Intrusion Detection 55
Disgruntled Goat sent us a review of Intrusion Detection, a text sure to be of interest to all those working in organizations. The author is a former NSA employee and has written this book as a text to convince upper-level types of the need for security and actually paying attention to it. Click below to read more.
Intrusion Detection | |
author | Rebecca Gurley Bace |
pages | 339 |
publisher | Macmillan Technical Publishing, o01/2000 |
rating | 9/10 |
reviewer | Disgruntled Goat, disgruntled_goat@hotmail.com |
ISBN | 1-57870-185-6 |
summary | Very good InfoSec handbook for suits and junior suits. |
The Scenario
Security books, quite frankly, are pretty much a dime a dozen, most of which are written by people in IT field security. What immediately separates this book from the rest is the background of the author. Ms. Bace is an ex-government employee, spending 12 years in everyone's favorite spook organization, the National Security Agency. She led the Computer Misuse and Anonmaly Detection (CMAD) Research Program for six years at the NSA. She also collaborated on Computer Crime : A Crimefighter's Handbook by Dr. David Icove of the FBI. She also won the Distinguished Leadership Award in 1995 from the NSA.
What's Bad?
This book is sort of dry reading. It's akin to reading college CS textbooks for pleasure. Or law books. What I didn't like is the fact that she wasn't real clear on the distinction of "hackers", nor how she describes them. She worries that "hackers" wish to "corrupt the trust process". And the focus for the book is not primarily for techies. It's designed for CIO smacking. Generally, if you're in an organization like mine, your CIO has very little technical background. So, good for CIO bashing.And, it's $50 also.
What's Good?
This is good if you're in a position where you need to convince management of security threats. It's also good for the kiddies who want to get an idea of what to look for when they're gunning for targets to disrupt.What made this good for me was the fact that I could have points to show to management for InfoSec issues. I work in a hospital and we tend to attract a large amount of famous people as patients. If something damaging was leaked to the media about a famous person's medical condition that was potentially embarassing, we're looking at a good multi-million dollar lawsuit. This book isn't a by-the-book "How to protect your systems", but more of a book on what to safeguard, and how to detect patterns that may indicate patterns of unauthorized usage.
One of the things that I liked was the chapter on Legal Issues. One of the sections in the chapter was "What Real Cases Have Taught Us". It did a few page review on Mitnick's case, cut and dry. It shows that Shimomura was no rocket scientist, and with cooperation from the courts, you can bust almost anyone. But it did bring up several good points, such as obtaining court orders, how laws work, and how it can be considered evidence.
So What's In It For Me?
If you're a script kiddie, probably nothing. But for those who are achin' to topple some network, this may be for you.For those with functioning brains who have vested interests in InfoSec and protecting their organization from people who wish to do harm, and getting real security info, rather than from those half-assed "Security Experts" like JohnP, then pick this up.
Pick this book up at ThinkGeek.
Table of Contents
- The History of Intrusion Detection
- Concepts and Definitions
- Information Sources
- Analysis Schemes
- Responses
- Vulnerability Analysis: A Special Case
- Technical Issues
- Understanding the Real-World Challenge
- Legal Issues
- For Users
- For Strategists
- For Designers
- Future Needs
whois nsa.gov (Score:3)
VIIDS (Score:2)
the post anonymous button would be nice right now...
anyway, VIIDS = visual imagery and intrusion detection systems: ie. my current job. (yes, also government)
this much i will tell you, the majority of the equipment used (and i don't know about NSA) but for priority A and B resources (being Nucelar Weapons and Armed Fighters/Weapons Storage areas, etc.) DO NOT have all that hi-tech junk you see on tv. up until recently our annunciator system was a hunk of metal developed by the navy back in the 60-70's. the rest is mainly motion detectors, sensors, etc.
These aren't used so much to prevent ppl from getting in, but also to deter admitance. (Don't worry though, should u get in, there are cops in there still who have full athority to shoot you). In fact almost daily i see a sign that states "Use of Deadly Force is Authorized".
As far as if you were to try and hack the computer annunciator systems, well, first you'd have to get access to them, they're not on an outside network, so good luck there.
basically, if someone once this stuff bad enough, they can get it. It will however take them alot of work, and also would result in probably a lot of damage to the equipment to get it out of the area.
to all the would be's who think they want to try, good luck, and i hope you can run fast cuz i'll shoot your ass too.
Re:Intrusion Detection - An Analysts' Approach (Score:4)
Deception ToolKit (Score:5)
Dear IRS,
I am writing to you to cancel my subscription.
Check out this ID book (Score:2)
by Stephen Northcutt
ISBN: 0735708681
Excellent book on intrusion detection.
