19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

In the case of anomaly detection, on the other hand, the assumption is that the<br />

normal behaviour of users or computers can be statistically recorded, and<br />

deviations from this are judged to be attacks. One example of this is the period<br />

of time within which a user is normally logged in at her computer. If she<br />

almost always works from Monday to Friday within the period from 8 a.m. to<br />

5 p.m. with deviations of no more than 2 hours, any activity on Saturday or at<br />

midnight can be classified as an attack. <strong>The</strong> problem with anomaly detection<br />

is how to determine what is normal behaviour. Some conclusions can be<br />

drawn on the basis of threshold values or probability considerations. It appears<br />

questionable, however, whether it makes sense to immediately classify an<br />

activity by user A on Monday at 7.10 p.m. as an attack. Also, a user's normal<br />

behaviour usually changes, meaning that adaptations have to be made. Who<br />

tells the ID system, though, that this change in behaviour is OK and not an<br />

attack?<br />

It also makes sense to subdivide ID systems according to the type of data<br />

acquisition involved. This can be done either with the aid of a dedicated<br />

sniffer somewhere in the network (network-based ID system), or it can be part<br />

of the normal logging functionality on one of the connected computers (hostbased<br />

ID systems). <strong>The</strong>re are advantages and disadvantages to both. It has to<br />

be said that it is easier for network-based systems to detect a wide-ranging<br />

attack that affects various computers at the same time. It is considerably more<br />

difficult, however, to detect complex attacks (e.g. via other intermediate<br />

stations) on one computer. Over and above this, network-based systems<br />

cannot analyse encrypted data. As for the host-based ID systems, extensive<br />

changes may have to be made to the logging functions for the computers<br />

before they can be used.<br />

Because data privacy stipulations or staff agreements also have to be observed<br />

even when logging information is evaluated automatically, it may be<br />

necessary in some circumstances to store the data under a pseudonym.<br />

<strong>The</strong> following aspects should be taken into account before coupling an ID<br />

system, IR system and firewall:<br />

- Is it possible to deliberately initiate an attack on the firewall which is<br />

erroneously interpreted by the ID system as a genuine attack? If the IR<br />

system subsequently triggers the disabling of certain services across the<br />

firewall, this can have considerable consequences for availability.<br />

- <strong>The</strong> interaction between the ID system, the IR system and the firewall<br />

should be sufficiently transparently documented. Otherwise it is not<br />

possible to assess at any one time who the firewall is administered by:<br />

by the IR system or by administration staff. If there is any doubt,<br />

decisions by the administration staff should take priority.<br />

In order to rule out attacks against an ID system itself, it should be invisible<br />

from the network, as far as this is possible. <strong>The</strong> simplest provision is to assign<br />

an IP address that is not routed in the Internet. It is also recommended to<br />

deactivate the ARP protocol for the corresponding interface so that there will<br />

be no response to either ARP or IP packets.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!