11.07.2015 Views

Intrusion Detection Systems - Integrated Defence Staff

Intrusion Detection Systems - Integrated Defence Staff

Intrusion Detection Systems - Integrated Defence Staff

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7policy, installing appropriate signatures and other initial conditions, establishingforensic procedures to preserve evidence for possible prosecutions, anddetermining when and what automatic responses are allowed. Users mustdevelop procedures for handling IDS alerts and consider how to correlate alertswith other information such as system or application logs. Integrating the IDS intoa comprehensive system man management framework would simplify this lattertask.• Operation and use: Once an organization deploys an IDS, it must monitor thesystem and respond to the alerts that it reports. This means establishing rolesand responsibilities for analyzing and acting on alerts, monitoring the outcomesof both manual and automatic responses, and so forth. IDSs themselves arelogical targets for attack. Smart intruders who realize that an IDS has beendeployed on a network their attacking is likely attack the IDS first, disabling it orforcing it to provide false information (distracting security personnel from theactual attack in progress). In addition, many commercial and research ID toolshave security weaknesses resulting from flawed design assumptions. These caninclude failing to encrypt log files, omitting access control, and failing to performintegrity checks on IDS files.• Maintenance: Activities include installing new signatures as they becomeavailable, as well as installing periodic IDS upgrades. Sensor placement shouldbe revisited periodically to ensure that system or network changes have notreduced the effectiveness of the IDS. Use of technology alone is not sufficient tomaintain network security. An organization must attract, train, and retain qualifiedtechnical staff to operate and maintain ID technologies.• <strong>Intrusion</strong> <strong>Detection</strong> Technology: Commercial ID technology is immature anddynamic to the point of instability. New vendors appear, only to be absorbed byothers. Both commercial and research products evolve rapidly. Oneconsequence of this rapid change is that product lists, surveys, and a variety ofcommercial, research, and public domain ID tools are available.Commercial products10. Given today’s volatile marketplace, it’s best to use a Web search to locatecurrent products, reviews, and so forth. Commercial product literature is generallyweighted towards marketing, which often makes it difficult to determine the product’sfunctionality and detection approach. Virtually no commercial literature addressesissues such as the frequencies of false alarms, missed detections, or the system’ssensitivity to traffic loads.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!