- Shareware
 -  
Snort -  
Shadow -  
Courtney -  
Commercial -  
ISS RealSecure -  
Axent NetProwler -  
Cisco Secure ID (Net Ranger) -  
Network Flight Recorder -  
Network Security Wizard's Dragon 
An Intrusion Detection  System (abbreviated as IDS) is a defense  system, which detects hostile  activities in a network. The key is then to detect  and possibly prevent  activities that may compromise system security, or a  hacking attempt  in progress including reconnaissance/data collection phases that   involve for example, port scans.
One key feature of  intrusion detection systems is their ability to  provide a view of  unusual activity and issue alerts notifying administrators  and/or block  a suspected connection. In addition, IDS tools are capable of   distinguishing between insider attacks originating from inside the  organization  (coming from own employees or customers) and external ones  (attacks and the  thread posed by hackers).
Once an  intrusion has been detected, IDS issues alerts notifying   administrators of this fact. The next step is undertaken either by the   administrators or the IDS itself, by taking advantage of additional   countermeasures (specific block functions to terminate sessions, backup  systems,  routing connections to a system trap, legal infrastructure  etc.) - following the  organization's security policy.
There are two kinds of DDOS-generated traffic, control  traffic  (between DDOS client and servers) and flood traffic (between  DDOS servers and  DDOS victim).
Anomaly 0: This is  not real "DDOS" traffic, but it can be a viable  method of determining  the origin of DDOS attacks. As observed by RFP, an  attacker will have  to resolve his victim's hostname before a DDOS attack. BIND  name  servers are capable of recording these requests. You can either send  them a  WINCH signal with 'kill' or you can specify query logging in the  BIND  configuration. A single PTR type query before an attack indicates  the request  was made from the attacker's host, a great load of PTR  type query for a DDOS  victim before an attack indicates that the flood  servers have been fed a host  name and each server was resolving the  hostname for itself.
Anomaly 1: Amount of bandwidth  exceeds a maximum threshold that is  expected normal traffic for a site  could cause. Alternatively, the threshold can  be measures for addresses  in the traffic. These are clear signs of flood traffic  and ACL rules  can be implemented on the backbone routers that detect these signs  and  filter traffic.
Anomaly 2: Oversized ICMP and UDP  packets. Stateful UDP sessions  are normally using small UDP packets,  having a payload of not more than 10  bytes. Normal ICMP messages don't  exceed 64 to 128 bytes. Packets that are  reasonably bigger are  suspicious of containing control traffic, mostly the  encrypted  target(s) and other options for the DDOS server. Once (non-decoy)   control traffic is spotted, one of the DDOS servers' location is  revealed, as  the destination IP address is not spoofed in control  traffic.
Anomaly 3: TCP packets (and UDP packets)  that are not part of a  connection. The stealthiest DDOS tools use  random protocols, including  connection-oriented protocols, to send data  over non-connection-oriented  channels. Using stateful firewalls or  link-state routing can discover these  packets. Additionally, packets  that indicate connection requests with  destination ports above 1024,  with which no known service is registered and  running, are highly  suspicious.
Anomaly 4: Packet payload contains ONLY  alphanumeric character  (e.g. no spaces, punctuation, control  characters). This can be a sign that the  packet payload is  BASE64-encoded, and therefore contains only base64 characters.  TFN2K is  sending such packets in its control traffic. A TFN2K (and TFN2K   derivatives) specific pattern is a string of repeating A's (AAAA...) in  the  payload, since the buffer size is padded by the encryption routine.  If the  BASE64 encoding is not used, and the payload contains binary  encrypted traffic,  the A's will be trailing binary \0's.
Anomaly 5: Packet payload contains ONLY binary, high-bit   characters. While this can be a binary file transfer (traffic  transmitted over  ports 20, 21, 80, etc. must be excluded if this rule  is applied), especially if  contained in packets that are not part of  valid stateful traffic, it is  suspicious of being non-base64 encoded,  but encrypted control traffic that is  being transmitted in the packet  payload.
Some of the popular IDS are:
-  
Shareware -  
Snort -  
Shadow -  
Courtney -  
Commercial -  
ISS RealSecure -  
Axent NetProwler -  
Cisco Secure ID (Net Ranger) -  
Network Flight Recorder -  
Network Security Wizard's Dragon
........................................................................................................................... ............................................................................................................................................................................. .................................................. 
0 comments:
Post a Comment