Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: News

Intrusion-Protection Systems

Posted on January 20, 2005December 30, 2021 by admini

The Blaster attack came only 25 days after the patch was released, and Sasser was even faster–18 days.

In March, the Witty worm struck a buffer-overflow vulnerability one day after the flaw was discovered.

Network IPSs (intrusion-prevention systems) can help keep your systems safe by identifying and blocking suspicious traffic.

Fully 80 percent of respondents to Network Computing’s 2004 Reader Poll have a NIP in place or plan to implement one within a year.

We invited vendors to send their systems to our University of Florida partner labs during the height of the 2004 hurricane season for what turned out to be a storm-wracked test–literally.

Ultimately, we tested nine devices: Check Point Software Technologies’ InterSpect 610, Fortinet’s FortiGate-3600 Antivirus Firewall, Internet Security Systems’ Proventia G1000-400, Juniper Networks’ NetScreen-IDP 1000, Lucid Security’s ipAngel X3 AVS-400, Radware’s Defense- Pro AS-III/SME, SecurityMetrics’ Security Appliance Model 60, TippingPoint Technologies’ UnityOne-1200 and V-Secure Technologies’ V-Secure V-1000.

Determina, Mazu Networks, NetContinuum and Privacyware decided that their products did not fit our requirements.

Our invitation specified that each device must be a self-contained system able to identify network attacks and prevent them through its own action, rather than by sending commands to a firewall or other piece of network infrastructure.

We also requested systems capable of handling the expected 400-Mbps flow through our test network core switches.

As it turned out, we tested using traffic moving across the core of the university’s network, where flows averaged more than 600 Mbps, peaking at more than 800 Mbps with 180,000 to 250,000 simultaneous connections.

Of course, we wouldn’t penalize entrants for not coping with conditions we hadn’t told them to expect, but the larger flows did give us an off-the-record look at device capacity, revealing how the products handled a large amount of real network traffic with lots of live exploits and false positives.

Lucid’s and SecurityMetrics’ offerings, using applications such as Snort combined with proprietary console and management software, are more configurable than their proprietary brethren.

Some can rate-limit particular traffic streams, and Radware’s product offers sophisticated traffic-shaping capabilities.

In most cases, you’ll want to stop high-volume and disruptive attacks, knowing that attacks on the fringes of your definitions will get past the IPS and be stopped by other network components.

Because almost all IPSs are deployed inline, false positives are almost certain to generate more user complaints than attacks stopped by an application firewall.

In the first phase of testing, ISS’ Proventia identified the majority of attacks confirmed by our IDS with very few false positives.

This is in contrast to Radware’s DefensePro, which was tougher than a celebrity bodyguard, treating virtually anything anomalous as a possible undesirable.

The FortiGate’s signatures also discovered many of the attacks confirmed by our IDS, while flagging some activities that signature refinement would pass.

While Juniper’s NetScreen IDP identified a considerable amount of traffic as problematic in a default configuration, generating a high number of alerts that might be considered false positives, this product begs to be customized, with a toolset that will make the modification process quick for a security specialist.

They balanced solid default performance and easy setup with rich functions for drilling into attack details and writing custom signatures.

However, we award only one Editor’s Choice per review, and Juniper’s NetScreen has the edge.

FortiGate is reasonably priced and has tons of good features and a well-made interface, but NetScreen is the most flexible and powerful IPS we tested.

There are systems designed to make intrusion prevention an automated and unobtrusive process–and then there’s the NetScreen-IDP 1000.

If your security staff includes someone with the know-how and desire to delve into every detail of an attack and who will be tasked with writing custom signatures to handle the specific requirements of your network, the IDP 1000 is your kind of IPS.

As a signature-based device, Fortinet takes the automated approach, in which new signatures are pushed to the device through the management system after being downloaded from Fortinet’s signature service.

We found that with the system fully configured, the base latency peak with no device under test in the network was triple what it had been when the traffic flow went beyond 500 Mbps.

We agree–we tried running the two apps on a single server.

Although it was a well-configured server (dual Xeon processors and plenty of RAM), the management console’s performance was noticeably slow in several situations, particularly when we were trying to generate reports based on sizable log files.

In our live data testing, ISS identified the majority of attacks without blocking much legitimate traffic.

During the generated traffic testing, the G1000-400 stopped the Code Red worm with signatures and responses defined as a default event within the interface.

The management console showed the stopped attack as an event rather than a standard attack–all the individual facts of the event were correctly reported, but we were fascinated by the bin into which the attack was placed.

From a security standpoint, we found a solid level of paranoia built into the system; for example, when we started the sensor, it wouldn’t pass any traffic.

Once we configured interfaces and zones, we found that attacks were properly identified and stopped.

The rule was nice and tight, too, allowing legitimate traffic through, though similar in many respects to banned traffic.

Other traffic passed without noticeable latency being introduced at any traffic level up to the 400-Mbps rated throughput and beyond.

There’s a plug-in for using the ISS vulnerability-assessment scanner as part of the total management interface–useful for organizations looking to build integrated security capabilities.

In the final analysis, there are a lot of nice touches in this reasonably priced system.

If you need a constant stream of reports for management, or if you simply need an IPS with very solid reporting for your own analysis, the Proventia appliance is a sound choice.

Proventia Intrusion Prevention Appliance G1000-400, $29,314 (includes tech support, updates and advanced exchange; unlimited SiteProtector console costs are built into the appliance price).

TippingPoint’s UnityOne-1200 Intrusion Prevention System is the best unit we saw for out-of-the-box “set it and forget it” intrusion prevention.

If you want an appliance that will handle a lot of traffic with solid protection while insulating your network admins from the nitty-gritty details of the IPS, the UnityOne is for you.

But if you take a serious hands-on approach to tweaking an IPS, there are some portions of the interface that will give you pause.

TippingPoint starts with a clean user interface that didn’t give us too many places to go looking for things.

It almost feels like there aren’t enough things to do, but that might be related to the number of functions enabled out of the box, such as workable initial configurations for signature use, response and reporting.

Setup was quick and easy, but some daily administration items are hidden–TippingPoint made us jump through hoops to get raw data to verify which packets triggered events, for example, or for forensics purposes.

TippingPoint says it designed UnityOne to always be deployed inline; the company had serious reservations about the first phase of our testing.

When we looked at its performance results, we were puzzled by some jitter–latency increased, but individual packet latency varied widely because of the nature of our test traffic.

SecurityMetrics entered the IPS market with a system based on Linux, Snort, Nessus and other open-source software joined with a custom integration and management wrapper.

If your needs are more modest than the large-enterprise model we used in our testing, the Model 60’s bandwidth limitations should be of no concern.

Add in the fact that we got to know four separate Radware boxes, and we wound up with a high-performance product that finished in the middle of the pack.

We’re not sure what happened–nor are the Radware engineers–but three consecutive DefensePro devices didn’t like our lab.

DoS attacks, for example, can be limited to a small portion of your total bandwidth, minimizing the impact while letting legitimate traffic from the offending network (or server) continue.

The default settings from Radware were restrictive, and we ended up tweaking considerably (as you will with any product of this type) to limit the number of positive responses.

The InterSpect 610 lived up to our performance expectations, with no meaningful latency introduced, and it offers an easy-to-understand, mature user interface for configuring and administering its functions.

These devices continue to refine their detection and response characteristics over the life of their deployment, so it’s highly unlikely that any limited-duration test will showcase all their capabilities.

After looking at reports from the first portions of our testing, we did tweak settings so that the InterSpect was more active in reporting worm detection.

The facilities for writing your own signatures are built into the system’s software, with an interface that’s consistent with the product’s straightforward nature.

The ipAngel is one of two systems we tested that make use of the open-source software available to run on Linux.

Read more

Some Companies Switching From Microsoft’s IE Browser

Posted on January 18, 2005December 30, 2021 by admini

While the results may fall short of a trend–in many cases they involve companies with fewer than 100 employees–there were enough organizations making the switch to deem their actions noteworthy.

A full 106 of the 186 respondents–57%–to our unscientific poll had recommended to computer users that they switch from IE to an alternative browser. In almost every instance, these organizations said concern over IE security problems hasn’t been overstated.

Asked to comment on the responses to our poll, Microsoft, through its public relations agency, sent a lengthy E-mail (full text of E-mail) stating, “We’re aware that some people have recommended against IE, but we also know that hundreds of millions of users use Windows because of its broad ecosystem of applications that are constantly being tested and implemented.” Also in its reply, Microsoft states, “Microsoft exhaustively tests all new updates to IE (security and otherwise) to ensure that applications and Web sites continue to behave as expected.”

Because of the unscientific nature of the poll, perhaps the most reliable information comes from detailed interviews with those working with the two browsers. Some had informal business-technology operations, where people with an affinity for computers become de facto tech staff along with their other duties.

One Information Technology Services department made the move “because the threats are real and alternatives exist to mitigate Web browser vulnerabilities,” according to a statement the department issued.

Cliff Kachinske, for instance, said Penn State’s decision prompted him to recommend that the almost 100 employees of his company, Advanced Control Systems, drop IE. Advanced Control Systems has no formal IT department. The hospital uses IBM AIX for its main application server and Red Hat Linux for its E-mail server. At about the same time Penn State was making its recommendation to drop IE, Ben McLendon, director of IT for the Valdosta Women’s Health Center, says he was doing the same.

He hasn’t made the same recommendation to the hospital’s business office, though, because it’s protected by a physical firewall, anti-spam software on the E-mail server, and server-based Symantec antivirus apps. McLendon’s decision to leave IE alone in the business office touches on the inevitability of a browser that had a market share of 90.6% as of Jan. 7, according to the Web-analytical-application maker WebSideStory Inc. Firefox had a 4.6% market share, according to WebSideStory.

In its E-mail to us, Microsoft is in line with Yenne: “As long as malicious hackers exist, there is always an opportunity for online threats and no browser is immune to this. Its execs say tweaks are being made periodically. And, in fact, when Microsoft released Windows XP SP2 last summer, there was an upgrade to IE, called Internet Explorer 6 SP2.

