IDS mailing list archives
Re: Wishlist for IPS Products
From: PS R <secureyourself () gmail com>
Date: Mon, 13 Sep 2004 06:29:10 -0400
Appreciate the response, but I wanted to make it clear that I am not advocating any of the suggestions listed, just providing a starting point for the conversation. What I listed is a brief list of what current vendors are providing. I agree with you on the acurate detection base and current vendors, but still feel this should be a requirement. 1200 signatures on an IPS, of which you can enable only 200 confidently to block = 200 IPS signatures and 1000 IDS signatures. I would rather discussed vulnerabilities/exploits covered by the signatures and if you can cover 10 vulnerabilities with a single signature that does not false positive, then you are on to something. Anomaly detection (e.g. new worm detection, detection of new buffer overflows, etc...) should be a part of the product. This should not replace a signature base, but be in addition to signature and ACL parsing. Tools are helpful, but typically are not a part of the IPS being shipped. I do believe good baselining tools should be included to do advanced network analysis/discovery. Thanks Jack On Sun, 12 Sep 2004 00:29:51 -0400, David Maynor <dmaynor () gmail com> wrote:
Yeah....I am gonna go ahead and disagree with you on some of these.I have seen a lot of discussion about the differences between IDS, IPS, and firewalls and the potential for convergence, but I do not recall a discussion on the primary features that an IPS should have out of the box. I am thinking of: - Flow Control - limitations on flooding, unused connections, etc...Most of this should be handled by the signature base.- Robust, ACURATE signature baseOnly way to do this and not create tons of false postives is true protocol parsing. This knocks out most IPS vendors like Tipping Point.- Packet capture - no debate on how much before, as that has been covered - Pre-deployment network analysis tools to accelerate deployment - Anomaly detectionWhy? I have yet to see a system that is more than a parlor trick. Anomaly based system are even easier to evade than sig based systems that don't do protocol parsing. What I would add is better tools for testing. Almost nobody grabs a copy of Canvas from Immunity or Impact from Core and actually checks what attacks are caught. Further more an even fewer number use modded copies of public exploits to see if the claims made by vendors are actually true. How many vendor's IPS implementation would actual catch a MS03-026 exploit if you frag at the RPC layer at a size like 8 bytes?
-------------------------------------------------------------------------- Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. --------------------------------------------------------------------------
Current thread:
- Wishlist for IPS Products PS R (Sep 11)
- Re: Wishlist for IPS Products - HYBRID IPS Andy Cuff (Sep 14)
- Re: Wishlist for IPS Products Srinivasa Rao Addepalli (Sep 14)
- Re: Wishlist for IPS Products David Maynor (Sep 14)
- Re: Wishlist for IPS Products PS R (Sep 14)
- Re: Wishlist for IPS Products Tony Carter (Sep 17)
- Re: Wishlist for IPS Products PS R (Sep 17)
- Re: Wishlist for IPS Products David Maynor (Sep 21)
- Re: Wishlist for IPS Products David Maynor (Sep 20)
- Re: Wishlist for IPS Products David Maynor (Sep 22)
- Re: Wishlist for IPS Products PS R (Sep 24)
- Re: Wishlist for IPS Products David Maynor (Sep 20)
- <Possible follow-ups>
- RE: Wishlist for IPS Products Paine, Steve (Sep 14)