Computer Security by Gov't (Score:3)
Re:Intrusion Detection - An Analysts' Approach (Score:2)
Re:VIIDS (Score:4)
Just to toss out a couple half decent links on intrusion detection systems, for those who are interested:
This is a good link that compares a few commerical network IDSs [data.com]
This is a shitty test suite for network IDSs [infoworld.com]
Damn, I thought I had more. Oh well, enjoy!
Re:Deception ToolKit (Score:1)
Cons: Actual services can still be cracked. Also, by using the DTK, you might be opening up another security hole; crash DTK and get root, yadda, yadda, yadda,...
The author is well connected (Score:3)
Anyway, when I met her, Peter Neumann (yes,
Re:Deception ToolKit (Score:2)
Re:Deception ToolKit (Score:4)
There are many ways to respond after the attacker tries to exploit it. One of the more common is to log whatever info you can get and try to pursue him.
It's main usefulness with script kiddies lies in that the attacker will be off trying to figure out wtf is wrong with his shellcode while you have the FBI kick in his door.
However against more organized attacks from more powerful entities (governments, corporations) it can only serve as an obfuscator and an early warning system.
Re:Computer Security by Gov't (Score:2)
Stoll ? Isn't that a decade old by now ?
Things change. Net things change insanely fast. Even governments can't be relied upon to stay stupid forever (*). If you read a net book that was in print a month ago, chances are that it's only fot for fish & chip wrappers by now.
* Well, maybe not repeatably stupid in a consistent manner 8-)
Re:Intrusion Detection - An Analysts' Approach (Score:2)
http://www.cl.cam.ac.uk/users/rja14/
He has lots and lots of interesting stuff on security on his site. The lottery paper was great.
Intrusion Detection (Score:3)
Re:Computer Security by Gov't (Score:1)
Read @ Large (forget the authors at the moment) but it details a story (from the mid 90's) very similar to the one presented in Cuckoo's Egg. Same attitude, same lack of security.
Also, take a look at all of the defaced web pages on 2600.com or Hacker News Network...more than 50% are gov't sites, and more than half of those are military installations. While web sites may not qualify as "sensitive", I find that good security professionals tend to secure all machines in their purview, whether or not they really need it.
-FP
Re:whois nsa.gov (Score:1)
Re:whois nsa.gov (Score:1)
A good Linux security book. (Score:2)
Title: Maximum Linux Security
Publisher: SAMS Publishing
Author: Anonymous
ISBN: 0-672-31670-6
LOCCCN: 99-61434
First Printing: September 1999
Pages: 743
Micro-Review: Definitely worth buying, reading, and implementing.
PHB's and security... (Score:3)
I think a book like this could be very useful in such situations when the person in charge simply doesn't grasp the basic principles of network security (or really networks in general.) And if reading it doesn't help it sounds big and heavey enough to be used as an effective LART.
InfoSec (Score:3)
The main InfoSec problem out there today is that the people who control where the IT money is spent, don't always understand the risks associated with ignoring or cutting back on proactive security measures. This book gave me a different way to present. I'd strongly recommend it to both InfoSec folks as well at senior IT management.
Never knock on Death's door:
Re:Check out this ID book (Score:1)
Aye, right on. (Score:1)
Re:PHB's and security... (Score:4)
Not to defend your PHB, but a lot of people consider this to be a misfeature. The problem is with DOS by spoofed attacks. If you don't want host B to talk to host A and A is running portsentry, just spoof attack from B to A.
Nmap, for example, has an option to spoof attack source and warns about the potential side effects on portsentry.
Kaa
Re:Check out this ID book (Score:1)
Re:Intrusion Detection - An Analysts' Approach (Score:2)
Intrusion detection software: (Score:4)
1. IDS systems are notorious for dropping packets. Attacks to your network can be missed when the bandwith utilization on your network exceeds a certain percentage. Many IDS systems are only reliable in this fashion up to 10Mb connections.
2. Intrusion detection programs generally will not reorder packets. Any attacks with fragmented packets, out of order packets, and so on will often slip by without being detection. This is also a good way to penetrate a firewall packet filtering rule that does not reorder/reassemble packets.
3. IDS systems tend uto use a string matching algorithm to detect network attacks ( such as a phf or php ) and variances in the attack string can also potentially bypass the IDS without generating an event.
An intrusion detection system is a good tool to top off your networks security policy.. It should not replace human intervention or other security measures including a firewall and proactive network scanning.
LW
Re:PHB's and security... (minor correction) (Score:2)
Re:whois nsa.gov (Score:2)
$ whois nsa.gov
National Security Agency (NSA-DOM)
9800 Savage Rd.
Ft. Meade, MD 20755-6000
Domain Name: NSA.GOV
Status: Active
Administrative Contact:
Quinn, Patricia E. (PEQ)
(301) 688-3741 (FAX)(301) 688-1280
PEQ@NCSC.MIL
Domain servers in listed order:
TOPSCALE.NSA.GOV 144.51.68.4
ROMULUS.NCSC.MIL 144.51.5.2
NS1.QWEST.NET 216.111.65.217
NS2.QWEST.NET 205.171.16.250
Record last updated on 26-Oct-99.
Please be advised that this whois server only contains information
pertaining to the
use the whois server at RS.INTERNIC.NET.
NSA /.'ed? (Score:1)
MODERATE ABOVE UP White's "Re:Deception ToolKit" (Score:2)
Also, there's a fundamental problem with all of these honeypot systems. Say you're running a web server, no ssl or any weird stuff, and have locked it down to JUST port 80. You get portscanned, maybe a kiddie devotes a few seconds trying the best port-80 hacks.
OTOH, you have a honeypot or port listener running, and you pop up like a glowing beacon in the night as, well, a honeypot worthy of much, much attention.
Of course if your server's already a mound of tantalizing open ports, the loss in making it (look) more attractive are less in comparison with being able to capture kiddies, or at least scare them with lawyers.
Re:NSA /.'ed? (Score:2)
Hey CmdrTaco, here's a new slashbox or side-menu item, list of famous websites we've slashdotted back to the stoneage.
Re:A good Linux security book. (Score:1)
Securing a system is making it safe, whereas intrusion detection is something totally different: registring security-breach attempts.
Re:Computer Security by Gov't (Score:1)
It isn't just computer security that suffers -- read Rogue Warrior by Richard Marcinko. His Red Cell team play-acted as terrorists to evaluate Navy security, and the same attitude was present -- most of the commanders were too worried about looking bad to actually implement real security.
Aetius
Why offend someone with style when you can offend them with substance?
Counterpoint/complement to Northcutt Book (Score:2)
http://bejtlich.home.texas.net/intv2-1.txt
The author takes a different view on some of Stephen Northcutt's analysis, especially regarding reset scans. (He says they don't really exist.)
Re:Computer Security by Gov't (Score:2)
I'm willing to bet the government's attitude toward technology hasn't changed much, either. My favorite moment in the book, right up there with using the "Man Who Never Was" technique to expose someone breaking into their system, was the FBI guy who, after being presented with a paper trail of evidence starting with a miniscule accounting error and leading to connections to East Germany, asked incredulously if Stoll expected him to mobilize the FBI because Stoll found a quarter missing.
--
"Maximum Security" (Score:1)
Is that based on an earlier book called "Maximum Security" also published by SAMS and written by anon?
If so, then what are the differences? I've got a copy of "Maximum Security" and it's great.
--
Simon
Actually, some can (Score:1)
The cool thing is that the only product that could do both (BlackICE Sentry) is also available as a $40 personal version (BlackICE Defender [networkice.com]) that you can install on your own (Windoze) machine. It includes a personal firewall to boot and is really easy to use. It also has extensive anti-evasion technique to solve problem number 3 that you mention. Go to networkice.com and download a copy of it if you don't believe me.
On-line IDS info (Score:1)
Try BlackICE Defender (Score:1)
Small problem with BlackIce... (Score:1)
So while it has it's uses, it's not much good if you have downloaded a trojaned program from Jo Bloggs quick and dirty software archive.
I'm not saying that this makes it useless - just that if you install it, you shouldn't allow yourself to develop a false sense of security.
Re:Counterpoint/complement to Northcutt Book (Score:1)
http://bejtlich.home.texas.net/intv2-1.t xt [texas.net]
Re:Computer Security by Gov't (Score:3)
That's the problem with Stoll's approach. He starts with a minute error and insists that it's a consequence of something untoward.
These days we all work on Web Time. If it's not done and dusted by Monday, it will be obsolete by Tuesday. No-one has the time to chase pennies. Even individual fraudsters aren't hunted down - I've met ecomm retailers who simply couldn't chase single frauds and would only go after something that looked like a volume syndicate. For the one-offs, the only thing they had the time and money to cope with was letting the item be shipped and then swallow the back-charge from the cc company. RealShopping outlets have taken a similar line for years - they just accept a certain level of stock wastage.
There's also the volume issue. In Stoll's day a hack attempt was done by a hacker who created the tools himself. Now we're drowned under a barrage of dull script kiddies and bad NT holes. It's a panic out there ! I'd regard a serious probe from a skilled old-school hacker as a welcome and interesting diversion.
Hacker/cracker - we lost that argument. Get over it.
Re:Intrusion Detection - An Analysts' Approach (Score:1)