IDS mailing list archives

Re: Views and Correlation in Intrusion Detection


From: Blake Matheny <bmatheny () mkfifo net>
Date: Fri, 20 Jun 2003 12:47:29 -0400

snip...
context as what constitutes suspicious.  You observe that packets
matching j. random scan signature aren't very interesting unless the target
happens to be vulnerable to the thing being scanned for.  Fair enough.
snip...

Ahhh, now we're getting to the heart of the matter! What constitutes
'interesting traffic', but more so, do {H,N}IDS give you enough information to
make that decision? I would say no, but I would also say, that this isn't the
job of your {H,N}IDS. I personally take the Unix approach to intrusion
detection. Have small components that do individual tasks well, they can be
combined to do something more powerful. If your NIDS can collect data and get
it to you, excellent. If you can also capture your syslog, excellent. And so
on. The problem with this data generation ends up being, that you now have a
bunch of _data_, you want _information_. How do you gain information?
Unfortunately, IDMEF is not the answer. While I agree that an intermediary
(common) representation is a key component, IDMEF is specific to intrusion
detection. If IDS provided all the information we needed, that would be fine.
However, as I said before, we live in a heterogenous world, and the
information we need is stored in a variety of contexts and formats. Don't think
just IDS, think configuration files, think ID data, think syslog data, think
network configurations, etc. The question is, how do we get information out of
all of our data? Food for thought.

Cheers,
-Blake


-- 
Blake Matheny           "... one of the main causes of the fall of the
bmatheny () mkfifo net      Roman Empire was that, lacking zero, they had
http://www.mkfifo.net    no way to indicate successful termination of
http://ovmj.org/GNUnet/  their C programs." --Robert Firth

-------------------------------------------------------------------------------
Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
world's premier technical IT security event! 10 tracks, 15 training sessions, 
1,800 delegates from 30 nations including all of the top experts, from CSO's to 
"underground" security specialists.  See for yourself what the buzz is about!  
Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
-------------------------------------------------------------------------------


Current thread: