Robert,

I believe we are mixing multiple product scopes here. 

1. NIDS :  Network intrusion detection system( different from prevention 
systems NIPS ). It is Agentless ( no need of agent on each machine to detect 
attaks ), identifies attacks based upon PI\DPI techniques + lot others. 
Identifies attacks pertaining to all hosts that appliance or solution is 
catering to. So, typically all the traffic entering your organization after 
edge device is put through the Firewall\IPS\IDS solution to decipher attacks.

2. HIDS : Host intrusion detection system( again no prevention system HIPS ). 
It requires an agent and resides on machine. Caters only to the identification 
of attacks pertaining to that host. Limitations are lot compared to NIDS 
starting from its scope to working behavior. 

3. SIEM: Security information and event management.  Gathers logs, information 
from various products, event information from solutions like vulnerability 
manager,IDS etc, correlates and analyzes the information.
I believe this is what you are looking for.Look for OSSIM, i believe when you 
refer to "correlation", you are referring to SIEM solution rather than IDS. 
offcourse SIEM also can integrate with IDS solutions,various product 
outputs,logs including host logs EX; Syslogs etc. There are less open source 
solutions in this space which are good, reasons could be many. The scope of 
SIEM is solution specific sometimes and its intended usage.

So, for your case you may don't want every packet on your vm to go through 
detection system, i am referring to statement below where installing 
snort\suricata on each guest vm. We are ideally overloading the guest vm i 
believe. Unless, If we want HIDS, then think of other agent based solutions for 
IDS.  So, the other question to ask is do we want to build new DOS algorithm 
that applies to common NIDS\HIDS and wanted to implement an already used 
solution to detect attacks at network layer( not restricted only to layer 3) 
and correlate with logs like SIEM does? I believe what you are looking for is 
SIEM solution in relation to IDS detection happening at network layer, or even 
host and do some correlation based upon events and logs collected? DOS\DDOS 
techniques are many, from statistical model detection to basic behavorial 
based. Some are commercial( through patents ) and few well known bayesian 
detection techniques for your traffic profile. If we are interested in learning 
and implementing new algorithm for DOS, then line to approach is different? If 
we just( may be wrong word) want to use NIDS and do some correlation, then the 
line to approach is different? If it is enhancing existing DOS technique\add 
new technique, then that could be related or away from cloudstack as well. If 
we are fitting to see NIDS + SIEM, then you are fitting to see in CS space? 

If we really are interested in writing a new DOS detection technique, then 
approach should be to see what suricata\snort cannot handle currently? A sample 
dos attack and try to see why it cannot handle it with its current approach 
provided signatures, configurations related to their detections are configured 
properly? Then, we can see what approach to follow and enhance for detecting 
dos technique

I believe you wanted to narrow down your intention of SIEM( OSSIM ) + IDS( NIDS 
only and use suricata ) and their usage in cloudstack perspective. (Or)   
develop a new detection technique for DOS ( or only DDOS or any other )? 

But, i could see that implementing security solutions( customized ) viz., NIDS 
and SIEM for cloud solutions has a definite value add and provides a security 
cover addition to existing cloud resource usage. If we can narrow down the 
scope, then that should be good i believe.

Let us know. 

Thanks!
Santhosh
________________________________________
From: Robert Bruce [precious.king...@gmail.com]
Sent: Monday, November 25, 2013 5:47 AM
To: users@cloudstack.apache.org
Cc: j...@stratosec.co
Subject: Re: Distributed Intrusion Detection System in Cloud Computing

Hi John,

Thank you so much for your valuable suggestions and directions.

I will set up snort/suricata on management station as well as on each guest
VM, where it will monitor the incoming/outgoing network packets for
intrusions.

*Here I am confused about network intrusions vs system intrusions.* what
should we call these intrusions?

After local correlation on each VM, NIDS on guest VMs will send the alerts
to management station (MS) if they can not identify an intrusion. Global
level of correlation will take place at MS and so on so forth, as you
already mentioned.

Moreover, I will be using CloudStack networking with VLANs.

I need further guidance regarding selection of some efficient "correlation
algorithm" which can help in detection of distributed intrusions. Can you
please quote some best algorithm that show good performance in terms of
computation and accuracy?

Thanking you in anticipation.

Regards,
Robert



On Fri, Nov 22, 2013 at 6:46 AM, John Kinsella <j...@stratosec.co> wrote:

> Hey Robert!
>
> On Nov 16, 2013, at 11:53 AM, Robert Bruce <precious.king...@gmail.com>
> wrote:
>
> > Hi, hope all of you will be fine and doing your best for the development
> of
> > open source community.
> >
> > I want your suggestions and help regarding my project. I am going to
> start
> > my master's thesis in the domain of Cloud Computing
> > I want to develop a Signature Based Distributed Intrusion Detection
> System
> > (DIDS) to detect distributed intrusions in Cloud environment.
> > Yes, I intend to deploy it in CloudStack.
>
> First thought: signature-based systems are useless. They're great for
> low-hanging fruit, but anybody who takes the time to craft packets/binaries
> will circumvent it. Or worse, they'll craft packets to set it off and kill
> detection performance while they go about their real attack. For the early
> stages of your project they'll work fine, but architect things so you can
> swap that out for anomaly-based detection (or a mixture)
>
> (Insert rant on signature based AV systems, the amount of money we've paid
> Symantec et al, and the increase - not decrease - in infected systems)
>
> The main thing to consider - you might want to do some correlation on each
> host, but really you need a separate system to correlate between events
> seen by various hosts.
>
> Also - what are you attempting to detect? Network intrusions? System
> intrusions? Public Internet or activity between hosts? Are you looking to
> work in CloudStack's basic network model, advanced with VLANs, or something
> with SDN? Also consider all the event data being generated by ACS itself.
>
> Plenty of space for you to do research in here, just thinking you might
> want to define things a little more narrow…also, look around - some of the
> three-letter government agencies are working on big-data analytics, not
> sure if any of the work is public or not yet[1].
>
> John
> 1: This wasn't meant as a Snowden joke

Reply via email to