tion systems. A signature based IDS will monitor
packets on the network and compare them against a
database of signatures or attributes from known mali-
cious threats. This is similar to the way most antivirus
software detects malware. The issue is that there will
be a lag between a new threat being discovered in
the wild and the signature for detecting that threat be-
ing applied to the IDS. During that lag time, the IDS
would be unable to detect the new threat. An IDS
which is anomaly based will monitor network traffic
and compare it against an established baseline. The
baseline will identify what is normal for that network
- what sort of bandwidth is generally used, what pro-
tocols are used, what ports and devices generally con-
nect to each other - and alert the administrator or user
when traffic is detected which is anomalous, or sig-
nificantly different, than the baseline.
An intrusion prevention system (IPS) is a com-
puter security device that exercises access control to
protect computers from exploitation. Intrusion pre-
vention technology is considered by some to be an
extension of IDS technology but it is actually an-
other form of access control, like an application layer
firewall. IPS have many advantages over IDS: (i)
they are designed to sit inline with traffic flows and
prevent attacks in real-time; (ii) most IPS solutions
have the ability to look at (decode) layer 7 protocols
like HTTP, FTP, and SMTP, which provides greater
awareness. There are several types of IPS: Host based
(HIPS), one where the intrusion-prevention applica-
tion is resident on a specific IP address, usually on a
computer; Network based IPS (NIPS) is one where
the IPS application/hardware and any actions taken to
prevent an intrusion on a specific network host is done
from a host with another IP address on the network;
Content based IPS (CIPS) inspects the content of net-
work packets for unique sequences, called signatures,
to detect and hopefully prevent known types of at-
tacks such as worm infections and hacks; Rate based
IPS (RIPS) are primarily intended to preventdenial of
service (DoS) and distributed DoS attacks and work
by monitoring and learning normal network behaviors
- through real-time traffic monitoring and compari-
son with stored statistics, RIPS can identify abnor-
mal rates for certain types of traffic (for example TCP,
UDP or ARP packets, connections per second, pack-
ets per connection, packets to specific ports); Protocol
analyzer IPS (PAIPS) is an IPS that uses a protocol
analyzer to fully decode protocols - once decoded, the
IPS analysis engine can evaluate different parts of the
protocol for anomalous behavior or exploits and the
IPS engine can drop the offending packets.
Snort (www.snort.org) is an open source network
intrusion prevention and detection system utilizing
a rule-driven language, which combines the benefits
of signature, protocol and anomaly based inspection
methods. Snort is the most widely deployed intru-
sion detection and prevention technology worldwide
and has become the de facto standard for the industry.
Snort is capable of performing real-time traffic anal-
ysis and packet logging on IP networks. It can per-
form protocol analysis, content searching/matching
and can be used to detect a variety of attacks and
probes, such as buffer overflows, stealth port scans,
Common Gateway Interfaces (CGI) attacks, Server
Message Blocks (SMB) probes, OS fingerprinting at-
tempts, amongst other features. The system can also
be used for intrusion prevention purposes, by drop-
ping attacks as they are taking place.
OSSEC (www.ossec.net) is an open source HIDS
that performs log analysis, integrity checking, Win-
dows registry monitoring, rootkit detection, real-time
alerting and active response. It runs on most operat-
ing systems, including Linux, OpenBSD, FreeBSD,
MacOS, Solaris and Windows.
SamHain (www.la-samhna.de/samhain) is a mul-
tiplatform, open source solution for centralized file in-
tegrity checking and/or host-based intrusion detection
on POSIX systems (Unix, Linux, Cygwin/Windows).
It has been designed to monitor multiple hosts with
potentially different operating systems from a central
location, although it can also be used as standalone
application on a single host.
Osiris (osiris.shmoo.com) is a HIDS that periodi-
cally monitors one or more hosts for change. It main-
tains detailed logs of changes to the file system, user
and group lists, resident kernel modules, and more.
Osiris can be configured to email these logs to the ad-
ministrator. Hosts are periodically scanned and, if de-
sired, the records can be maintained for forensic pur-
poses. Osiris keeps an administrator apprised of pos-
sible attacks and/or nasty little trojans. The purpose
here is to isolate changes that indicate a break-in or a
compromised system. Osiris makes use of OpenSSL
for encryption and authentication in all components.
Cfengine (www.cfengine.org) is one of the most
powerful system administration tools available to-
day. In a useful deviation from most scripting tools,
cfengine allows describing the desired state of a sys-
tem rather than what should be done to a system.
Cfengine itself takes care of testing compliance with
that state and will do its best to correct any misconfig-
urations. It also includes powerful classing capabili-
ties that allows grouping hosts into classes and create
different states on each class of host. Like all tools,
it has its drawbacks, but overall it should be consid-
ered the most important and most capable tool in the
sysadmin toolbox today.
DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS
7