IDS mailing list archives

Re: IPS Implementaion


From: proneetb () redback com
Date: 14 Sep 2007 17:23:08 -0000

Hi Chris,
  Moving from an IDS centric world to the IPS side is always a big 
challenge. Much of this challenge has  to do with
  how much of legitimate traffic can you afford to drop because of false 
positive. While it will be tough to
  find any good online book as much of the tuning which you would need 
to do is specific to your
  environment and the vendor you are using, there are some general 
guidelines of the sequence in which
  you should proceed.

  The first thing which you should be enable is the DOS/DDoS/Scan attack 
category. These are useful as
  typically the first signs of a machine infected with a worm/bot would 
be to exhibit this behavior.

 Safely enable all the TCP and IP flags(example: SYN and FIN set at the 
same time) related signatures as most of the stacks of today take care 
of these anomalies and if there are any such packets roaming around, 
they can be safely dropped without affecting the end machine behavior.

 If your vendor differentiates between exploit and vulnerability based 
signatures, go ahead and enable the exploit signatures as they typically 
have
 a very high level of confidence. Ask the vendor about the network 
performance impact of each signature before enabling as some of these
 signatures do pattern match which can be very processing intensive and 
your inline IPS box might become a bottleneck.

Hope this helps.


Regards
Proneet.
 

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw 
to learn more.
------------------------------------------------------------------------


Current thread: