Google

Is Network Intrusion Detection Software Being Used Correctly?

Is Network Intrusion Detection Software Being Used Correctly?

Contact:[email protected]

Viewpoint 
Is Network Intrusion Detection Software Being Used Correctly? 
By Marcus J. Ranum 


------------------------------------------------------------------------
--------

It's early Sunday morning and the network manager is sleeping at home. A
stealth hacker program is unfolding itself behind the company's
firewall, preparing to open a path into the network. Immediately, the
network manager's pager is activated: "Attack in progress!" 

Within minutes, the network manager has logged in over a secure link,
accessed the company's intrusion detection system, and obtained complete
details of the origin and nature of the attack. After a few quick phone
calls, the penetration is blocked, and law enforcement agents will soon
be knocking on the hacker's front door. 

Sounds great, doesn't it? Unfortunately, the reality of network
intrusion detection and response doesn't even come close to this
hypothetical scenario. For one thing, most intrusion detection
systems--software and hardware components that detect incursions into a
network--cannot trace an attacker back to his or her point of origin. 

Yet many network managers are purchasing intrusion detection systems
anyway. Are they getting their money's worth? Are their networks any
safer? The evidence suggests that the answer is no to both questions,
but that need not be the case. 

IDS type. 
Researchers have been working on intrusion detection systems for a long
time without achieving what could be called a major breakthrough.
Currently, users have two choices: anomaly detection and misuse
detection. But each has serious limitations. 

Anomaly detection. The usual line of research focuses on what is called
the anomaly detection intrusion detection system (AD-IDS). An AD-IDS
"learns" what constitutes normal network traffic, developing sets of
models that are updated over time. These models are applied against new
traffic. Traffic that doesn't match the normal model is flagged as
suspicious. 

These systems are attractive conceptually, but it is hard to create a
reliable model for normal traffic. As networks grow, the mix of
applications becomes so complex that traffic looks random. A patient
hacker may even generate his or her own traffic to generate a distorted
model of normal so that, sooner or later, an attack may look normal and
get past the IDS. On the other hand, if the IDS is set up with a narrow
definition of normal, the system will generate large numbers of false
positives, and the IDS will be ignored. 

Much research is still being done on AD-IDS, but for now these systems
are not the answer. 

Misuse detection. Many companies offer an easier to operate form of IDS
called misuse detection intrusion detection systems (MD-IDS). The MD-IDS
resembles a virus scanner attached to a network. It is usually
programmed with signature sets representing the types of connections and
traffic that indicate a particular attack. Other forms of these systems
rely on host platform information, such as C2 audit logs (which record
information such as file accesses), to detect patterns of suspicious
activity. 

These systems are fast and don't generate false positives because they
"understand" what attacks look like. But, like virus scanners, MD-IDSs
cannot detect something that the network manager doesn't know about--the
type of attack the network manager most wants to detect. For an MD-IDS
to be useful, its signature sets must be constantly updated. Even so,
the network will still be vulnerable to new attacks. 

It is also distressingly easy for an attacker to hide traces of the
attack. For example, if an MD-IDS on a UNIX system is configured to look
for the attack string "rootkit," a hacker might disguise an attack by
inserting an "X" and an "F" into the attack stream ("rooXFtkit"). With a
few keystrokes, the hacker can assign the "F" key the function of the
"delete" or "erase" key. In the string "rooXFtkit," then, the "F" will
erase the "X" with the result that "rootkit" will have eluded the
MD-IDS. (For an excellent discussion of these types of problems, see
Secure Networks Inc.'s paper "Problems with Intrusion Detection
Systems," available through Security Management Online.) 

IDS placement. 
Regardless of the type of IDS software selected, the user must also
decide where to place it: inside the firewall or outside. Most IDSs
these days are deployed outside the network firewall, where they detect
any attack and send an alarm. By contrast, if an IDS were placed within
the firewall, it would detect only attacks that penetrate that security
shield. 

The latter approach, though less used, is the better one. It saves the
system administrator from wasting time on failed attempts to enter the
system. (Remember, a firewall is actually preventing the attacks on the
system, and it will do so regardless of whether an IDS is in place to
monitor real-time attacks.) 

