📄 318-320.html
字号:
<tr>
<td width="117" align="center">
<font face="Arial,helvetica" size="1">
<SELECT NAME="cat" onChange='top.location.href=this.options[selectedIndex].value;' style="font-size: 10; font-family: sans-serif;">
<option value="" selected>Please Select
<option value="">-----------
<option value="/reference/dir.components.html">Components
<option value="/reference/dir.contentmanagement.html">Content Mgt
<option value="/reference/dir.certification1.html">Certification
<option value="/reference/dir.databases.html">Databases
<option value="/reference/dir.enterprisemanagement1.html">Enterprise Mgt
<option value="/reference/dir.funandgames1.html">Fun/Games
<option value="/reference/dir.groupwareandcollaboration1.html">Groupware
<option value="/reference/dir.hardware1.html">Hardware
<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
<option value="/reference/dir.middleware.html">Middleware
<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
<option value="/reference/dir.networkservices1.html">Networks
<option value="/reference/dir.operatingsystems.html">OS
<option value="/reference/dir.productivityapplications1.html">Prod Apps
<option value="/reference/dir.programminglanguages.html">Programming
<option value="/reference/dir.security1.html">Security
<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
<option value="/reference/dir.userinterfaces.html">UI
<option value="/reference/dir.webservices.html">Web Services
<option value="/reference/dir.webmasterskills1.html">Webmaster
<option value="/reference/dir.y2k1.html">Y2K
<option value="">-----------
<option value="/reference/whatsnew.html">New Titles
<option value="">-----------
<option value="/reference/dir.archive1.html">Free Archive
</SELECT>
</font></td>
</tr>
</table>
</form>
<!-- LEFT NAV SEARCH END -->
</td>
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->
<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->
<!-- begin main content -->
<td width="100%" valign="top" align="left">
<!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=12//-->
<!--PAGES=318-320//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="315-318.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="320-322.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Statistical Anomaly Detectors</B></FONT></P>
<P>Statistical anomaly detectors establish a baseline for a number of variables for each subject of interest. The usual example given is tracking the number of times a given user runs particular commands. A threshold is set by the tool administrator. When the threshold is exceeded, an event is generated.
</P>
<P>IDSs based on statistical anomaly have a number of proponents. CMDS is the often-quoted example that has a good-sized install base. A number of hacks and misuses can be caught by threshold monitoring. However, difficulties are encountered with this approach. Setting the baseline can be a problem. For experienced users, it’s not uncommon to find noisy data and, thus, run the risk of too many false positives. The soundness of the underlying statistical assumptions also has been questioned. The difference between a legitimate and an illegal privilege escalation is not something that is detected by counting commands. CMDS contains a pattern-matching component to offset these shortcomings with the anomaly detector piece of the tool.</P>
<P><FONT SIZE="+1"><B>NT System Level Tools</B></FONT></P>
<P>Centrax is developing some very impressive NT system-level IDS tools. The team there is very experienced at building commercial intrusion detection systems. Keep an eye on them for what is likely to be a market leader. Competition is expected from other vendors who also now offer system-level IDS for NT. The Kane Security Monitor sold by Security Dynamics is another player is this space.
</P>
<P>Over time, NT IDS offerings will increase in the marketplace. Understanding heterogeneous UNIX audit logs is a complex process that was mastered by only a small number of vendors. NT event logs are more easily available to developers and are more easily understood. Thus, more players are sure to emerge in the NT system-level IDS space.</P>
<H4 ALIGN="LEFT"><A NAME="Heading11"></A><FONT COLOR="#000077">Network Sniffers</FONT></H4>
<P>Network IDSs are a critical component of your perimeter defense because they catch attacks that system-level IDSs cannot. IDSs that detect attacks by sniffing network traffic in real time watch for protocol attacks, for attempts to run well-known hacked programs, and for strings that may indicate policy violations. Most sniffers support a client-server model in which a central engine receives notifications from multiple sensors. Like most other real-time IDSs, network sniffers provide real-time alerts and options to terminate offending connections. Some risk exists in automating the <I>kill connection</I> response because often hackers forge IP addresses or launch attacks from compromised systems at legitimate sites (such as universities).</P>
<P>To catch attacks, the sniffer must reside where all of the packets can be seen. As shown in Chapter 9, “Sniffing For Intruders,” in some configurations network packets will not be seen by the sniffer. The best placements for a network IDS sniffer are just inside the perimeter network, in the secure network immediately after the firewall, and after the router or gateway on other subnets. In these positions, the inbound and outbound network packets will be visible. However, anytime two nodes within a subnet exchange packets, and the traffic does not flow past the network IDS, there is a potential for missed attacks.</P>
<P>Sniffers are hampered when network traffic is encrypted between two arbitrary nodes. If the sniffer sits in the network after the firewall, and the firewall is the system that decrypts packets, then the sniffer will see cleartext packets. However, if two nodes have their own IP tunnel, only those nodes will decrypt the packets. In order to be effective in this scenario, the sniffer code must be running in the IP stack just after the packets are decrypted by the IP layer. To complicate the effectiveness of sniffers further, application-level encryption limits what a sniffer can detect to only those attacks in the network protocol itself—address spoofing, session hijacking, SYN Flood, and others. An argument put forward in this book is to allow applications to call IDS routines <I>after</I> the packets have been decrypted.</P>
<P>Some overlap exists between firewalls and network IDSs in that firewalls also look for attacks, such as SYN Flood, Ping of Death, and other protocol exploits. Because both firewalls and sniffers examine network traffic, it’s likely that there could be convergence of these two functions. A recent <I>Infoworld</I> report rated the IBM Emergency Response Center, ISS RealSecure, and Network Flight Recorder highly in their comparison tests. However, only Network Flight Recorder caught all of the attacks in the test suite. In some respects, this result is not surprising because the evaluation team wrote custom signatures specifically to catch the attacks in the test suite.</P>
<P>Finally, some recent papers identify shortcomings in network IDSs. The weaknesses stem from attacks that can cause the IDS and the actual destination of the IP packet to process different datastreams. In some cases, the IDS processes packets that are ignored by the destination node. The converse also is possible. Both of these cases can lead to network-based attacks that are not detected by some sniffers. The products’ owners are undoubtedly addressing these issues in upcoming releases.</P>
<H3><A NAME="Heading12"></A><FONT COLOR="#000077">Improving upon IDSs</FONT></H3>
<P>Because IDSs are not the last word in security, opportunities exist for improvement. Here are some important areas in which advances are needed.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="315-318.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="320-322.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- BEGIN SUB FOOTER -->
<br><br>
</TD>
</TR>
</TABLE>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -