My thought is that you don't want your IDS to do this type of "analysis" instead you 
do the analysis and response at a higher level (threat analysis/correlation) in order 
to be more accurate. The problem with current IDS responses to particular events is 
selectivity and the lack of filtering. By the reduction of false positives and 
prioritization of incidents at a higher level, you can create a better and more 
accurate response. GuardedNet has created an application that does this for you, and 
enables you to response via OPSEC and a number of other sources.  It also maintains a 
whois database with latitude and longitude plot points so you can see where the 
attacks are coming from and a built in ticketing system for handling the incidents. 

 

Matthew F. Caldwell, CISSP 

Chief Security Officer

GuardedNet, Inc

 

        -----Original Message----- 
        From: Jay D. Dyson [mailto:[EMAIL PROTECTED]] 
        Sent: Wed 5/29/2002 6:32 PM 
        To: Security-Basics List 
        Cc: 
        Subject: Re: Reacting to IDS alerts
        
        

        -----BEGIN PGP SIGNED MESSAGE-----
        Hash: SHA1
        
        On Wed, 29 May 2002, JM wrote:
        
        > Basically, we are currently receiving an ever increasing number of
        > intrusion attempts, (isn't everyone) and would like to automate a
        > reaction to these attempts.
        
                I need a little clarification here: by "intrusion attempts," do
        you mean portscans or actual attempts to breach a specific service (such
        as a Nimda attempt)?  Putting a finer point on this will help me better
        answer your request.
        
        > Firstly, I would like to inform the owner of the address space which the
        > attack has come from that this is happening.  Secondly, I would like to
        > report this address space for permitting this activity.
        
                This is largely do-able since the core of a utility I wrote does
        precisely this.  However, I've noted that there is a certain amount of
        data rot with which one must contend in the ARIN, APNIC and RIPE
        databases.  This can be either incorrect or outdated netblock assignment
        information or bogus e-mail contact addresses.
        
        > Basically the way I see it so far is to take the alerts that are
        > generated by the IDS, in a mail format, using some sort of script from
        > that alert, extract the source address, do a whois on that source
        > address, then find the admin and technical contacts for that address
        > space from the whois and mail them a copy of the alert(confidential data
        > removed) along with a warning that the information has been passed to
        > the relevant authorities.
        
                Early Bird does this, albeit its exclusive focus is on web-based
        worm attacks.  You could probably adapt its code to suit your purpose.
        (http://www.treachery.net/earlybird/)
        
        > Trouble is, who are the relevant authorities.  And are they likely to
        > take any action.
        
                Law enforcement agencies (LEAs) don't take e-mail notifications of
        intrusion attempts seriously.  If they did, they'd be scrambling every
        which way 'til Sunday handling them...and they aren't.  Even the FBI won't
        touch a network intrusion case (actual or attempted) unless there's at
        least $5,000 in confirmed losses or unless the aggrieved party has some
        massive political influence.  For all they care, Usama bin Laden himself
        could be portscanning you to oblivion and they wouldn't so much as bother
        to open an case file on the incident.
        
                That's just the way the ball bounces.
        
        - -Jay
        
          (    (                                                          _______
          ))   ))  .---"There's always time for a good cup of coffee"---.  >====<--.
        C|~~|C|~~|(>------- Jay D. Dyson -- [EMAIL PROTECTED] -------<)|    = |-'
         `--' `--' `-Because it is bitter...and because it is my heart.-' `------'
        
        -----BEGIN PGP SIGNATURE-----
        Version: GnuPG v1.0.7 (TreacherOS)
        Comment: See http://www.treachery.net/~jdyson/ for current keys.
        
        iD8DBQE89VcFGI2IHblM+8ERApzCAKCXhvpgNa8MSpeK4KpFOqqrEigwIgCfVHoD
        DnVfrFqHA4v25x1MvDQyfAo=
        =0zaO
        -----END PGP SIGNATURE-----
        
        



Reply via email to