Signature Configuration and Tuning

[ LiB ]  

The Sensor software includes a set of signatures that detect known attacks and are enabled by default. These signatures are called built-in or default signatures. As you saw in Chapter 9, you cannot add to or delete from the group of default signatures, nor can they be renamed . However, you can and should tune them to your network environment; once you modify a default signature, it is called a tuned signature.

You also saw in Chapter 9 that you can create new signatures called custom signatures. Custom signatures have signature ID numbers of 20000 and above. You can create and configure custom signatures to detect reconnaissance, flood, and DoS attacks or specific text patterns, for example.

graphics/alert_icon.gif

You cannot add to the set of built-in signatures, also called the default signatures; however, you can create new signatures, which are custom signatures.


Chapter 9 discussed a wide range of specific signature engine parameters. Here are the basic configurable parameters:

  • Enable status Enables or disables the signature

  • Severity level Assigns the severity level (informational, low, medium, or high)

  • Signature action Assigns the action or actions to be taken when the signature is triggered

Signature Response Actions

You saw in Chapter 9 that there are four possible actions when a signature is triggered:

  • IP Log If this option is selected, the Sensor writes the IP session data to an IP log file, allowing you to capture raw, unaltered packets that can be used for forensic evidence or damage assessment.

  • TCP Reset If you select the TCP reset action, the Sensor sends a TCP reset command to the attacking session. It is available only for TCP attackbased signatures. Recall also that you might need to configure your switch port to allow TCP resets using the inpkts enable command.

  • Block Host If you select the Block Host option, the Sensor instructs a managed device such as a router to dynamically modify an access control list (ACL) with an additional access control entry (ACE). The ACE will deny only the source IP address of the offending host. Following is an example of a ACE created on the blocking device:


     deny ip host 10.5.20.66 any 

  • Block Connection Similar to the Block Host option, if you select the Block Connection action, the Sensor instructs a managed device to modify an ACL to dynamically change the access policy. The ACL changes to deny the IP packets from the source IP address to a specific destination IP address; port and service. Following is an example of an ACE created by a Block Connection signature action:


     deny tcp host 10.5.20.66 host 10.1.25.70 eq http 

In this example, all HTTP connections between the two hosts will be blocked; however, the 10.5.20.66 host will still be able to connect to the 10.25.1.70 host using Telnet, FTP, or other services not using port 80.

Signature Filtering

Signature filtering, like alarm throttling, can reduce false positives and limit the number of security events reported . Signature filtering allows you to specify source and destination IP addresses for any given signature and whether the filter will include or exclude the matched conditions.

The following list describes the filtering process:

  1. An attack against the protected network is detected .

  2. The sensing engine within the Sensor determines whether a filter exists for this signature.

  3. If a filter exists, the Sensor checks the source and destination addresses designated by the filter's parameters against the incoming traffic that triggered the attack.

  4. One of the following actions then happens:

    • If the traffic doesn't match the filter conditions, an alert is generated.

    • If the traffic matches the source and destination addresses and the filter is exclusive, no alarm is generated.

    • If the traffic matches the source and destination addresses and the filter is inclusive, then the configured signature action is taken (log, reset, block host, or block connection).

You configure signature filters by navigating to the Configuration, Settings page on the IDS MC and clicking the Filters link on the TOC. You then see a list of available filters, if any. The steps to add a new signature follow:

  1. Press the Add button; the Enter Filter page then appears, prompting you for a filter name and presenting a drop-down menu with the inclusive or exclusive options.

  2. Enter the signature name and select either Inclusive or Exclusive from the drop-down menu. Click OK to proceed to the Enter Signatures page.

  3. Select the signatures you want to apply this filter to from the list of Available Signatures on the left. Click the Add button to add the signatures to the Selected Signatures list on the right. When you are finished adding signatures to the Selected Signatures list, click OK to move on to the Filter Source Address page.

  4. Select one address option from the Any, Internal, External, Single, Range, or Network radio buttons and enter the corresponding address information in the text box where necessary.

  5. Select one option from the Single, Range, or Network IP address radio buttons. Enter the single address, the start and end addresses, or the network address and mask accordingly .

