no knowledge about network topology, network as-
sets and asset criticality. He proposed to improve the
intrusion detection process by using Passive Network
Discovery Systems (PNDS). Passive discovery uses
packet sniffing to find nodes in the network. It oper-
ates invisible and will never release a packet into the
network. A comprehensive survey on passive detec-
tion methods is provided by (DeMontigny and Mas-
sicotte, 2004). Examples of passive discovery tools
are PRADS
1
and its two older predecessors p0f
2
and
PADS
3
. These applications check a set of parameters
which are set differently by different operating sys-
tems (e.g. time to live, window size, don’t fragment
flag, type of service). Analyzing these parameters al-
low to guess the remote operating system. Addition-
ally observed packets provide information concern-
ing active clients and servers and the related services.
Sourcefire and other IDS vendors like Cisco
4
have
provided solutions to scan the protected network and
to assess alerts for many years now. Those commer-
cial products are closed source software, therefore lit-
tle information is available on the technical details of
the implementation. A solution available in the open
source domain is the Host Attributes Table which can
be used with the open source network IDS system
Snort
5
.
2.2 Network Modelling
The systematic description of network structures has
a long tradition. A well known approach is the 7-
layer-model from OSI (ITU-R, 1994). A more for-
mal way of description based on a logic oriented ap-
proach which also covers security related informa-
tion and the usage within intrusion detection systems
was presented by (Vigna, 2003) and (Morin, 2002).
A rich management model which has been provided
by the Desktop Management Task Force
6
(DMTF) is
the Common Information Model (CIM). The Splunk
7
product for collecting and analyzing high volumes of
log data gains network awareness by an add-on mod-
ule making use of the CIM model.
Another approach is related to the NETCONF
Data Modeling Language Working Group (NET-
MOD
8
). They have developed a high-level data mod-
eling language for the NETCONF protocol called
1
http://prads.projects.linpro.no/
2
http://lcamtuf.coredump.cx/p0f3/
3
http://passive.sourceforge.net/
4
http://www.cisco.com/c/en/us/td/docs/security/firesight
5
http://www.snort.org
6
http://dmtf.org/standards/cim
7
https://www.splunk.com/
8
https://datatracker.ietf.org/wg/netmod/charter/
YANG (RFC 6020) (Bjorklund, 2010). This is ac-
companied by RFC 6991 (Schoenwaelder, 2013),
which introduces a collection of common data types
to be used with the YANG data modeling language.
YANG is a data modeling language used to model
configuration and state data manipulated by the NET-
CONF protocol, NETCONF remote procedure calls
and NETCONF notifications. YANG has also been
used to do network modeling. There are three IETF
drafts (work in progress) available dealing with the
basics of network modeling and network topology
modeling. Clemm et al. (Clemm et al., 2016) describe
an abstract and generic YANG data model for net-
work/service topologies and inventories. This serves
as a base model which can be augmented with specific
details in other more specific models.
3 ARCHITECTURE AND
IMPLEMENTATION
Our implementation architecture is based on a set of
functional modules realizing various components of a
distributed intrusion detection system. An overview
of the network model related part of the distributed
architecture is given in Figure 1. This comprises the
following modules:
• The Inventory Server is performing node and
service discovery and is providing an inventory
model. This is done passively by using the open
source product PRADS. The network traffic is
captured and analyzed using a set of signatures.
The PRADS output log file is read and formatted
according to our YANG-based inventory model.
• The Topology Server is providing a topology
model. This server uses the discovery func-
tionality of the open source network manage-
ment system OpenNMS
9
. Its discovery mod-
ule utilizes various SNMP MIBs (basically the
BRIDGE-MIB (Norseth and Bell, 2005)) to col-
lect topology-related data which is stored in a
SQL database. The Topology Server processes
data from this database and generates an XML-
encoded topology model according to our YANG-
based model descriptions. This automatically
retrieved information is supplemented by asset-
related information (the asset database is realized
by some other tables of the OpenNMS database),
which is maintained manually. This is a kind of
Configuration Management Database (CMDB),
which we are using here to provide information
9
http://www.opennms.org
Network and Topology Models to Support IDS Event Processing
373