?? 163-167.html
字號:
<option value="/reference/dir.programminglanguages.html">Programming
<option value="/reference/dir.security1.html">Security
<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
<option value="/reference/dir.userinterfaces.html">UI
<option value="/reference/dir.webservices.html">Web Services
<option value="/reference/dir.webmasterskills1.html">Webmaster
<option value="/reference/dir.y2k1.html">Y2K
<option value="">-----------
<option value="/reference/whatsnew.html">New Titles
<option value="">-----------
<option value="/reference/dir.archive1.html">Free Archive
</SELECT>
</font></td>
</tr>
</table>
</form>
<!-- LEFT NAV SEARCH END -->
</td>
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->
<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->
<!-- begin main content -->
<td width="100%" valign="top" align="left">
<!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=5//-->
<!--PAGES=163-167//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="160-163.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="167-169.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>In Chapter 2, “The Role of Identification and Authentication in Your Environment,” you saw ways to improve the security of I&A by using techniques or tools that defended against threats such as password cracking and network sniffing. It’s clear that access control is needed beyond I&A for a complete security model, but why do you need intrusion detection in addition to I&A?
</P>
<DL>
<DD><B>•</B> Even improved authentication products, such as Kerberos, have been hacked. Weaknesses in the protocol have been described in Chapter 2 and elsewhere (Bellovin and Merritt, 1991; Dole, Lodin, and Spafford 1997; Mudge 1996).
<DD><B>•</B> In 1997 the integrated Solaris-DCE login facility also had a serious flaw that rendered I&A untrustworthy. A similar flaw appeared in Silicon Graphics’ IRIX operating system in 1998.
<DD><B>•</B> Early versions of Security Dynamics ACE server also had problems that you saw in Chapter 2.
<DD><B>•</B> A flaw in AIX rlogin allowed remote users to gain root access.
</DL>
<P>There are many other examples of failed I&A subsystems. Because bugs or loose adherence to corporate security guidelines will always exist, <I>I&A will not prevent all hacks</I>. You must at least monitor the activities of users, including simple events such as failed login attempts, in order to detect problems. Preferably, you want to detect attacks in real time and have some automated responses to provide a scalable solution. Deploying an IDS that can detect attack patterns in I&A event data helps you get a handle on your security problems.</P>
<P>To reiterate a theme introduced in the opening chapter of this book:</P>
<DL>
<DD><I>Good security requires prevention, detection, and responses.</I>
</DL>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Beyond Access Control</FONT></H4>
<P>There are similar concerns about access control mechanisms that are responsible for <I>preventing</I> unwanted actions. For nonnetwork resources, such as files, directories, devices, and IPC data structures, access control is designed to limit how subjects and objects interact. To effectively carry out its responsibilities, the reference monitor needs an access control database that is properly configured with the security policy to enforce. This database is the first place things can go wrong. As you saw earlier, either the vendor or your site administrator can improperly configure access control rules (or other aspects of your security policy) that lead to compromises. Remember, properly specifying access control rules for files and directories is an exceedingly complex task as the number of subjects and objects grows.</P>
<P>Next, if there are any bugs in the reference monitor itself, access control will not prevent violations of the policy. Although buffer overflows in privileged programs are not the fault of the reference monitor, these flaws are used to bypass the access control policy defined for the system. Perhaps the greatest latent threat is the large number of home-grown applications or custom programs that contain bugs or configuration errors which can lead to intrusions. As more enterprises connect these legacy back-end applications to front-end Web servers, the risk of penetrations increases.</P>
<P>When your system access control policy is violated, you also want to be able to detect the activity as soon as possible and have a scalable solution for responses. An IDS can add value here. An IDS is designed to detect and respond to attacks that get past your access control systems. The same is true for network access control.</P>
<H4 ALIGN="LEFT"><A NAME="Heading6"></A><FONT COLOR="#000077">Beyond Network Security</FONT></H4>
<P>How could it be possible that firewalls and encryption techniques are not enough? A few examples are worth walking through in detail.
</P>
<P>In Figure 5.3, a packet-filtering firewall has been configured to allow HTTP traffic to travel in both directions. Two example hacks that can flow through this pipe are <I>test.cgi</I> and <I>phf</I>. Even if these two CGIs in particular are not running at your site, and hopefully they are not, there is always a risk that some internal CGI program has an exploitable weakness.</P>
<P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/05-03.jpg',499,556 )"><IMG SRC="images/05-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-03.jpg',499,556)"><FONT COLOR="#000077"><B>Figure 5.3</B></FONT></A> Intrusions unaffected by access control in the firewall.</P>
<P>An increasingly common configuration is shown in Figure 5.4. Here, the perimeter network contains a Web server that must contact a business back-end server to complete the interaction with the customer. In these configurations a proprietary gateway program often communicates through the firewall with the back-end server inside the trusted network. The next few paragraphs describe some problems with this scenario.
</P>
<P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/05-04.jpg',467,498 )"><IMG SRC="images/05-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-04.jpg',467,498)"><FONT COLOR="#000077"><B>Figure 5.4</B></FONT></A> Gateways are paths for intruders.</P>
<P>Even if customers are using digital certificates to authenticate to the Web server, this same credential is not necessarily meaningful in the security context of the database. The Web server and the database are separated by a security boundary with different subjects, objects, and ACLs. Some customer sites have granted the gateway program, running on the Web server, <I>unlimited</I> access to the database. In other words, when the gateway program connects to the database, it does so with the highest privileges when accessing the database. This programming choice alone should be enough of a reason to run an IDS on the database server.</P>
<P>The gateway program and the back-end server establish a client-server or peer-to-peer relationship. At a minimum, they communicate using a network protocol. Administrators know that certain Internet application protocols are not safe to punch through the firewall. However, these same conscientious employees often will allow proprietary protocols used by the gateway and back-end server to flow through the firewall. People realized weaknesses in some of the Internet application protocols because flaws were discovered by hackers or researchers over a period of years. These protocols are not allowed in the perimeter or through the firewall because they are flawed. The same type of introspection is warranted for private protocols that exist at your site, although private protocols are seldom given the same type of scrutiny. Private application protocols between the perimeter and the trusted network, or those run totally within the trusted network, are also potentially open to attack. Only by monitoring the activities of the participating nodes with an IDS can you be sure that your security policy is not weakened by proprietary application protocols deployed at your site. Although the IDS may not look at the protocol itself, it will detect improper activities on the system that result from weaknesses in private protocols.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="160-163.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="167-169.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- BEGIN SUB FOOTER -->
<br><br>
</TD>
</TR>
</TABLE>
<table width="640" border=0 cellpadding=0 cellspacing=0>
<tr>
<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- FOOTER -->
<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b>
<br><br>
Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br>
All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
</tr>
</table>
</BODY>
</HTML>
<!-- END FOOTER -->
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -