well, can't SNORT be configured to run an external program depending on the
rulesets? You are free to write a script that sends notice to the offender,
but most everyone seems to think that will only make the attacker more
persistent,

igor'
----- Original Message -----
From: "Michael Lindsay" <[EMAIL PROTECTED]>
To: "McCammon, Keith" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Tuesday, March 05, 2002 1:56 PM
Subject: RE: IDS that retaliates.


>
> Replying to spoofed packed with an attack could have nasty consequences.
> If someone spoofed packets with a source address belonging to a bank, and
> you initated a response that attacked the bank, what might happen then?
:)
>
> Mike Lindsay
>
>
>
>
>                       "McCammon, Keith"
>                       <Keith.McCammon@eadva        To:
<[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
>                       ncemed.com>
<[EMAIL PROTECTED]>
>                                                    cc:
>                       06/03/2002 07:00 AM          Subject:  RE: IDS that
retaliates.
>
>
>
>
>
>
> This is generally referred to as Active Response.  In most cases
> (commercial IDS), this involves the IDS sending TCP RST packets to both
> ends of the connection so that the connection is destroyed and cleared
> from the buffers.  This is also the extent to which most
> commercially-available IDSs "retaliate."  Snort does this, as do ISS and
> several other popular systems.
>
> Now if you're referring to launching counter-attacks or similar
> offensives in response to alerts, this isn't going to go mainstream in
> the near future.  There are a number of reasons for this, but most
> notably is the fact that (in the U.S., anyway) intrusive retaliation is,
> technically, every bit as illegal as the act that provoked it in the
> first place.
>
> I, too, have heard of government and defense projects that are
> developing (and refining) intrusive response of technology, but realize
> that the details of such systems would not likely be publicized.
>
>
>
>

Reply via email to