You are on page 1of 5

Axents Rob Clyde: Why You

Need Intrusion Detection


Anne C. Lear

I
nternet-based e-business rienced security professional and 1980s, to be a hacker, you
makes networks highly vice president of security man- needed time, a motive, and a lot
vulnerable to attack, as agement at Axent Technologies. of knowledge. Sometimes hack-
Web giants Yahoo and ers were out to steal informa-
eBay learned painfully in DETECTING THE THREAT tion, but often they broke into a
February. Analysts estimate the IT Pro: Although intrusion Continued on page 76
distributed denial of detection technology has been
service attacks that around for almost two decades, Security Expert
brought down these people are just now beginning
Web sites cost those to see it as a necessary compo-
and Optimist, Too
companies several nent of enterprise network
Rob Clyde is vice presi-
million dollars. security. Whats driving this
dent of security manage-
The cost of those increased visibility?
ment at Axent Technologies,
attacks and lingering
which develops security prod-
security concerns Clyde: Most organizations had
ucts for e-business environ-
have boosted intru- little use for intrusion detection.
ments. He created Axents
sion detection on Not only did few conduct busi-
Information Security SWAT
the radar screens ness over the Internet, many
Team, a group of security
of many network actually had a policy of not con-
professionals that tracks
administrators. necting.This was a major theme
and develops solutions to
Once viewed as at security conferences in the
enterprise security threats
a niche technol- early 1990s. Most presenta-
such as hacking and denial
ogy for military tionsmine among them
of service attacks.
and other ul- advised, Dont connect, the
Clyde has more than 25
Internets too dangerous, its
en years of experience in the
Photo
by Lea
h Hogst Effective intrusion filled with problems.
security field and is a fre-
The amazing thing is that in
detection can help just a few years we have come
quent speaker on intrusion
detection and other secu-
you reap e-business full circlenow you have to
rity issues. In 1984, he wrote
connect to the Internet if you
rewards and avoid the want to stay competitive.
and published the Audit
software product, which
sting of hack attacks. many consider to be a pio-
IT Pro: And this introduces
neering commercial intru-
new vulnerabilities into corpo-
sion detection system.
trasensitive networks, intrusion rate networks?
Clydes first commercial
detection is increasingly seen as
venture, Clyde Digital Sys-
essential for commercial net- Clyde: Yes, because the original
tems, a security software
works. IDC expects the market reasons we said dont connect
company, grew into a $5
for intrusion detection and vul- still hold true. When you con-
million business before it
nerability assessment solutions to nect, suddenly the innermost
merged with Raxco Soft-
grow nearly 40 percent yearly reaches of your network are
ware in 1991. In 1994, Clyde
through 2003. open to anybody who can find a
cofounded Axent, which
To find out more about what way in through the Internet.
went public in 1996 and re-
intrusion detection systems do Another scary thingalso a
ported sales of more than
and how they can help you keep direct result of the Internetis
$112 million in 1999.
hackers at bay, IT Professional what I call the democratization
spoke with Rob Clyde, an expe- of hacking. In the 1970s and

80 IT Pro July August 2000


PROFILE
Continued from page 80

network just to see if they could do it. Clyde: Attacks can still occur for the normal use and monitor audit logs
In the 1970s, when I was a systems simple reason that firewalls are per- for anomalous behavior, which could
administrator, hacking was kind of a meablethey have to permit access. indicate an attack and therefore trig-
game. People would send me a note You cant block absolutely everything gers an alert. In some military envi-
to say, Hey, look what I did, you because you wouldnt be able to do ronments, administrators willingly put
probably want to fix this, and I would any e-commerce. up with the resultsgenerally a lot of
reply, Thanks for telling me; Ill get false alarmsbecause the informa-
right on it. tion on their networks is so sensitive
Hacking isnt a game, though, when that they are willing to sift through the
critical business assets are at stake. alerts to trace what happened.
And in the last few years, an individ- Commercial users have much less
ual hackers knowledge and ability has interest in a purely heuristic kind of
become less important because hack- intrusion detectionnot only are the
ing information is widely available. false alarms annoying, management
Axents SWAT team has found often wants to know why there was an
more than 30,000 hacker-oriented alert or a user was blocked. In other
Web sites that make hacking as easy words, they need a deterministic sys-
as point and clickyou dont need to tem that lets them trace the alert back
know much, you just need time and a Photo by Leah Hogsten
to a distinct cause. A rules-based sys-
motive. There are some sophisticated tem encodes this kind of cause and


tools out there, many with a nice Many in effect by searching for event
graphical interface and pull-down sequences that match known attack
menus. For instance, with a tool called IT now realize a or misuse profiles.
l0phtcrack, you just point and click firewall isnt enough Most of todays systems use a com-
and out comes a list of passwords for bination approach. For example, most
the NT servers youre trying to crack. to protect their IT people would agree that if someone
Other hacker sites offer specific tries to log in and fumbles their pass-


