# Arch. Issues in Networking
## Events of Interest (EOI)
- Three main issues surrounding the subject of EOI in intrusion detection
- The balance between false **positives** and false **negatives**
- Targeting or Focusing the sensor to ensure we detect EOI
- The effects of the limits of our system on our capability to detect

## Limits to Observation
- Events on a different network (modems)
- HIDS might help (Host-Based Intrusion Detection System)
- Sensor not functioning
- Crashed
- Rebooting
- Full Disk
- Unknown protocols
- SNA
- SS7
- Exceeding bandwidth limit
## Low Hanging Fruit Paradigm
- IDS (Intrusion Detection System) depends on signatures
- Commercial products may use Snort ruleset as base
- Signatures are widely available
- Attacker may tailor his attack code to avoid any known signatures
- A good IDS will have general filters to capture EOI that might be missed by rules (no TCP flags set, all TCP flags set, unknown protocols)
## Human Factors
- Can limit detections by:
- Failing to report what the IDS detects
- Having a lack of:
- Training to investigate new pattern
- Understanding TCP/IP
- Trust in IDS itself
## Severities
- Criticality
- Lethality
- Countermeasures

### Criticality
| Points | Device |
| ------ | --------------------------------- |
| 5 | Firewall, DNS Server, Core Router |
| 4 | Email relay/Exchange Server |
| 2 | User UNIX Desktop System |
| 1 | MS-DOS 3.11 |
### Lethality
- Lethality drops with time
| Points | Problem/Issue |
| ------ | -------------------------------------------- |
| 5 | Attacker can gain root access across network |
| 4 | Total lockout by DoS |
| 4 | User access (i.e., via sniffed password) |
| 1 | Attack very unlikely to succeed |
### Countermeasures
- Firewalls
- Patches
- Live CDS
**System Countermeasures**
| Points | Systems |
| ------ | ------------------------------------------------------------------------------ |
| 5 | Modern OSes, all patches, added security such as TCP Wrappers and Secure Shell |
| 3 | Older OSes, some patches missing |
| 1 | No TCP Wrappers/Allows fixing unencrypted passwords |
**Network Countermeasures**
| Points | Network Systems |
| ------ | ------------------------------------------------------------------------- |
| 5 | Validated restrictive firewall, only one way in or out |
| 4 | Restrictive firewall, some external connections (modems, ISDN) |
| 2 | Permissive firewall (Does the firewall allow the attack through, or not?) |
### How to Calculate Severity
==(Criticality + Lethality) - (System Countermeasures +==
==Network Countermeasures) = Severity==
## Examples
==Slide 15-23
## Sensor Placements
- Outside
- Inside
- Both
- Other
- Issues
### Sensor Placement: Outside
- Outside firewall in the DMZ (De-militarized Zone)

### Sensor Placement: Inside
- Inside the firewall
- Protects sensor from attack
- Less noise, fewer false positives
- Detect whether firewall is misconfigured
==Attack Detection vs Intrusion Detection
### Sensor Placement: Both Sides
- Best of both worlds
- You don't have to guess whether an attack penetrated the firewall
- May detect insider/internal attacks
- Help system admin with misconfigured systems
### Other Sensor Locations
- Partner Networks
- High-value locations, like research or accounting networks
- Networks with a large number of transient employees, like consultants or temps
- Subnets that appear to be targeted
### Issues with Sensors
- Spanning port on the switch must be configured properly and tested
- Two interface cards
- Consider doing a network tap
- TopLayer has a switch designed to copy data from the network to the IDS
- Cisco Catalyst 6000 switch can support a Policy Feature Card
## Push Vs Pull
- Push
- The IDS will alert us when something happens, via email, pager or phone.
- Disadvantages?
- False positives
- Can be monitored in high-end attacks
- Push is most common
- Pull
- Used in cover sensors
- Most sniffers used by hackers to collect usernames + passwords are pull-based
## Analyst Console
- What they look for when shopping:
- Real-time
- Automated response
- Detects everything (no false negatives)
- Runs on whatever OS the org uses
- What they wish for after buying:
- Faster console
- Better false positive management
- Display filters
- Mark events that have already been analyzed
- Drill down
- Correlation
- Better reporting
## HIDS or NIDS?

- As the size and value of the org increases, so does the importance of additional countermeasures
- Insider threats must not be forgotten
- Trojans and info-gathering viruses and worms could be thought of as insider attacks
## Insider Attacks Countermeasures
- Use taps or spanning ports on switches
- Configure:
- DMZ sensor so as to not ignore internal systems
- Egress filtering to allow outbound traffic only if source addresses match internal addresses
- Deploy:
- Sensors at high-value locations
- Honeypot systems at juicy locations with files that insider attackers might want to steal
- HIDS on servers and key personnel's systems
- Place additional sensors from time to time on user networks as a random spot check
- Establish a reward system for those who report on employees who misuse or steal from the org
## Netflow
- What does it log (headers, data, part of header)?
- Source and destination IP addresses
- Source and destination ports for TCP/UDP traffic
- IP protocol number
- Class of service
- Interface information (ingress and egress interface)
- Flow timestamps (start and end times)
- Number of bytes and packets transferred
- Next-hop IP address
- Is it Cisco only?
- No. Originally developed by Cisco, it has become an industry standard.
- The IETF has standardized it as the IP Flow Information Export Protocol (IPFIX).
- What does the capturing (routers, switches, sensors)?
- NetFlow data can be captured and exported by routers, switches, firewalls, and dedicated sensors/probes that analyze copied traffic from a switch or tap.
- The capturing is done by enabling NetFlow on the device's interfaces where you want to monitor traffic flows.
- In summary, NetFlow provides rich flow-level details about IP traffic traversing network devices, enabling visibility into traffic patterns, bandwidth usage, and security monitoring.