Intrusion Detection: Network Security Beyond the Firewall:Intrusion Detection: Not the Last Chapter When It Comes to Security
function GetCookie (name) { var arg = name + "="; var alen = arg.length; var clen = document.cookie.length; var i = 0; while (i < clen) { var j = i + alen; if (document.cookie.substring(i, j) == arg) { var end = document.cookie.indexOf (";", j); if (end == -1) end = document.cookie.length; return unescape(document.cookie.substring(j, end)); } i = document.cookie.indexOf(" ", i) + 1; if (i == 0) break; } return null; } var m1=''; var gifstr=GetCookie("UsrType"); if((gifstr!=0 ) && (gifstr!=null)) { m2=gifstr; } document.write(m1+m2+m3);
Keyword Title Author ISBN Publisher Imprint
Brief Full
Advanced Search Search Tips
Please Select ----------- Components Content Mgt Certification Databases Enterprise Mgt Fun/Games Groupware Hardware IBM Redbooks Intranet Dev Middleware Multimedia Networks OS Prod Apps Programming Security
UI Web Services Webmaster Y2K ----------- New Titles ----------- Free Archive
To access the contents, click the chapter and section titles.
Intrusion Detection: Network Security beyond the Firewall
(Publisher: John Wiley & Sons, Inc.)
Author(s): Terry Escamilla
ISBN: 0471290009
Publication Date: 11/01/98
function isIE4() { return( navigator.appName.indexOf("Microsoft") != -1 && (navigator.appVersion.charAt(0)=='4') ); } function bookMarkit() { var url="http://www.itknowledge.com/PSUser/EWBookMarks.html?url="+window.location+"&isbn=0"; parent.location.href=url; //var win = window.open(url,"myitk"); //if(!isIE4()) // win.focus();
}
Search this book:
Previous
Table of Contents
Next
Its not hard to see how a scanner can inspect its own configuration files or even the files of other IDSs for errors. But, how do you know if the scanner itself has not been compromised? The scanner is made of one or more binaries. What are the consequences when one of these binaries is patched or hacked? If youve used the Tripwire-like function that provides cryptographic signatures for these files, the scanner could notify you when one of these changesassuming the file-integrity checker program in the scanner has not been compromised. Defenses against tampering are available, such as running binaries off media that is read-only. (Mounting file systems read-only is not guaranteed to work because low-level device driver hacks might bypass file system checking.) One might ask the same kinds of questions about the integrity of firewalls or system-level monitors, too.
With different tool offerings by vendors, you can envision how a system-level monitor can watch for real-time changes to files that make up other IDSs, such as scanners or network sniffers. Provided that the datastream, which the system-level IDS requires, is not compromised (though it can be), this would be a useful way to know whether one of the binaries in the scanner had been hacked. In the future, youll probably buy an IDS that has all three typesscanner, network, and systemcombined into a single tool. At this point, the tool will be watching itself, which poses the same questions for automated responses and countermeasures.
Take It Away
So many other issues are worth discussing, but its time to move on to other things. Hopefully, youve enjoyed learning about intrusion detection tools. Following the old psychological adage about memory, five plus or minus two, and favoring the low end of the scale, it would be good if you could at least take away three thoughts:
Remember to think critically about security products and applications and to reduce things to simple terms. Identify the subjects and objects and make sure that you are clear about how access requests are processed. These basic ideas are at the heart of most computer security products and problems.
Intrusion detection tools play an important role by filling gaps left by traditional security products. The preventative approach is no longer sufficient. You need to add detection and response as well.
Intrusion detection is built from software. Therefore, IDSs are subject to the same criticisms made of other security products. Dont let this distract you too much. IDSs will evolve over time and continue to improve. The net result is better security for you.
Previous
Table of Contents
Next
Products | Contact Us | About Us | Privacy | Ad Info | Home