02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.10.3.3 Distributed Intrusion Detection System (DShield.org)<br />

DShield.org is an organization that facilitates information collection by providing a method<br />

for submitting firewall logs into a database where <strong>the</strong> information can be tracked and queried.<br />

The identities <strong>of</strong> destination IPs and hosts are protected and information is not shared with<br />

third parties. DShield.org allows this information to be summarized to produce various reports<br />

and summaries, such as <strong>the</strong><br />

• top 10 <strong>of</strong>fending IPs or hosts<br />

• top 10 most probed ports<br />

• lists <strong>of</strong> ports that sites might want to block<br />

Participants can register or can submit logs anonymously. Logs are submitted using prewritten<br />

programs available from <strong>the</strong> DShield.org site, by using third party programs that are<br />

configured to submit logs to DShield.org, or by using programs participants have written<br />

<strong>the</strong>mselves. They can also be submitted via a web interface at <strong>the</strong> site or via email.<br />

DShield.org is sponsored by <strong>the</strong> SANS Institute [DShield 03].<br />

Anyone submitting logs and data should ensure that <strong>the</strong> information has been appropriately<br />

sanitized or is submitted in a secure manner.<br />

For more information see:<br />

http://www.dshield.org/<br />

3.10.3.4 <strong>Incident</strong>s.org<br />

<strong>Incident</strong>s.org is ano<strong>the</strong>r organization sponsored by <strong>the</strong> SANS Institute. Their purpose, according<br />

to <strong>the</strong>ir web site, is to monitor <strong>the</strong> current threats to <strong>the</strong> Internet. This is done through <strong>the</strong><br />

collection <strong>of</strong> intrusion detection and firewall data from volunteers around <strong>the</strong> globe. Instructions<br />

for participating are given at <strong>the</strong> site. Participants receive special client s<strong>of</strong>tware to use<br />

to submit data. There is an analyst on duty who monitors <strong>the</strong> data for anomalies and threats.<br />

O<strong>the</strong>r resources available are a mailing list and a “Handlers Diary” that analyzes <strong>the</strong> current<br />

data collected and provides security resources and technical tips [<strong>Incident</strong>s 03].<br />

Anyone submitting logs and data should ensure that <strong>the</strong> information has been appropriately<br />

sanitized or is submitted in a secure manner.<br />

For more information see:<br />

http://www.incidents.org/<br />

http://www.incidents.org/faq/<br />

126 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!