© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
Figure 6: IPS connected inline, IDS connected to spanning port.
Packets are only concerned with transporting data from source to destination.
Therefore, having two invisible NIC's configured as a bridge leaves the data
untouched as packets travel from the first NIC to the second and carry on their merry
way. When unwanted traffic passes over the invisible IPS bridge, the convivial
journey is abruptly interrupted much like an insect innocently flying about before
being smashed against the windshield of a car traveling at high speeds. For packets
the IPS is programmed to drop, the invisible bridge resembles a thick sheet of glass
unable to be seen. The sender of the dropped packet receives no response, and the
internal network never processes the dropped packet.
Such a scenario excites
security professionals charged with defending a network from attack.
That is until their joy comes crashing down when the boss is unable to
communicate with external systems he or she needs to conduct legitimate business
with. When an IPS drops a legitimate packet, it resembles a false positive and is the
Nicholas Pappas
22
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
effect of an IPS being too stringent.
To correct this, the IPS needs to be tuned more
conservatively adhering to looser rules while analyzing traffic. When the IPS is
configured too conservatively, we witness false negatives as unwanted traffic freely
passes through. Obviously we have a conundrum between protecting the network,
and keeping business flowing – having both live harmoniously ensures the
aforementioned security staff remains employed.
This is where the IDS comes in. Since the IDS is not responsible for dropping
packets, the security administrator can set the IDS to be very aggressive. With this
higher level of sensitivity the IDS alerts when even the slightest abnormality is
present in the traffic being inspected. After spending time going through
extraneous alerts the analyst then tunes the IDS to disregard traffic verified to be
benign. Conversely, as the analyst finds traffic on the IDS posing a threat, a rule or
signature is written and the IPS blocks the threat. This methodology allows analysts
the ability to analyze traffic and become familiar with a normal baseline of traffic
without interrupting legitimate data flow on the network. Overtime, the diligent
analyst will have a sensitive IDS giving very few alerts, as the IPS drops nearly 100%
of the unwanted traffic. Any questionable traffic not blocked by the IPS the IDS then
alerts on, prompting the analyst for further investigation.
Nicholas Pappas
23
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies