systems would seem to be the next logical step.

We can argue over the benefits and deficits of point security products
till we all go blue in the face...

/face turns blue



On 7/28/05, Sanjay Rawat <[EMAIL PROTECTED]> wrote:
> Hi David:
> Its nice to know that you (and others too) are interested in
> exploring/discussing such AI based approaches. it true that we need some
> correlations among various data sources to gain more confidence and
> information to label an event as attack. recently i worked on a very simple
> approach to detect DoS (particulary SYN flood), wherein I correlated packet
> rate and CPU time of the server. surprising I got 0% false positive. of
> course it does not mean that in real environment, it WILL behave like this.
> but experimentally its a good start. similarly, we can investigate the
> usability of Fusion theory or association rules to find correlations among
> events. My only concern, at this point, is the complexity of implementing
> such methods. I am interested in implementing one, but again time is one
> major constraint here.
> Another point which I want to bring in here is "what should we look for in
> HUGE data?" Any machine learning algo is as good as the data presented to
> it. data should be as minimum as possible but MUST contain the attack
> manifestation. so this is another problem of characterizing the attack.
> ok I think its enough for now :-)
> Sanjay
> 
> At 01:41 AM 7/27/2005, Swift, David wrote:
> >I believe added correlation and the programming of artificial
> >intelligence into security devices to be a key area of expansion for any
> >good security device over the next few years.
> >
> >Companies like Counterpane are beginning to correlate offline data to
> >look for real attacks.
> >
> >It is immensely more valuable to me for a device to let me know that
> >someone used a SYN-SCAN to find the open ports on my firewall followed
> >by a Fragmented packet with a TTL 1 higher than my firewall to map true
> >destinations by ICMP replies, who then sent a fragmented packet through
> >to an IP address on a port he previously found he could establish a
> >session on.
> >
> >Any single packet or detected IDS event means little by itself, but the
> >combination and sequence of events from the same source should allow me
> >to increase the threat level of a given source, and correspondingly
> >adjust my responses up to the point where I dynamically harden my
> >firewall from his source address regardless of what data he's
> >transmitting, AND hopefully beginning the automation of forensic
> >analysis by doing things like a reverse DNS lookup, whois, and
> >dynamically sending identification packets to his IP to identify any
> >other characteristics (i.e. will he respond to a Netbios Name Lookup?
> >Can I discover his MAC address? RARP tables/responses).
> >
> >I would enjoy the topic, but believe this should be a new discussion
> >thread however.
> >
> >-----Original Message-----
> >From: Sanjay Rawat [mailto:[EMAIL PROTECTED]
> >Sent: Tuesday, July 26, 2005 1:52 AM
> >To: Richard Bejtlich; Swift, David
> >Cc: Mike Barkett; Nick Black; [email protected]
> >Subject: Re: Firewalls (was Re: IDS evaluations procedures)
> >
> >Hi Richard
> >I am agreed on the difficulty in defining an attack properly. in fact
> >recently i joined a company as a kind as intrusion analyst. Before that
> >i
> >was in academic environment doing my PhD in IDS. what i observed is that
> >
> >signatures are concentrating more on a particular exploit code rather
> >than
> >the true exploit/vulnerability. i am specifically talking about Snort
> >signatures. I feel that time has come when we should also look at some
> >AI/data mining/ machine learning techniques to get some more insight
> >into
> >the attacks, as now we have high computing devices. During my research,
> >i
> >experimented with many such techniques, but I dont find the
> >acceptability
> >of such techniques in commercial products. I know i may sound more
> >theoretical to all experienced network/system administrators, but i want
> >to
> >bring this issue into the focus. in this way, we can, at least, discuss
> >the
> >feasibility of such techniques and the problems associated with that.
> >i am looking forward to have some response from all.
> >thanks
> >Sanjay
> >
> >
> >
> > >Hi David,
> > >
> > >All good points.  If you can get past firewalls using various
> > >techniques, I'm sure others can bypass even your product, right?
> > >
> > >This is not an attack against you or any other prevention vendor.  The
> > >unfortunate reality is that at some point a smart, unpredictable
> > >intruder will figure out how to bypass your prevention mechanism.
> > >Where does that leave an integrated/converged security device?  Will
> > >it have any record at all that it was beaten?  Probably not -- if it
> > >knew what was happening, it would have blocked the attack, correct?
> > >
> > >The problem I see with most security vendors is their assumption that
> > >they can even identify attacks properly.  This is a problem because
> > >detection or prevention requires accurate attack identification.  I
> > >gave up on perfect attack detection years ago, but I did not give up
> > >on intrusion detection or prevention as necessary parts of the
> > >security process.  I am glad you and other vendors still work on this
> > >very tough problem!
> > >
> > >For my part, I try to identify when my preventative system has failed
> > >via policy enforcement failure detection.  If that doesn't work, I'm
> > >also performing network transaction logging.  Once I know (by
> > >non-technical means, perhaps) that I'm compromised, I have
> > >network-based evidence to guide my incident response and remediation
> > >process.
> > >
> > >I don't see do-it-all-in-one security appliances approaching the
> > >problem this way.
> > >
> > >I guess my view is biased because I do incident response for a living,
> > >and I constantly deal with failed security mechanisms.  (Unfortunately
> > >for my clients,) I am as busy now (with all the great new gear we
> > >have) as I was seven years ago when I started.
> > >
> > >Sincerely,
> > >
> > >Richard
> > >http://www.taosecurity.com
> > >
> > >-----------------------------------------------------------------------
> >-
> > >Test Your IDS
> > >
> > >Is your IDS deployed correctly?
> > >Find out quickly and easily by testing it
> > >with real-world attacks from CORE IMPACT.
> > >Go to
> >http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
> > >to learn more.
> > >-----------------------------------------------------------------------
> >-
> >
> >Sanjay Rawat
> >Senior Software Engineer
> >INTOTO Software (India) Private Limited
> >Uma Plaza, Above HSBC Bank, Nagarjuna Hills
> >PunjaGutta,Hyderabad 500082 | India
> >Office: + 91 40 23358927/28 Extn 423
> >Website : www.intoto.com
> >    Homepage: http://sanjay-rawat.tripod.com
> >
> >
> >
> >
> >
> >
> >------------------------------------------------------------------------
> >Test Your IDS
> >
> >Is your IDS deployed correctly?
> >Find out quickly and easily by testing it
> >with real-world attacks from CORE IMPACT.
> >Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
> >
> >to learn more.
> >------------------------------------------------------------------------
> >
> >
> >------------------------------------------------------------------------
> >Test Your IDS
> >
> >Is your IDS deployed correctly?
> >Find out quickly and easily by testing it
> >with real-world attacks from CORE IMPACT.
> >Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
> >to learn more.
> >------------------------------------------------------------------------
> 
> Sanjay Rawat
> Senior Software Engineer
> INTOTO Software (India) Private Limited
> Uma Plaza, Above HSBC Bank, Nagarjuna Hills
> PunjaGutta,Hyderabad 500082 | India
> Office: + 91 40 23358927/28 Extn 423
> Website : www.intoto.com
>    Homepage: http://sanjay-rawat.tripod.com
> 
> 
> 
> 
> 
> 
> ------------------------------------------------------------------------
> Test Your IDS
> 
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it
> with real-world attacks from CORE IMPACT.
> Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
> to learn more.
> ------------------------------------------------------------------------
> 
>

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
to learn more.
------------------------------------------------------------------------

Reply via email to