Again quoting from the E-mail from Microsoft: “It’s too early to provide a list of specific [IE] features, but major investments are being made in the areas of end user features, security and privacy, and developer support (for both add-on and Web-site developers).” For some, those words are not half the promise needed to keep them in the IE fold.

http://www.securitypipeline.com/news/57702035;jsessionid=2TEMQO2R0OR0KQSNDBCCKH0CJUMEKJVN

Read more

FBI retires its Carnivore

Posted on January 14, 2005December 30, 2021 by admini

Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.

http://www.securityfocus.com/news/10307

Read more

US court allows work PC to be seized without warrant

Posted on January 6, 2005December 30, 2021 by admini

All that is necessary is the permission of the business that owns the computer, the appeals court said in a 3-0 decision last week.

In April 2003, when Jack Leck briefly worked at a not-for-profit organisation called the World Peace Ambassadors, he allegedly used an office computer to do Web searches for pre-teen boys and girls and participate in related mailing lists from his Hotmail account.

When police showed up with some questions, the not-for-profit group permitted that computer to be seized without a warrant.

Leck was charged with 50 counts of possessing child pornography and sentenced to four years in prison.

He claimed the Washington State Patrol Crime Lab’s seizure and search of the computer without a warrant was illegal because it violated his Fourth Amendment right to privacy.

The Washington state Supreme Court has authorised searches without a warrant as long as the lawful owner of the property gives consent voluntarily, the court noted.

“Leck did not share equal authority with [the nonprofit’s director] over the WPA office or computer, thus, Leck’s consent to the state’s search was not necessary,” wrote Judge Marywave Van Deren.

The court upheld Leck’s conviction and sentence.

http://news.zdnet.co.uk/business/employment/0,39020648,39183217,00.htm

Read more

EU and U.S. Diverge on Antitrust Law

Posted on December 22, 2004December 30, 2021 by admini

By forcing Microsoft to play by European rules and comply with court orders, such as the ruling that forces Microsoft to strip Media Player from Windows in Europe, the European Commission may hope to set a precedent for controlling corporations with a firm hand.

Robert Badal, a partner in the Los Angeles office of Heller Ehrman White & McAuliffe, and who specializes in intellectual property law, believes the ruling illustrates a growing gap between the approaches of the EU and the U.S. to intellectual property.

Judge Bo Vesterdorf’s decision not to grant Microsoft a stay from the penalties while it appeals the European Commission’s antitrust penalties, he said, illustrates that the EU is quick to conclude that a company should be compelled to share its intellectual property with competitors. “This will have a chilling effect on innovators,” he said, adding that there is a direct correlation between the amount of innovation a company produces and the risk of being forced to share those innovations with competitors.

Directions on Microsoft analyst Matt Rosoff said, “What Microsoft doesn’t want is a legal precedent under which a government agency can tell Microsoft what it can and can’t put into Windows.

The European Court of First Instance refused to relieve Microsoft from complying with the judgment levied by antitrust regulators, thereby enforcing penalties that go much further than what the U.S. Department of Justice imposed in an antitrust settlement.

On the other hand, if the penalties had been suspended, by the time the appeal process ended, the EU’s order to sever the media player from the operating system might have been moot.

“Microsoft was asking the court to take a huge leap of faith pending outcome of final decision,” said Andre Bywater, an attorney in the Brussels office of Eversheds, LLP. He said that in domestic cases in both the UK and France, it’s extremely difficult to persuade courts to suspend judgments.

CompTIA, a computer industry trade association of which Microsoft is a member, said the ruling would have negative consequences for the IT industry and consumers.

http://www.internetnews.com/ent-news/article.php/3451271

Read more

Groups fight Internet wiretap push

Posted on December 22, 2004December 30, 2021 by admini

In comments filed with the FCC, advocates with the Center for Democracy and Technology argue the government hasn’t offered any evidence that law enforcement agencies face obstacles in conducting Internet wiretaps under current regulations — which obligate ISPs and other companies to cooperate with court-authorized surveillance, but do not force them to retrofit their networks with special surveillance gear, as the government is asking.

“In the absence of evidence of any problem, it is impossible for the Commission to act,” wrote CDT, representing a handful of technology companies, industry associations and advocacy groups, including the Computer and Communications Industry Association, Dialpad Communications, the Electronic Frontier Foundation, the Information Technology Association of America, and others.

At issue is the 1994 Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates surveillance backdoors in U.S. telephone networks, allowing the FBI to start listening in on a target’s phone line within minutes of receiving court approval.

At the same time the FCC ruled that “managed” Internet telephony providers like Vonage must also become wiretap friendly.

The FCC opened the matter to public comment, specifically seeking guidance on some implementation details, including the issue of how much time to allow service providers to wire their networks for spying.

But many of the flurry of comments that followed challenged the fundamentals of the FCC’s ruling, including the commission’s authority to expand CALEA to the Internet in the first place.

http://www.securityfocus.com/news/10192

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • …
  • 147
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme