IDS mailing list archives
RE: Application level IDS?
From: "Eric Greenberg" <eric () netframeworks com>
Date: Wed, 18 Jun 2003 21:26:19 -0400
Hi Smokey, When I think of application-level IDS, wherein some level of knowledge of correct or allowable application-level behavior is known and controlled, I think of products such as those from Okena (recently acquired by Cisco), Entercept's products (acquired by Network Associates), RealSecure Server Sensor and Desktop Protector (formerly the bBlackICE product), and primarily at the desktop, ZoneAlarm. These application-level IDS's focus on managing network-level actions based on application-level knowledge. You gave specific examples of exploits that may not be detectable by IDS systems in general-- for example, it's very hard to detect SQL injection as an incorrect behavior when it is acceptable, though risky, for an application programmer to accept browser input as an argument to a system call. If you or others have thoughts on how an architecture could be developed to detect such things, I'd be interested. I'm sure there are some brilliant minds that have given it some thought. In terms of general approaches to controlling such things, one could consider Java code signing for example, wherein there is the attempt to create the notion of a sandbox-- a safe area-- for executable control. For example, one could imagine containing an SQL script to within a sandbox, thus containing anything that would otherwise be injectable that might represent a function not allowed within the pre-defined sandbox. Or if there were a profile of the application (a dynamically developed sandbox "profile") and an application stepped out of those bounds, a system could perhaps detect it. I tend to think of it as an operating system level function in an ideal world. No doubt though, application-level IDS's nearly become operating system overlays. Regards, Eric Greenberg Chief Technical Officer NetFrameworks, Inc. http://www.NetFrameworks.com -----Original Message----- From: Smokey Lonesome [mailto:smokey_ids () yahoo com] Sent: Wednesday, June 18, 2003 5:52 PM To: focus-ids () securityfocus com Subject: Application level IDS? Hi IDS experts, I'm not deeply familiar with IDS technologies and products, so I apologize in advance if this is a too-trivial question: Is there anything like an "application level IDS" ? (similar to what is now called "application firewall"?) What I mean is something that has the non-intrusive characteritics of an IDS (as it was discussed lately regarding Gartner's article - I'm talking about I_D_S and not I_P_S) but which is doing deep application level analysis, maybe even application-session (cookies?) related analysis (though i'm not sure it is possible to keep track of a session when you're just monitoring traffic). I think such a system should be able to detect the many application level attacks - SQL injections, hidden-fields tampering, cookie poisoning etc. while being more sensitive than a firewall\IPS considering it is not blocking any traffic upon detecting "suspicious" activity. Does something like that exist? Has any of you implemented it? Can it be implemented using any of the existing IDS's (maybe on top of Snort's stream4? Someone mentioned in a recent post "build POP3 protocol intelligence" - how can this be done with existing tools? can it be done for HTTP\HTML as well?) TIA, (-) Smokey. ------ "You can't have everything. Where would you put it?" (Steven Wright) __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com ---------------------------------------------------------------------------- --- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com ---------------------------------------------------------------------------- --- ------------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com -------------------------------------------------------------------------------
Current thread:
- Application level IDS? Smokey Lonesome (Jun 18)
- Re: Application level IDS? Ali-Reza Anghaie (Jun 19)
- RE: Application level IDS? Eric Greenberg (Jun 19)
- Re: Application level IDS? Dug Song (Jun 19)
- RE: Application level IDS? Drew Copley (Jun 22)
- Re: Application level IDS? Dug Song (Jun 19)
- RE: Application level IDS? Fergus Brooks (Jun 19)
- Re: Application level IDS? K. K. Mookhey (Jun 19)
- <Possible follow-ups>
- RE: Application level IDS? adam.w.hogan (Jun 19)