instructions like, here is how you
systems. word more than three times, its prob-
break into this version of Unix, heres ably not the user making mistakes, it is
how you get into that version of somebody trying to guess the pass-
Windows NT. Oh, you hit a main- Most companies today say, I have word. So an intrusion detection prod-
frame? Here's what to do. They walk my firewall, but what am I going to do uct could have a rule based on
you through the specific steps to for intrusion detection? Intrusion thresholds that alerts IT when some-
exploit the systems. detection is becoming a standard part one has more than three failed log-ins.
of security as opposed to some add-
IT Pro: Are IT organizations becom- on extra that maybe you will do if you IT Pro: Does a typical IDS incorpo-
ing more aware of these hacker sites have the money. People view it almost rate a basic set of rules for defining
and the possibilities they create for in the same class as a firewall. and detecting misuse or attacks?
systematic, wide-scale attacks?
KEEPING INTRUDERS AT BAY Clyde: The military wanted to write
Clyde: Yes, awareness is definitely IT Pro: How do intrusion detection their own rules, so we the vendors sup-
growing. Four or five years ago, most systems (IDSs) pick up on suspicious plied them with good software to do
companies told us that until they have network activity and decide whether that. But the commercial sector essen-
a security problem, they didnt see the or not it constitutes an attack? tially wants shrink-wrap rules, and
need for intrusion detection or other most IDSs today have rule sets to
extra protection. Clyde: An IDS might use several dif- describe what constitutes a possible
Today, no major corporation would ferent approaches to detect attacks, intrusion. These should be general
say such a thing, and most are trying which may come from outsiders who enough that you dont miss new vari-
to address vulnerabilities in their net- have no authorized access to your net- ants on old attacks, but fine-grained
works. Most have had firewalls for a work. Or problems can arise from enough not to cause a lot of false
while but now realize thats not misuse by someone on the inside try- alarms.
enough. ing to gain more access than theyre Also, users often want to add a few
authorized for. of their own rules.This means vendors
IT Pro: Why isnt a firewall enough to Systems that use statistical-anom- need to offer comprehensive rule sets
protect a companys networks? aly detection build a profile of valid, but also build in extensibility.

76 IT Pro July August 2000


IT Pro: Why is extensibility impor- tion software. It means we can IT Pro: Does this mean IT depart-
tant? respond faster and you have better ments need trained security experts
protection for your networks. who know how to interpret and act on
Clyde: Certainly you want an IDS the information the tools give them?
that, out of the box, can detect all
known security vulnerabilities. But Clyde: Definitely. The nice thing
security is a very dynamic problem, about better tools, though, is that not
which means you need a system that every single administrator has to be
will allow you to update it quickly. fully trained in security. It is so hard
Also, there are typical methods that to hire security professionals these
hackers use to break into networks. days. An IDS that provides central-
So you can add rules to your IDS to ized console management and some
scan for those electronic calling cards level of interpretation can be critical.
or fingerprints typical of an attack. For We are working to improve our sys-
example, scanning or probing a net- Photo by Leah Hogsten tems ability to aggregate and act on


work almost always precedes an information.Today, we can do a pretty
attack. Once hackers find and identify Security is decent job of aggregating information
a system, they try to guess passwords from all parts of the network to give
or grab password files. They might
a dynamic problem, network administrators a good view
delete their audit trailsin fact, one which requires of what is happening.We can take spe-
of the most valuable rules you can cific actions against specific types of
have is to detect when the audit trails
systems we can attacks, but we are not at the point


are modified or deleted. update easily. where the program can automatically
For example, when hackers planted interpret all available information and
the zombies that ultimately carried initiate a complete response. We still
out recent distributed denial of service need human interventionsomeone
attacks, one step would generally be IT Pro: Do todays intrusion detection to make decisions like, who do we call?
to cover their tracks after installing the systems also provide more detailed Do we get law enforcement involved?
zombie code, which requires altering information, such as what specific kind Did we track down the right things?
the audit trail. If you have intrusion of attack might be happening or what
detection software that is monitoring steps to take to stop it? IT Pro: Intrusion detection systems
the audit trails status, youll know once had a reputation for being diffi-
when somebody has broken into your Clyde: In some cases, the system can cult to manage. Do some of the newer
system. describe what kind of attack is prob- systems address this concern?
ably happening, the network vulner-
IT Pro: How do users acquire and ability that allowed it in, how to fix it, Clyde: Todays IDSs can consolidate
deploy new rules to cover these new and what next steps to take.With cen- the alerts to a central console. This
types of attacks? tralized reporting, its easier to see the simplifies management and has other
larger picture so you dont have to benefits as well. For instance, if youre
Clyde: Our SWAT team writes and send each of your administrators off under attack, you might not detect
distributes new rules for our IDS chasing one little piece. that just from a long list of problems
products via the Web when they find Current systems, however, tend to in various places.You need a consoli-
new attack patterns, and users can report information focused on specific dated view of the whole network to
write their own rules as well. The key types of attack. If you are not careful, see that youre getting log-in failures
is to be able to quickly deploy them. If an administrator might say,Oh, I had all over the place, outsiders are scan-
the IDSand some work like this some log-in failures so Im going to ning your network, or youre getting
requires you to install a new version take these steps, and while he is spoof packetswhatever.
to update the rules, you have a big working on that, the hackers are busy A broader, centralized view lets you
problem on your hands, particularly attacking from another angle. see whether youre under concerted
if you have a host-based system run- What you really need is someone attack better than one systems admin-
ning on thousands of machines. savvy enough to spot a concerted istrator saying he had a log-in failure
An extensible IDS lets you deploy attack and who knows when to notify in his part of the system.
these new rules without having to management, local law enforcement, You need this for two reasons. One,
reinstall the softwarea lot like the FBI, or the National Infrastructure you want to know what is happening
adding new signatures to virus detec- Protection Center. on an enterprise level. And twothis

