01 - IPS - Introduction
01 - IPS - Introduction
01 - IPS - Introduction
TippingPoint
2
Definition of Information Security
3
Yesterday - déjà vu!
http://seclab.cs.ucdavis.edu/projects/history/seminal.html
4
Have we learned? Increasing Vulnerabilities
CERT Vulnerabilities
4500 4,129
• Total vulnerabilities > 17,946
4000
• Severe vulnerabilities in
3500 widely deployed products
3000 increasing
2500
2,437
2000
1500
1000
1,090
500
417
0
1994 1996 1998 2000 2002 2004
CERT Incidents
160000
60000
40000
20000
0
1985 1990 1995 2000 2005
CERT Note: An incident may involve one site or hundreds (or even thousands) of
sites. Also some incidents may involve ongoing activity for long periods of time
6
Evolution of LAN Security – The Firewall
WAN Edge LAN Edge LAN Core LAN Distribution LAN Access
Avg. BW = Avg. BW = 10Mbps Avg. BW = 100Mbps Avg. BW = 10Mbps Avg. BW = 10Mbps
FT1 –
DS3/OC3
HUB
Extranet
Internet
HUB
DMZ
Web
FTP - Single Security Broadcast Domain
SMTP
DNS - Segmentation of Public DMZ 7
What about Firewalls?
> A firewall blocks traffic to ports (UDP or TCP) that are not offering
public services.
— They offer little or no protection against attacks involving known
allowed services such as SMB, HTTP, SMTP, IM, P2P, Spyware, Phishing
— Don’t protect against internal threats: VPN, Wireless, Traveling Users,
consultants, guests
> Many different firewall offerings with different features –
— Generally speaking all firewalls will inspect and take action on a packet
traveling from one network interface to another.
— Vendor specific firewall features –
> Layer3/4 stateful connection tracking and filtering
> Network address translation
> Virtual private network termination, IPSEC, etc.
> SSL
8
Evolution of LAN Security – IDS
WAN Edge LAN Edge LAN Core LAN Distribution LAN Access
Avg. BW = Avg. BW = 100Mbps Avg. BW = 1Gbps Avg. BW = 100Mbps Avg. BW = 100Mbps
N x 1.54Mbps
N x 45.3 Mbps
ALERT!
IDS
L2
ALERT! Switch
Extranet
IDS
ALERT!
Private WAN
IDS
L3
Switch Users
Internet
L2
Switch
DMZ
Web
FTP - Single Security Broadcast Domain with Public DMZ segment
SMTP
DNS
- IDS for InfoSec Forensics & Audit
9
What about Intrusion Detection Systems (IDS)?
Internal Attackers
• Disgruntled Employees
• Dishonest Employees
Operating Systems
Good traffic passes through
Some traffic is rate-limited –
P2P for example
Infrastructure
Valid User &
Application Wireless
Traffic
12
What about intrusion prevention?
> Patch at the Network Level by taking the IDS “idea” and adding the
ability to block a detected attack
> Requirements:
— Function inline with switch like speed, reliability, and performance –
Low Latency, Highly available
— Be both a network device and a security device
— NO False Positives
— Real time filter updates with zero downtime
— Flexible architecture that can provide multiple types of filtering and
evolve with the changing attack spectrum
— Automatic Protection – As little tuning as possible
> The TippingPoint IPS system is built upon TippingPoint's Threat Suppression Engine (TSE)
— a specialized hardware intrusion engine using:
> state-of-the-art network processor technology (ASIC)
> TippingPoint custom code (FPGA)
14
TippingPoint Architecture
Alerts
Floods
Scans
Threat Block
Rules Verification 6
Hardware
Session State Packet
Content Trigger Flow
Connection Header
Matching Result Control
Table Processing
1. Connection Validation
1 2 4 5 7
2. Hdr Pre-processing /Pkt Validation
3. Stream Reassembly Drop Drop Packet & Flow Drop
4. Stream Content Inspection Reassembly
5. Trigger Result 3
6. Threat Verification
7. Traffic Management
15
TippingPoint Product Line
Key Points
> 50 and 100E are software-only devices (no Network Processors or FPGAs)
> 100E and 5000E – series platforms provide Advanced DDoS
> # of Segments vary from box to box – 1 on 50/100E, 2 on 200, and 4 on 400+
> Throughput is the total TSE throughput, so take into account traffic flowing both directions
16
Digital Vaccine - Automatic Protection
17
Filter Updates with TippingPoint’s Digital Vaccine Service
• SANS
• CERT
Raw Intelligence • Vendor Advisories
Feeds •
•
Bugtraq
VulnWatch
• PacketStorm
• Securiteam
• ZeroDay Initiative
( www.zerodayinitiative.com )*
@RISK
Digital Vaccine Vulnerability Analysis Weekly Report
Automatically
Delivered to
Customers
Vaccine Creation
18
SANS @RISK Report
19
Summary