[Discussion] Rules Syntax

Matt Jonkman jonkman at jonkmans.com
Wed Jan 7 01:02:13 UTC 2009


Martin Holste wrote:
> I think that Claudio's English signatures are good examples to start
> with.  Even a repository of paragraphs like that would be valuable to me.
> 
> A port-tracking database wouldn't be that big (as in, only a few gigs)
> to store last remote port on a per-local-IP basis.  With decent
> indexing, it would be extremely fast.

Maybe some kind of hash lookup, or bloom filter kinda thing?

> 
> Regarding statistical analysis, I highly encourage the group to check
> out the NFSen project (nfsen.sourceforge.net
> <http://nfsen.sourceforge.net>) for inspiration.  They have an entire
> framework for statistical alerting on Netflow contained in a small
> amount of very pluggable/extensible Perl packages. I'm extremely
> impressed with its efficiency and the overall software architecture. 
> I've recently implemented it in my org and it took almost zero effort. 
> In particular, they have a plugin which applies a Holt-Winters
> exponential smoothing algorithm to flows and alerts based on those
> statisical anomalies.  Email alerts are standard, but there is a plugin
> for MySQL alert logging as well.  The quality of code is exceptional (I
> was very impressed to see so much effort being spent on input
> validation!) and I plan on bolting it onto my existing SIM.  I would
> think the Holt-Winters plugin code could be modified to analyze a lot of
> input types.

This also looks promising. Anyone used it? Thoughts?

Matt
> 
> On Sun, Dec 21, 2008 at 10:11 AM, Matt Jonkman <jonkman at jonkmans.com
> <mailto:jonkman at jonkmans.com>> wrote:
> 
> 
>     Claudio Criscione wrote:
>     >
>     > Well, what about:
>     >
>     > "if someone in my organization has never started any ftp traffic
>     in the last
>     > three months starts an ftp connection, notify me and start
>     watching more
>     > carefully that person. "
> 
>     I like this too. How do we store that kind of data for long term? Even
>     if we were to just store last timestamp we saw that port in use on this
>     IP that'd be a significant amount of data on the average net to go back
>     months, no?
> 
>     How do we go after that then? (Call to the db experts out there)
> 
>     Use a sliding scale so as the user-defined storage space allocated fills
>     up older data drops out?
> 
>     Use a limited range of ports, and/or group together high port ranges?
> 
> 
>     >
>     >  - Someone vs some machine
>     > Using the IP address is still the only way to go in most cases,
>     but we need
>     > more sophisticate means to identify who's who as networks evolve
>     (think about
>     > whole cities behind a NAT)
> 
>     I think we should think more inside the firewall for these issues, no?
> 
>     There are ways, and several commercial products that track a user to an
>     IP in realtime. Cisco I believe does, and others surely. LDAP
>     integration/AD, netbios login monitoring, etc. It's possible, but it's a
>     big thing to tackle. And likely we'd have patent conflicts. We can
>     explore that though if there's a large enough driver to get it.
>     Thoughts?
> 
> 
>     > - in the last three monts can actually be translated to "is not
>     used to"
>     > or "does not usually"
>     > The issue with statistical approaches is that you really have to
>     develope
>     > custom models. What about "signature based statistical models"?
> 
>     Yes, statistical approaches are tough. I'd like to see what is available
>     out there in this area these days as far as open research. As I
>     mentioned, I think it'll be a good use of some of our grant money to
>     contract or grant fund a real statistician or group of such. Maybe we
>     could get it made into a class project at a university somewhere under
>     the guidance of an experienced statistician.
> 
>     >
>     > - "watching more carefully"
>     > I'm not sure we always want the same "resolution" on network
>     traffic, and I
>     > feel it would be great to be able to zoom on suspicious activity
>     > automatically without having to carry the burden of logging everything
>     > everytime
>     >
> 
>     Another good point. Most folks these days do that with rotating
>     tcpdumps, but you're time limited there. If you don't get to that alert
>     before the pcap rotates out you've lost it. Are there better approaches
>     out there?
> 
>     Matt
> 
> 
>     --
>     --------------------------------------------
>     Matthew Jonkman
>     Emerging Threats
>     Phone 765-429-0398
>     Fax 312-264-0205
>     http://www.emergingthreats.net
>     --------------------------------------------
> 
>     PGP: http://www.jonkmans.com/mattjonkman.asc
> 
> 
>     _______________________________________________
>     Discussion mailing list
>     Discussion at openinfosecfoundation.org
>     <mailto:Discussion at openinfosecfoundation.org>
>     http://lists.openinfosecfoundation.org/mailman/listinfo/discussion
> 
> 

-- 
--------------------------------------------
Matthew Jonkman
Emerging Threats
Phone 765-429-0398
Fax 312-264-0205
http://www.emergingthreats.net
--------------------------------------------

PGP: http://www.jonkmans.com/mattjonkman.asc





More information about the Discussion mailing list