Intended
Function
True Positive:
Alarm sounded
during actual fire
True Negative:
Alarm silent
no actual fire
B roken
Function
False Positive:
Alarm sounded
no actual fire
False Negative:
Alarm silent
during actual fire
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
3.Network Intrusion Prevention System (IPS)
The ability to monitor network traffic is a key component of protecting
information systems. Even still, defending those systems from the many threats can
be a daunting task. A firewall is commonly used to provide a layer of security for its
respective local network. Firewalls by themselves have limitations though. Most can
only block based on IP addresses or ports. In contrast Network Intrusion Prevention
Systems (IPS) are able to use signatures designed to detect and defend from specific
types of attacks such as denial of service attacks among others. This is an
advantage, for instance, with sites hosting Web servers.
To permit Web service traffic, a firewall passes Hypertext Transfer Protocol
(port 80) to external systems if not the entire world. This opens up risk because
many attacks and exploits are inherent to Web server applications (e.g., Apache,
Microsoft IIS). Even when the Web server is fully patched and well maintained,
insecure Web applications all too often exist on a target Web server. Web
applications themselves introduce additional risks (e.g., Cross-Site Scripting).
Coupling a firewall with an IPS creates the potential to reduce these risks. An IPS is
capable of monitoring the content deep inside the Web traffic. When the IPS
discovers an event considered to be a true positive, the malicious connection is
dropped and all subsequent matching packets are destined for the same outcome.
In this ideal situation, the Web server never commits processing power to the
malicious attack as it continues providing Web content to legitimate clients it was
Nicholas Pappas
7
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
intended to serve.
Web services are commonplace across the Internet, but the above example can
be applied to many other networked services. To be compliant with systems across
the wide spread internetwork a standard service port must be used. These ports are
considered to be “known ports”, for instance port 25 is assigned to Simple Mail
Transport Protocol (SMTP), port 53 is assigned to Domain Network Services (DNS).
Permitting these ports through a firewall is essential to be compatible with systems
across the globe. Using an IPS along with a firewall offers the system owners some
piece of mind while at the same time maintaining the required functionality.
IPS have also been known to block buffer overflow type attacks, and can be
configured to report on network scans that typically signal a potential attack is soon
to follow. Advanced usage of an IPS may not drop malicious packets but rather
redirect specific attacks to a honeypot. A simple example of this utilization might
redirect a malicious connection to a device setup to emulate the would be victim.
Honeypots are not in the scope of this paper. However, this type of redirection
creates research opportunities into methods of attackers or active automated
threats, while at the same time defending the actual production systems. At the very
least, the honeypot-redirect methodology creates potential to absorb attackers' time
and other resources as systems under their command attempt to compromise phony
assets.
Nicholas Pappas
8
@ 2021 SANS Institute
Author Retains Full Rights
© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
|