Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Intrusion-Protection Systems

Posted on January 20, 2005December 30, 2021 by admini

The Blaster attack came only 25 days after the patch was released, and Sasser was even faster–18 days.

In March, the Witty worm struck a buffer-overflow vulnerability one day after the flaw was discovered.

Network IPSs (intrusion-prevention systems) can help keep your systems safe by identifying and blocking suspicious traffic.

Fully 80 percent of respondents to Network Computing’s 2004 Reader Poll have a NIP in place or plan to implement one within a year.

We invited vendors to send their systems to our University of Florida partner labs during the height of the 2004 hurricane season for what turned out to be a storm-wracked test–literally.

Ultimately, we tested nine devices: Check Point Software Technologies’ InterSpect 610, Fortinet’s FortiGate-3600 Antivirus Firewall, Internet Security Systems’ Proventia G1000-400, Juniper Networks’ NetScreen-IDP 1000, Lucid Security’s ipAngel X3 AVS-400, Radware’s Defense- Pro AS-III/SME, SecurityMetrics’ Security Appliance Model 60, TippingPoint Technologies’ UnityOne-1200 and V-Secure Technologies’ V-Secure V-1000.

Determina, Mazu Networks, NetContinuum and Privacyware decided that their products did not fit our requirements.

Our invitation specified that each device must be a self-contained system able to identify network attacks and prevent them through its own action, rather than by sending commands to a firewall or other piece of network infrastructure.

We also requested systems capable of handling the expected 400-Mbps flow through our test network core switches.

As it turned out, we tested using traffic moving across the core of the university’s network, where flows averaged more than 600 Mbps, peaking at more than 800 Mbps with 180,000 to 250,000 simultaneous connections.

Of course, we wouldn’t penalize entrants for not coping with conditions we hadn’t told them to expect, but the larger flows did give us an off-the-record look at device capacity, revealing how the products handled a large amount of real network traffic with lots of live exploits and false positives.

Lucid’s and SecurityMetrics’ offerings, using applications such as Snort combined with proprietary console and management software, are more configurable than their proprietary brethren.

Some can rate-limit particular traffic streams, and Radware’s product offers sophisticated traffic-shaping capabilities.

In most cases, you’ll want to stop high-volume and disruptive attacks, knowing that attacks on the fringes of your definitions will get past the IPS and be stopped by other network components.

Because almost all IPSs are deployed inline, false positives are almost certain to generate more user complaints than attacks stopped by an application firewall.

In the first phase of testing, ISS’ Proventia identified the majority of attacks confirmed by our IDS with very few false positives.

This is in contrast to Radware’s DefensePro, which was tougher than a celebrity bodyguard, treating virtually anything anomalous as a possible undesirable.

The FortiGate’s signatures also discovered many of the attacks confirmed by our IDS, while flagging some activities that signature refinement would pass.

While Juniper’s NetScreen IDP identified a considerable amount of traffic as problematic in a default configuration, generating a high number of alerts that might be considered false positives, this product begs to be customized, with a toolset that will make the modification process quick for a security specialist.

They balanced solid default performance and easy setup with rich functions for drilling into attack details and writing custom signatures.

However, we award only one Editor’s Choice per review, and Juniper’s NetScreen has the edge.

FortiGate is reasonably priced and has tons of good features and a well-made interface, but NetScreen is the most flexible and powerful IPS we tested.

There are systems designed to make intrusion prevention an automated and unobtrusive process–and then there’s the NetScreen-IDP 1000.

If your security staff includes someone with the know-how and desire to delve into every detail of an attack and who will be tasked with writing custom signatures to handle the specific requirements of your network, the IDP 1000 is your kind of IPS.

As a signature-based device, Fortinet takes the automated approach, in which new signatures are pushed to the device through the management system after being downloaded from Fortinet’s signature service.

We found that with the system fully configured, the base latency peak with no device under test in the network was triple what it had been when the traffic flow went beyond 500 Mbps.

We agree–we tried running the two apps on a single server.

Although it was a well-configured server (dual Xeon processors and plenty of RAM), the management console’s performance was noticeably slow in several situations, particularly when we were trying to generate reports based on sizable log files.

In our live data testing, ISS identified the majority of attacks without blocking much legitimate traffic.

During the generated traffic testing, the G1000-400 stopped the Code Red worm with signatures and responses defined as a default event within the interface.

The management console showed the stopped attack as an event rather than a standard attack–all the individual facts of the event were correctly reported, but we were fascinated by the bin into which the attack was placed.

From a security standpoint, we found a solid level of paranoia built into the system; for example, when we started the sensor, it wouldn’t pass any traffic.

Once we configured interfaces and zones, we found that attacks were properly identified and stopped.

The rule was nice and tight, too, allowing legitimate traffic through, though similar in many respects to banned traffic.

Other traffic passed without noticeable latency being introduced at any traffic level up to the 400-Mbps rated throughput and beyond.

There’s a plug-in for using the ISS vulnerability-assessment scanner as part of the total management interface–useful for organizations looking to build integrated security capabilities.

In the final analysis, there are a lot of nice touches in this reasonably priced system.

If you need a constant stream of reports for management, or if you simply need an IPS with very solid reporting for your own analysis, the Proventia appliance is a sound choice.

Proventia Intrusion Prevention Appliance G1000-400, $29,314 (includes tech support, updates and advanced exchange; unlimited SiteProtector console costs are built into the appliance price).

TippingPoint’s UnityOne-1200 Intrusion Prevention System is the best unit we saw for out-of-the-box “set it and forget it” intrusion prevention.

If you want an appliance that will handle a lot of traffic with solid protection while insulating your network admins from the nitty-gritty details of the IPS, the UnityOne is for you.

But if you take a serious hands-on approach to tweaking an IPS, there are some portions of the interface that will give you pause.

TippingPoint starts with a clean user interface that didn’t give us too many places to go looking for things.

It almost feels like there aren’t enough things to do, but that might be related to the number of functions enabled out of the box, such as workable initial configurations for signature use, response and reporting.

Setup was quick and easy, but some daily administration items are hidden–TippingPoint made us jump through hoops to get raw data to verify which packets triggered events, for example, or for forensics purposes.

TippingPoint says it designed UnityOne to always be deployed inline; the company had serious reservations about the first phase of our testing.

When we looked at its performance results, we were puzzled by some jitter–latency increased, but individual packet latency varied widely because of the nature of our test traffic.

SecurityMetrics entered the IPS market with a system based on Linux, Snort, Nessus and other open-source software joined with a custom integration and management wrapper.

If your needs are more modest than the large-enterprise model we used in our testing, the Model 60’s bandwidth limitations should be of no concern.

Add in the fact that we got to know four separate Radware boxes, and we wound up with a high-performance product that finished in the middle of the pack.

We’re not sure what happened–nor are the Radware engineers–but three consecutive DefensePro devices didn’t like our lab.

DoS attacks, for example, can be limited to a small portion of your total bandwidth, minimizing the impact while letting legitimate traffic from the offending network (or server) continue.

The default settings from Radware were restrictive, and we ended up tweaking considerably (as you will with any product of this type) to limit the number of positive responses.

The InterSpect 610 lived up to our performance expectations, with no meaningful latency introduced, and it offers an easy-to-understand, mature user interface for configuring and administering its functions.

These devices continue to refine their detection and response characteristics over the life of their deployment, so it’s highly unlikely that any limited-duration test will showcase all their capabilities.

After looking at reports from the first portions of our testing, we did tweak settings so that the InterSpect was more active in reporting worm detection.

The facilities for writing your own signatures are built into the system’s software, with an interface that’s consistent with the product’s straightforward nature.

The ipAngel is one of two systems we tested that make use of the open-source software available to run on Linux.

Read more

Some Companies Switching From Microsoft’s IE Browser

Posted on January 18, 2005December 30, 2021 by admini

While the results may fall short of a trend–in many cases they involve companies with fewer than 100 employees–there were enough organizations making the switch to deem their actions noteworthy.

A full 106 of the 186 respondents–57%–to our unscientific poll had recommended to computer users that they switch from IE to an alternative browser. In almost every instance, these organizations said concern over IE security problems hasn’t been overstated.

Asked to comment on the responses to our poll, Microsoft, through its public relations agency, sent a lengthy E-mail (full text of E-mail) stating, “We’re aware that some people have recommended against IE, but we also know that hundreds of millions of users use Windows because of its broad ecosystem of applications that are constantly being tested and implemented.” Also in its reply, Microsoft states, “Microsoft exhaustively tests all new updates to IE (security and otherwise) to ensure that applications and Web sites continue to behave as expected.”

Because of the unscientific nature of the poll, perhaps the most reliable information comes from detailed interviews with those working with the two browsers. Some had informal business-technology operations, where people with an affinity for computers become de facto tech staff along with their other duties.

One Information Technology Services department made the move “because the threats are real and alternatives exist to mitigate Web browser vulnerabilities,” according to a statement the department issued.

Cliff Kachinske, for instance, said Penn State’s decision prompted him to recommend that the almost 100 employees of his company, Advanced Control Systems, drop IE. Advanced Control Systems has no formal IT department. The hospital uses IBM AIX for its main application server and Red Hat Linux for its E-mail server. At about the same time Penn State was making its recommendation to drop IE, Ben McLendon, director of IT for the Valdosta Women’s Health Center, says he was doing the same.

He hasn’t made the same recommendation to the hospital’s business office, though, because it’s protected by a physical firewall, anti-spam software on the E-mail server, and server-based Symantec antivirus apps. McLendon’s decision to leave IE alone in the business office touches on the inevitability of a browser that had a market share of 90.6% as of Jan. 7, according to the Web-analytical-application maker WebSideStory Inc. Firefox had a 4.6% market share, according to WebSideStory.