  6. Click OK to display the Filter Destination Address page; repeat Steps 4 and 5 to complete the filter configuration.

Filter Exceptions

Filter exceptions allow you to configure a separate signature response for a specific host or server. In certain situations, it might be useful to configure a filter exception for a unique server or host. Consider a situation, for example, where you have a server farm composed entirely of Windows 2000 servers, except for a single Apache server supporting an extranet portal to a supplier.

One day, Internet traffic generates a large amount of alarms from an attacker attempting to infect the entire server farm with the Apache/mod_ssl worm. Although all servers are targets of the worm attack, only the Apache server is vulnerable.

In this situation, you can configure an exclusive filter for your Apache.mod_ssl Worm Buffer Overflow signature. The exclusive filter will specify the entire range of server addresses as the destination address. You then configure a filter exception for the one Apache server that is vulnerable to the attack, thus minimizing unnecessary alarms generated by the signature.

Signature Tuning Configuration Tasks

Before going through a scenario where you tune a default signature, we briefly outline the steps for signature tuning:

  1. Choose the signature to tune. This step requires that you understand the attack you are trying to detect and the signature engine with the parameters and attributes that will meet your requirements.

  2. Modify the signature parameter values.

  3. Save and apply the new signature parameter settings to the sensor.

Signature Tuning Scenario: FTP Login Scenario

A cross-company task group has set up an FTP server with prerelease marketing content to test multicast functionality over a satellite IP network. The project manager wants to detect all unauthorized attempts to log in to the FTP server. Based on the threat posed by an attack, the signature should meet the following requirements:

  • A high severity alarm should be triggered after two failed login attempts.

  • An alarm should be sent each time an attack is detected.

  • The attacking session should be terminated .

To tune this signature, follow these steps:

  1. Select the signature to tune. You can tune the Auth Failure FTP signature to detect the brute-force login attempts by configuring the severity level, the action, and the AlarmThrottle and MinHits parameters.

  2. Access the signature from Configuration, Settings, Signatures page.

  3. Click General and enter 6250 in the field next to the Filter Event Source drop-down menu.

  4. Click Filter to display the 6250 signature.

  5. Click on the String.TCP link to display the Tune Signature page. Enter the following parameter/value settings: MinHits / 2 ; AlarmThrottle / FireAll ; Severity / High ; EventAction / reset .

  6. Save and apply the new signature parameter settings to the sensor. Click OK to apply the changes.

Custom Signature Configuration Tasks

Finally, before tackling a scenario where you create a custom signature, we briefly run through the relevant configuration steps. To configure a custom signature, follow these steps:

  1. Choose the signature engine that meets the detection requirements.

  2. Modify the signature parameter values. Make sure that you take the following into consideration when determining which signature engine to use to create your custom signatures:

    • Network protocol

    • Target address

    • Target port

    • Type of attack

    • Payload inspection

  3. Save and apply the new signature parameter settings to the sensor.

graphics/alert_icon.gif

When considering which signature engine to use to create a custom signature, make sure that you take the following into consideration: network protocol, target address and port, type of attack, and whether any payload inspection is required.


Custom Signature Scenario: IP Protocol Scenario

Anna requests to have virtual private network (VPN) access from her home in the south of France to a development network in London. Her manager Jeff agrees and decides to log her activities by detecting IP Security (IPSec), Encapsulating Security Payload (ESP), and Authentication Header (AH) packets that traverse the network. These are the steps necessary to configure this custom signature:

  1. Choose the signature engine that meets the detection requirements. Because it allows you to specify protocol numbers, Atomic.L3.IP is the engine you use to create the custom signature.

  2. Select the Sensor of interest from the Object Selector handle on the Configuration, Settings page.

  3. From the TOC, select Signatures to display the Signatures page.

  4. Click on the Custom link to display the Signatures in Group page.

  5. Click Add to display the Tune Signature page.

  6. Enter Anna IPSec ESP/AH in the Signature Name field.

  7. Select Atomic.L3.IP from the Engine drop-down menu.

  8. Configure the following signature engine parameter/value settings:

    • SigVersion / 20002

    • MaxProto / 51

    • MinProto / 50

    • SigStringInfo / ESP / AH Packet

  9. Save and apply the new signature parameter settings to the sensor. Click OK to apply the changes. There is no need to enable the signature because custom signatures are enabled by default.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net