Protect Your Information with Intrusion Detection (Power)


Purchasing an IDS comprises several steps that must be undertaken in order:

Purchasing Appropriate Software and Hardware

Before deploying an IDS in a corporate network, you will need to buy all the necessary software and hardware. Here, the term "software" is used in a broad sense - i.e., not just the IDS itself. In addition to the IDS, the software also includes the operating system in which the IDS will run, along with add-on application software, such as Internet Explorer or Oracle. Purchasing a specialized hardware-software combination (a security appliance) solves this problem, as it comes with all the required software pre-installed, and the only remaining job is to buy add-on software for the management console.

In terms of hardware, it is recommended that you choose reliable equipment that has a good reputation. This is not an item on which to economize, especially given the fact that IDS failure due to unreliable equipment or manufacturing defects can result in serious damage. In my practice, I have had the experience of having to handle a case in which a vendor supplied defective computers to one of my clients. One of the computers failed after two weeks of running the IDS. One week later, we had to replace the second computer. The client suffered no serious damage and managed to thwart attacks, but only thanks to multiple-layer security made up of access-control lists on Cisco routers, a combination of the advanced firewalls - Check Point Firewall-1 and Cisco PIX Firewall - joined into clusters, and the Cisco IDS 4200 and RealSecure Network Sensor IDSs.

Since an IDS is an intensive user of available resources - especially RAM, hard-disk space and network adapter resources - and given that the protected network segment will inevitably increase in size over time, it is advisable to purchase scalable hardware and software. If you have chosen reliable, fault-tolerant hardware, it is also desirable to provide a fault-tolerance level that will allow a failed component to be replaced within a reasonable period of time. Although such a solution may seem somewhat redundant, it provides a sufficient level of support to the security system. If spare parts of backup equipment are difficult to come by, consult the vendor for information on replacing the failed components. All major brands - Cisco, Compaq, IBM, Hewlett Packard, etc. - usually have enough stock available to allow them to supply spare parts with minimum delay. (Cisco, for example, guarantees such supplies within one day.)

It is impossible to deploy and bring into operation an IDS without purchasing all the required software and hardware components. For example, although it may be possible to bring an IDS into operation with insufficient amount of RAM, in a high-throughput network or when analyzing the security of a large number of hosts, some attacks may remain undetected, or even worse, the IDS may fail. Moreover, when the missing components are purchased, the whole IDS will have to be reconfigured.

IDS hardware may include the following components:

The hardware requirements for the computer on which the IDS' network sensor is to be installed are determined by the following factors (partially discussed in the previous chapter):

Manufacturers develop their recommendations based on the average statistical values of these parameters. For example, Compaq recommends the following configuration for installing an IDS' network sensor (particularly for installing the RealSecure Network Sensor):

Although the situation has changed in the four years since these recommendations were published, the approach suggested by Compaq illustrates the trends described above quite well.

The software platform for an IDS may include the following components (besides the components of the IDS itself):

Table 11.2. Operating Systems Used by IDSs

IDS

Operating system


 

Security scanner

Internet Scanner

Windows NT, Windows 2000

System Scanner

Management console - Windows NT, Windows 2000

 

Agents - Windows NT, Windows 2000, NetWare, Linux, HP UX, AIX, Solaris, SCO OpenServer, SCO UnixWare, Sequent DINIX/PTX, NCR Unix, Digital Unix

NetRecon

Windows NT

Enterprise Security Manager

Console - Windows NT, Windows 2000, Windows 95/98

 

Management server - Windows NT, Windows 2000, OSF/1, IRIX, HP UX, AIX, Solaris, NetWare, OpenVMS

 

Agents - NetWare, OpenVMS, Windows NT, Windows 2000, HP UX, AIX, Solaris, NCR Unix, OSF/1, IRIX, Sequent DINIX/PTX, Digital Unix, Compaq Tru64

Nessus

Console - FreeBSD, Linux, Solaris, Windows NT

 

Management server - FreeBSD, Linux, Solaris

CyberCop Scanner

Windows NT, Windows 2000, Linux

Kane Security Analyst

Windows NT, NetWare

Expert

Windows 95/98, Windows NT

STAT

Windows NT

BindView HackerShield

Windows NT, Windows 2000, NetWare, OS/400

IDS

RealSecure

Console - Windows NT, Windows 2000

 

Network sensor - Windows NT, Windows 2000, Solaris

 