In its E-mail to us, Microsoft is in line with Yenne: “As long as malicious hackers exist, there is always an opportunity for online threats and no browser is immune to this. Its execs say tweaks are being made periodically. And, in fact, when Microsoft released Windows XP SP2 last summer, there was an upgrade to IE, called Internet Explorer 6 SP2.

Again quoting from the E-mail from Microsoft: “It’s too early to provide a list of specific [IE] features, but major investments are being made in the areas of end user features, security and privacy, and developer support (for both add-on and Web-site developers).” For some, those words are not half the promise needed to keep them in the IE fold.

http://www.securitypipeline.com/news/57702035;jsessionid=2TEMQO2R0OR0KQSNDBCCKH0CJUMEKJVN

Read more

Companies Arm Themselves For New Fight Against Spyware

Posted on January 17, 2005December 30, 2021 by admini

A year ago, the $10 billion-a-year insurance provider received 2.6 million spam E-mails. By November, the number had nearly doubled to 4.8 million.

As if trying to keep missives offering cheap Viagra or get-rich-quick schemes out of in-boxes weren’t enough of a job, a steadily increasing onslaught of spyware and adware is further taxing IT resources. EFunds’ Jones is working to combat all types of attacks, whether they’re brought about by spyware or other means.

UnumProvident is one of a growing number of companies beginning to investigate anti-spyware products. By and large, companies allocate more IT dollars to fighting the twin scourges of spyware and adware, while continuing to pump time and money into keeping spam of every variety under control.

Just over 70% of 400 business-technology professionals recently surveyed by InformationWeek Research will spend somewhat or significantly more money to manage spyware, and more than 60% say the same of adware. E-mail accounted for half of inbound messages in 2004, up from 40% the year prior.

Two types of small applications can be installed on PCs by specially crafted E-mail messages, “free” software downloads, and other tricks. But they steal time from IT staffers, who must handle more help-desk calls from users who can’t get rid of pop-up ads and clean up systems suffering from performance slowdowns that stealth adware or spyware installations bring on.

Kim Jones, director of global security services for electronic financial processing company eFunds Corp., knows the problems adware can cause. Criminals and hackers use spyware such as keystroke loggers and Trojan horses to capture everything typed on PCs or to take control of systems to steal user names and passwords that could be used to attack and gain access to business resources. Last summer, Jones started using MainNerve Inc.’s Adaptive Darknet Service, a network of sensors scattered about the Internet spotting hacker command-and-control networks, which is constantly updated with attacking IP addresses.

McAfee this week adds spyware blocking capability to its McAfee IntruShield network intrusion prevention app, and it’s delivering a beta version of its Anti-Spyware Enterprise Edition Module that will work with its corporate anti-virus product.

Technology already has made a dent in spam problems. UnumProvident’s Fleury has seen results: The company uses spam filtering from SurfControl plc, and despite the uptick in spam being sent to users, employees aren’t seeing many of those messages in their in-boxes.

Cox now uses two CipherTrust Inc. secure E-mail appliances, and Warlick estimates they block 99% of the 38 million spam E-mails that head Cox’s way each month.

Spam is “now a security threat,” because more spam E-mails today contain adware or spyware that users unwittingly install.

http://www.securitypipeline.com/57701881

Read more

FBI retires its Carnivore

Posted on January 14, 2005December 30, 2021 by admini

Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.

http://www.securityfocus.com/news/10307

Read more

Online and offline security merging

Posted on January 13, 2005December 30, 2021 by admini

Steve Hunt, an analyst with Forrester Research, said in the report while companies have generally treated physical security as part of the facilities department and computer security as part of the information-technology group, employee information has increasingly become integrated, allowing businesses to link the two systems.

“Locks, cameras, entry systems, and even guard desks will be upgraded to work with the same computing systems that control computer and network sign-on, identity management and security incident management,” he wrote. “Consequently, IT security vendors will rush to merge or find partnerships with their physical security brethren to respond to the new opportunities.”

The link between physical security systems and network security is another ripple emanating from the events of 11 September, 2001. Spending on such integration will double compared with 2004, reaching $1.1bn in Europe and the United States in 2005, the report said.

US government projects to integrate physical and network security, such as the Transportation Worker’s Identity Card mandated by the Transportation Security Agency and the Common Access Card used by the Department of Defense, up the lion’s share of the money being spent, Forrester predicted. The federal government has focused on integrating physical and network security following the findings of the 9/11 Commission.

http://news.zdnet.co.uk/business/0,39020645,39183941,00.htm

Read more

Risk rises up the agenda, but IT issues remain a challenge

Posted on January 12, 2005December 30, 2021 by admini

Three quarters of CROs in financial services firms report to their chief executive or the board of directors, says Deloitte, in accordance with a 25% increase in board-level oversight of risk management over the last two years.

While 38% of respondents claim to have the right organisational structure in place to cope with the demands of global risk management, only 15-16% report progress in integrating methodology, data, and systems.

http://207.234.191.209/?q=node/view/2089

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme