IDS mailing list archives
RE: session logging IDS
From: "Murtland, Jerry" <MurtlandJ () Grangeinsurance com>
Date: Mon, 13 Sep 2004 12:52:10 -0400
Hmmmm, I would like verification that either Cisco or Intrushield (or any other IDS/IPS) can actually capture an entire session from beginning to end, when the alert was triggered somewhere in the middle, and that they can do it all the time.
From the way that you are stating it, it cannot be done. The IDS's sniffer
must be manually started and cannot go back to the beginning of an attack to find out what happened. This can only be done if the sniffer were enabled 100% of the time, and we all know that you basically cannot do this due to logging capacity. I'm more interested in tethereal and how you say it can go back per the 'tag' keyword. I'd have to try it out to see how this works, but are you saying you can go back and review packets previous from when the sniffer was enabled? I can't see how this could occur since packets are not stored. Jerry J. Murtland -----Original Message----- From: Alex Butcher, ISC/ISYS [mailto:Alex.Butcher () bristol ac uk] Sent: Thursday, September 02, 2004 4:04 AM To: David W. Goodrum; Raj Malhotra Cc: focus-ids () securityfocus com Subject: Re: session logging IDS --On 30 August 2004 18:04 -0400 "David W. Goodrum" <dgoodrum () nfr com> wrote:
Hmmmm, I would like verification that either Cisco or Intrushield (or any other IDS/IPS) can actually capture an entire session from beginning to end, when the alert was triggered somewhere in the middle, and that they can do it all the time.
That would certainly be a new feature for Cisco's offering since the last time I worked with it (Mid-2002). The only other things that I've seen that are relevant are Niksun's NetVCR and Snort/sourcefire. At the moment, out of the box, Snort can only capture subsequent packets in a session or from a source host *after* the alert-triggering packet (using the 'tag' keyword). I'm currently extending ACID and FLoP to allow pcap files of tagged alerts to be downloaded from ACID for analysis using Ethereal or other tools. The other thing I thought of, after being inspired by Niksun's product, was to arrange for tethereal to dump to a pair of files (i.e. a double buffer), switching every n minutes. It would then be possible to arrange for an IDS to send a signal to tethereal (or rather, some controlling process) when it generated an interesting alert, telling tethereal to preserve the previous dump file, and continue logging to the current one until further notice, giving you upto at least n minutes of reverse 'time travel'.
-dave David W. Goodrum
Best Regards, Alex. -- Alex Butcher: Security & Integrity, Personal Computer Systems Group Information Systems and Computing GPG Key ID: F9B27DC9 GPG Fingerprint: D62A DD83 A0B8 D174 49C4 2849 832D 6C72 F9B2 7DC9 -------------------------------------------------------------------------- Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. --------------------------------------------------------------------------
Current thread:
- RE: session logging IDS Bob Walder (Aug 31)
- <Possible follow-ups>
- Re: session logging IDS Richard Bejtlich (Aug 31)
- Re: session logging IDS Tod Beardsley (Sep 01)
- Re: session logging IDS David W. Goodrum (Sep 01)
- Re: session logging IDS Stefan Keller (Sep 01)
- Re: session logging IDS Bamm Visscher (Sep 02)
- Re: session logging IDS Alex Butcher, ISC/ISYS (Sep 05)
- Re: session logging IDS Andy Cuff (Sep 06)
- RE: session logging IDS Paine, Steve (Sep 05)
- RE: session logging IDS Murtland, Jerry (Sep 14)
- RE: session logging IDS Alex Butcher, ISC/ISYS (Sep 14)
- RE: session logging IDS Bill Royds (Sep 15)
- RE: session logging IDS Prabhat Singh (Sep 15)
- RE: session logging IDS Alex Butcher, ISC/ISYS (Sep 15)
- RE: session logging IDS BĂ©noni MARTIN (Sep 15)
- RE: session logging IDS brennan stewart (Sep 16)