19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.71 Intrusion detection and intrusion response<br />

systems<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

One of the key tasks of a firewall administrator is to analyse the accruing<br />

logging data so as to be able to detect attacks soon after the event. In view of<br />

the wealth of data and the multitude and complexity of the various possible<br />

means of attack, this results in a considerable amount of work. Intrusion<br />

detection (ID) and intrusion response (IR) systems can help in this.<br />

<strong>The</strong> aim of an ID system must be to provide assistance to an average<br />

administrator to the extent that he or she is able to detect an attack in a large<br />

number of logging files without the need for in-depth knowledge of the field<br />

of Internet security. IR systems, on the other hand, serve the purpose of<br />

initiating countermeasures automatically as soon as an attack has been<br />

detected.<br />

In an ideal situation these programs will have as much information at their<br />

disposal as a good administrator, and will therefore be able not only to detect<br />

an attack in any logging data but also to provide indication of the severity of<br />

the threat and what countermeasures are necessary. Currently, however, this<br />

field is still the subject of intensive research, so significant improvements to<br />

existing programs are possible at any time.<br />

Intrusion detection systems can essentially be divided into two classes:<br />

signature analysis and anomaly detection.<br />

Signature analysis is based on the assumption that many attacks can be<br />

detected on the basis of a certain sequence of logging data. One example is the<br />

technique known as port scanning. In advance of an attack, the intruder first<br />

establishes which services on the attacked computer are addressable, i.e. to<br />

which TCP ports it is possible to set up a connection. This involves using a<br />

program to send a connection setup packet to all TCP ports one after the other.<br />

If a connection is established, a service is installed there and can be attacked.<br />

<strong>The</strong> corresponding signature, i.e. distinctive feature, of this attack is simple:<br />

connection setup packets which are successively sent to all TCP ports.<br />

<strong>The</strong> problems with this type of intrusion detection also become immediately<br />

apparent, however: in what order do the ports have to be addressed and at<br />

what time intervals, if an attack is to be distinguished from normal operation?<br />

<strong>The</strong> latest port scanning programs operate in such a way that they do not scan<br />

port 1, port 2 through to port n, but do this in a random order. It is also<br />

possible for the packets not to be sent directly one after the other, but at<br />

random intervals (e.g. 1 s, 100 ms, 333 ms, 5 s ...). This makes it difficult to<br />

determine the signature.<br />

A subtle variant of port scanning involves sending individual packets from<br />

different source addresses. Used in conjunction with the time-staggered<br />

initiation of the packets described above, the probability that an attack will<br />

remain undetected is currently very high.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!