Focus on IDS
Re: Snort with an expert system Jun 25 2009 01:46PM
Stefano Zanero (s zanero securenetwork it) (1 replies)
Re: Snort with an expert system Jun 25 2009 02:04PM
Tomas Olsson (tol sics se) (1 replies)
Re: Snort with an expert system Jun 25 2009 06:08PM
Joel Esler (eslerj gmail com) (1 replies)
Re: Snort with an expert system Jun 25 2009 06:55PM
Greg Shipley (gshipley neohapsis com) (3 replies)
Re: Snort with an expert system Jun 26 2009 12:26AM
Gary Halleen (ghalleen cisco com)
Re: Snort with an expert system Jun 25 2009 09:12PM
Richard Bejtlich (taosecurity gmail com) (1 replies)
Re: Snort with an expert system Jun 26 2009 02:17PM
Martin Roesch (roesch sourcefire com)
Re: Snort with an expert system Jun 25 2009 08:29PM
Martin Roesch (roesch sourcefire com) (1 replies)
Re: Snort with an expert system Jun 26 2009 12:28AM
Gary Halleen (ghalleen cisco com) (1 replies)
Re: Snort with an expert system Jun 26 2009 08:14PM
Stefano Zanero (s zanero securenetwork it) (2 replies)
Re: Snort with an expert system Jun 29 2009 01:46AM
Martin Roesch (roesch sourcefire com) (1 replies)
Re: Snort with an expert system Jun 30 2009 01:23PM
Tomas Olsson (tol sics se) (1 replies)
Re: Snort with an expert system Jun 30 2009 01:30PM
Stefano Zanero (s zanero securenetwork it)
Re: Snort with an expert system Jun 26 2009 10:00PM
mhellman taxandfinance com
>>> Not for nothing but #2 is exactly what Sourcefire's been doing since
>>> 2004. Sorry for the commercial but I think I've been pretty outspoken
>>> on this topic since 2000 or so...
>
>> Well, I guess I have to pipe in also, then. Cisco is doing the same.
>> Read
>> my book "Security Monitoring with CS-MARS" for more info.
>
> Sorry Marty, sorry Gary, I love both products, but they are not even
> close to realizing what Greg asked for :)
>
> Of course, they do reduce "false positives/noncontextual
> alerts/whatevers", and so they are to be commended, but knowing "if the
> attack has been successful" is actually way beyond anybody's capability,
> short of a crystal sphere

agree 100%. my impression of these tools is that they mostly reduce the
low-hanging "false positives", hopefully allowing the analyst to focus on
the stuff that can't be pruned by the "expert system". the cross device
correlation can provide nice supporting data (or totally irrelevant in
some cases) but there is usually one event that *might* be
significant...the potential, but probably not, "smoking gun" as it were;-)

Attacks are moving up the stack. They're also targeting clients more.
Both trends introduce a ton of challenges for getting relevant context. I
can't help but wonder if/how these tools will be able to get the context
they need to keep up with relevant threats.

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a
17f194

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus