Page 406 - StudyBook.pdf
P. 406

390    Chapter 6 • Infrastructure Security: Devices and Media

             as possible to match with the input data stream (large complex signatures may pose
             a serious processing burden). Just as there are varying types of attacks, there must be
             varying types of signatures. Some signatures define the characteristics of a single IP
             option, such as a map portscan, while others are derived from the actual payload of
             an attack. Most signatures are constructed by running a known exploit several
             times, monitoring the data as it appears on the network, and looking for a unique
             pattern that is repeated on every execution.This method works well at ensuring
             that the signature consistently matches an attempt by that particular exploit.
             Remember that the idea is for the unique identification of attacks, not merely the
             detection of attacks.


                Baiting with Honeynets
            Notes From the Underground…
                Recently, there has been an upsurge in the use of honeynets or honey-
                pots as a defensive tool. A honeynet is a system that is deployed with the
                intended purpose of being compromised. This is an excellent tool for dis-
                tracting intruders from the important systems on your network, by luring
                them to a group of systems where they can be detected. This is done by
                making the honeynet look more attractive than the real servers in your
                network. A hacker will attack a server that appears vulnerable and looks
                like it contains important data rather than attempt to break into a system
                that seems well protected.
                     The current best-known configuration type for these tools is where
                two systems are deployed, one as bait and the other configured to log all
                traffic. The logging host should be configured as a bridge (invisible to any
                remote attacker) with sufficient disk space to record all network traffic
                for later analysis. The system behind the logging host can be configured
                in any fashion. Most systems are bait, meaning they are designed to be
                the most attractive targets on a network segment. The defender hopes
                that all attackers will see this easy point of presence and target their
                attacks in that direction.
                     No system is foolproof. Attackers are able to discern that they are
                behind a bridge by the lack of Layer 2 traffic and the discrepancy in MAC
                addresses in the bait system’s ARP cache. See http://project.honeynet.org
                for more details.

                 There are two types of IDSes that can be used to secure a network: system
             IDSes or network IDSes.A system IDS (referred to as IDS or a Kernel Proxy) runs
             on each individual server on which the administrator wants to perform intrusion
             detection.A network IDS (NIDS) does intrusion detection across the network.
             System IDSes are great for ensuring that the server on which it is installed is



          www.syngress.com
   401   402   403   404   405   406   407   408   409   410   411