RealSecure for Nokia - Customized version of FreeBSD

 

OS Sensor - Windows NT, Windows 2000, Solaris, HP UX, AIX

 

Server Sensor - Windows NT, Windows 2000, Solaris

Cisco IDS

Console - HP UX (HP OpenView NNM), Solaris (HP OpenView NNM), Windows NT (Cisco Secure Policy Manager)

 

Sensor - custom OS

NetProwler

Console - Windows NT, Windows 2000

 

Management server - Windows NT

 

Sensor - Windows NT

Dragon

Console - Web interface

 

Network sensor (Sensor) - Linux, FreeBSD, OpenBSD, Solaris, HP UX

 

System sensor (Squire) - Linux, FreeBSD, OpenBSD, Solaris, HP UX, Windows NT

NFR

Console (Administrative Station) - Windows NT, Windows 2000, Windows 95/98

 

Central Station - Solaris

 

Sensor - OS on the basis of BSD

Intruder Alert

Console - Windows NT, Windows 2000, Windows 95/98

 

Management server - Windows NT, NetWare, HP UX, AIX, Solaris, NCR Unix, OSF/1, IRIX

 

Agent - Windows NT, NetWare, HP UX, AIX, Solaris, NCR Unix, OSF/1, IRIX, Sequent DINIX/PTX

eTrust IDS

Console - Windows 95/98, Windows NT

 

Sensor - Windows 95/98, Windows NT

CyberCop Monitor

Console - Windows NT

 

Sensor - Windows NT, Solaris, HP UX, AIX

SecureNet PRO

Sensor - Red Hat Linux

Kane Security Monitor

Sensor - Windows NT

Centrax

Console - Windows NT

 

Sensor - Windows NT, Solaris

Snort

Linux, *BSD, Solaris, SunOS, HP UX, AIX, IRIX, Compaq Tru64, Windows NT

LIDS

Linux

Integrity-control system

Tripwire

Windows NT, Solaris, AIX, HP UX, IRIX, Compaq Tru64, Linux

Deception system

CyberCop Sting

Windows NT

DTK

Various Unix clones

ManTrap

Console - Windows NT, Windows 2000, Windows 95/98, Solaris

 

Sensor - Solaris

RealSecure OS Sensor

Windows NT, Windows 2000, Solaris, HP UX, AIX

RealSecure Server Sensor

Windows NT, Windows 2000, Solaris

One other system is worth mentioning. At the time of writing, Blade Software's IDS Informer was one of the best testing kits available.

Purchasing Documentation and Support Services

Depending on the complexity of the IDS, the technical staff's skill levels, the system, and other factors, an organization may need technical support from the manufacturer or vendor, training services, and so on.

Users who are unfamiliar with the technologies and principles upon which the chosen IDS is based will always be prone to err, which can cost an organization quite a lot. Such errors can result in delays in installation and deployment, and furthermore, can complicate the operation and maintenance of the IDS. Therefore, it is advisable to purchase documentation and technical support services at the same time as the IDS. (This is especially true for large companies.)

It is not a good idea merely to purchase the bare minimum (usually just the CD and instructions). Most system administrators are usually short on time, and therefore, do not even study the documentation supplied with the system. This lack of knowledge can result in the IDS actually simplifying penetration into the network instead of protecting it. Manufacturer support is especially important should difficult situations not described in the documentation arise. Technical support often doubles as training, which can provide a large amount of valuable information in a short time.

Most companies, such as ISS and Cisco, provide high-quality technical service. For example, each request to the technical support service is answered by a message confirming receipt of the request and promising to answer it within a set period of time (depending on the services paid for). This guarantees that the client's request is being processed by a group of highly qualified specialists.

As was mentioned, the technical support provided by a manufacturer usually includes several layers that differ in their response time to client requests. The following types of support are commonly used:

Based on real-world practice, most manufacturers have adopted the following technical support parameters as standard:

When discussing the IDS' technical support agreement, it is worth considering similar support for other software and hardware, in order to avoid an unpleasant situation in which the IDS runs smoothly, but problems with the working environment constantly disrupt its operation. Moreover, it is worth making sure that the technical support agreement includes a paragraph relating to periodic updates of the IDS and other software. Subscribing to the IDS manufacturer's mailing list is also useful, as it keeps the user informed of all news related to the IDS and companion software.


Категории