enough is declining significantly and along this,
vendors continue to produce software with inherent
vulnerabilities. In addition to direct attacks and
penetrations by humans (hackers or insiders), one of
the additional rising problems in today's networks is
the existence of malicious bots and bot networks
(Security, 2007). Most botnets are created to conduct
malicious actions such as conducting Denial of
Service (DoS) attacks, stealing user identities,
installing keyboard loggers to record keystrokes, or
generating e-mail spam.
2 CURRENT SOLUTIONS AND
THEIR WEAKNESSES
2.1 Conceptual Solutions
Several ID/IP research solutions and many products
emerged in the past, which provide protection
against intrusions at host or network level. These
traditional solutions like antivirus, firewall, spy-ware
and authentication mechanisms provides security to
some extent, but still face the challenge of inherent
system flaws, OS bugs and social engineering
attacks. Back in 1980, James Anderson (James,
1980) proposed the concept of intrusion detection.
Then in 1988, three IDS models have been proposed
based on the approach to detect intrusions: Anomaly
Detection, Misuse Detection, and Hybrid Detection
(Denning, 1987). Anomaly Detection based IDS
produces high rate of false positives. Misuse
Detection produces smaller number of false
positives, but the problem is that signature databases
need to be regularly updated as their detection
capability is based on them.
One of the major problems with current IDSs is
that they cannot detect and respond to new attacks in
real time, because most of them for that require
updates of attack signatures usually provided by
network administrators. It is very
difficult for
network administrators to analyze large logs
generated by network traffic, to identify the attack,
and to respond to it in a real time. The consequence
is new, often distributed attacks, based on the
window of opportunity for an attacker, because
of
the delay in attack identification and response by
network administrators (CERT, 2007). Our system
based on mobile agents solves very effectively this
problem.
Another serious problem with the current ID/IP
systems is that they produce large logs, which
cannot be used and utilized efficiently. With so
many security solutions available, both open source
and commercial products, the problem is not to
obtain security related data, but rather to be able to
reasonably process too much data. Those solutions,
in order to be effective, report several thousand
‘events’ a day, the number rising to near ludicrous
totals in secure areas of government, commerce and
also open university infrastructures. This quite
clearly raises a number of issues. It becomes near
impossible to analyze every logged snippet of
information due to the sheer volume of collected
data. Consequently, more critical attacks may go
unnoticed security administrators either never
process relevant attacks data or process them too
late. Security analyst must have an almost
superhuman speed, capabilities and understanding of
the information being presented (Read, et al., 2007).
In addition, it is generally accepted today that
software has inherent security vulnerabilities (Bruce,
et al., 2004). Usually system and network
administrators do not discover these vulnerabilities
in real time, because of the large size of their
networks and their inability to have access to all the
information about the discovered vulnerabilities. In
fact, it should be advantageous that, as soon as the
patch is released, it is installed where it is required.
Our system is capable to detect new vulnerabilities,
report existing vulnerabilities and also automatically
fetch and distribute patches to their target machines.
2.2 Commercial and Open Source
Products
In this section we review some commercial and open
source products. There are many other IDS/IPS
products, but they are not as advanced as the
reviewed products and also they are all based on the
same protection principles as here described
products.
SNORT is an open source cross-platform
lightweight network intrusion detection tool used for
network traffic monitoring in order to detect
suspicious network activities. It has rules based
logging to perform content pattern matching and
detects a variety of attacks and probes, such as
buffer overflows, stealth port scans, CGI attacks,
and etc. However its rules database should be
updated regularly in order to protect against new
threats. (Snort, 2008).
Cisco
provides an extensive set of security features
in their different security products, such as Defeat
Distributed Denial-of-Service Attacks, Cisco
Intrusion Prevention System (IPS) sensors, and etc.
SECRYPT 2008 - International Conference on Security and Cryptography
108