When I built my first security and mission critical Internet system in
1991 as a part of a major corporation's Internet gateway, I set up an
IDS to look for common system commands that hackers often try (but that
the corporation didn't use), and attackers were detected about twice a
week. I used to backtrack the attacks, and often caught the hackers. But
while the attacks were frequent, the hackers were usually just "rattling
the doorknobs," and it would have been prohibitively expensive to try to
prosecute. 

The process of running down an attack and documenting the incident took
about four hours per attack. The effort had no impact--as the arrival
rate of new Internet users increased, so did the attack rate--but it was
costing me sixteen hours a week. Since I had built the system, I knew it
could resist the attacks it was detecting. My effort at backtracking was
a waste of time, especially since I wasn't authorized by the company to
do follow-up that might lead to a prosecution. 

Today, it is even harder to track hackers. Even companies with the time
and resources to pursue attackers may find themselves following dead-end
trails. The address from which the attack appears to originate could
just be spoofed, for example. Even if the administrator knows where the
attack is coming from, it is almost always from a stolen or fraudulently
acquired account. It is more cost effective to simply chase hackers away
and get back to work. 

Intrusion detection systems can be effectively employed, however. Using
a technique I call "burglar alarms," an IDS can provide a useful and
reliable notification of certain classes of security incidents. 

A computer network burglar alarm is an IDS that relies on an
understanding of the network and what activity should not happen within
it. To understand network burglar alarms, consider a home alarm system
in a house that enforces a simple security policy: when I am not home,
nobody should be operating doors or windows, breaking glass objects, or
operating the door to the safe. Based on that descriptive policy, I can
design a burglar alarm system using switches at doors/windows, glass
break detectors, and some tamper switches. 

One of the best tools for building a burglar alarm intrusion detection
system is an MD-IDS because it has a rules base that is configurable for
where to look for intrusions and what exactly to look for. (An AD-IDS
doesn't work well for this purpose because it is not easy enough to set
up and operate.) 

The MD-IDS should be set up to detect any anomaly and register an alert.
Suppose, for example, a network is behind a firewall that blocks
Internet Protocol (IP) traffic: the firewall is configured to look for
certain IP address ranges and trip an alert if any are found inside the
firewall. If the firewall does not allow any incoming traffic except for
e-mail, Usenet, and domain name service to a central mail hub, the
MD-IDS should be set up to send an alert if the firewall permits
connections to internal systems for other than those services, to other
than those specific servers. 

If a network manager is concerned that an insider might try to hack
outside sites, the MD-IDS can be configured to send an alert if certain
types of traffic go out through the firewall. 

Perhaps the most powerful capability of burglar alarm IDSs is that they
challenge the attacker with the unexpected. If someone breaks in, that
person needs to familiarize him or herself with the network. Just as a
burglar may rummage through jewelry boxes or drawers once past the
perimeter alarm, a hacker will scan a network for systems that look
attack-worthy. 

Detecting internal scans is as effective a way of catching a hacker as a
magnetic tamper switch under a money clip on the dresser is for catching
a burglar. Most hackers, like burglars, are not expecting creative
defenses--once they get through the firewall, they assume that nobody is
watching. 

To get the best mileage out of an IDS, the network manager should draw
up a list of the kinds of incursions that could cause a serious problem
and set the system up to watch for them. The IDS should be placed inside
the firewall, where it can detect all activity that puts information and
systems at serious risk. The number of typical attacks seen on the
internal network should be very low, and will either represent auditors
or hackers that have somehow gotten through the perimeter. In the worst
possible case, it may detect employees launching hacks against sites out
on the Internet or against internal locations of which they are not
authorized users. 

As with all Internet software, security software is improving at a rapid
rate. The near future promises IDSs that combine anomaly detection with
misuse detection, and hopefully they will integrate smoothly with
firewalls and other security systems. Until then, the technology should
only be used as part of an overall defense strategy--and where it will
be the most effective, not where it will generate the most hits. 



------------------------------------------------------------------------
--------

Marcus Ranum is the CEO of Network Flight Recorder, Inc., a firm
specializing in network traffic analysis software. He built the first
commercial Internet firewall product in 1991 and subsequently designed
and implemented several other significant security systems. He is a
coauthor of the recently published Web Site Security Handbook. 
 





Security Management OnLine 


Back to the Index