July August 2000 IT Pro 77


PROFILE

is more subtle but extremely impor- knock him off the system and disable cialization. Most of todays intrusion
tantyou have to assume that when a the account he used to get in. detection products are geared to
particular device or system is success- The danger, of course, is that you infrastructure protectionprotecting
fully attacked,everything on it could be could accidentally take action against the network and servers. However,
destroyed, including the record of all someone who wasnt doing anything the really critical assets are data and
the events your IDS so carefully col- wrong. applications, and application-level
lected. Its critical to get that data off instrusion detection will become
those systems onto more tightly con- NEW TOOLS FOR NEW NEEDS importantfor example, for database
trolled manager systems that arent IT Pro: Will intrusion detection sys- or Web applications.
easy to get to,have no applications run- tems continue to be sold as separate
ning on them, and can be accessed by products, or will these features even- IT Pro: Ive recently read that some
just one or two high-level IT people. tually be folded into broader security companies are outsourcing intrusion
The hackers think they destroyed systems? detection. Do you see this as a signif-
your system and all the audit trails, so icant trend?
they think they are getting off scot- Clyde: We are seeing a lot of integra-
free because there is no record left. tion, and as intrusion detection Clyde: Definitely. Companies are
Recording security events on your technology becomes mainstream, cus- starting to outsource parts or all of
manager systems gives you a lot more tomers ask us to integrate it into fire- their security programs, including
resilience in tracking down what hap- walls and other security products. Our intrusion detection. Setting up the sys-
pened and doing something about it. Raptor firewall, for instance, detects tem, developing the rules and policies,
when outsiders try to send a Ping of monitoring the console, deciding how
IT Pro: What actions might an IT Death. This goes beyond classic fire- to respond to alertsmany compa-
manager take when an intruder is wall stuff. In fact, we have a pretty nies are looking into outsourcing
detected? good list of well-known attacks and because it requires expertise, and get-
defenses built into our firewall. ting even a handful of security experts
Clyde: Responses can be passive, such This doesnt mean you dont need can be difficult.
as logging activity or alerting a man- an IDSmost customers want to Outsourcing security is not for
ager or even law enforcement.That is know what exactly is banging up everybodyit is a choice each com-
by far the most common action and, against their firewall.This goes beyond pany has to make based on resources,
in most cases, it is initially the only the scope of the firewall because intru- priorities, and so on. Many companies
action taken. sion detection means not just detect- want that core competency in-house.
Active responses might include ter- ing the attacks but also consolidating For example, most banks have done a
minating the network session or the event and audit trail information decent job building up their IT secu-
adjusting the firewall to block the IP from around the network. rity expertise and see it as core to their
address from which the suspicious I think well see separate intrusion business. Others just cant get momen-
traffic originates. If the suspicious user detection products for some time, and tum in that area, and thats where out-
is logged in to the system, you might well start seeing some areas of spe- sourcing makes a lot of sense.

IT Pro: Do you see outsourcing as a


Circulation: IT Professional (ISSN 1520-9202) is published bimonthly by the IEEE Computer threat or an opportunity?
Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE
Computer Society Publications Office, 10662 Los Vaqueros Circle, PO Box 3014, Los Alamitos, Clyde: We view it as an opportunity
CA 90720-1314; voice +714 821 8380; fax +714 821 4010; IEEE Computer Society Headquarters,
1730 Massachusetts Ave. NW, Washington, DC 20036-1903. Annual subscription: $35 in addition and work with several managed-ser-
to any IEEE Computer Society dues. Nonmember rates are available on request. Back issues: vice vendors, providing our expertise,
$10 for members, $20 for nonmembers. This magazine is also available on microfiche.
products, and methodologies. Xerox
Postmaster: Send address changes and undelivered copies to IT Professional, IEEE Service Europe recently contracted with
Center, 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, N.Y., and at
additional mailing offices. Canadian GST #125634188. Canada Post Publications Mail (Canadian Axent to provide security products
Distribution) Agreement Number 1445669. Printed in USA. and services for its mobile workforce
Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, and new e-business projects. Many
reflect the authors or firms opinion. Inclusion in IT Professional does not necessarily constitute providers and customers are inter-
endorsement by the IEEE or the Computer Society. All submissions are subject to editing for
style, clarity, and space. ested in not just product but method-
ologyhow to set up and fine-tune an
IDS or other security product, for
example.
Also, a growing number of man-

78 IT Pro July August 2000


aged-service providers provide intru-
sion detection along with other ser-

Join the
vices.This is important for companies
that, for instance, outsource their Web
functions and want to know if their
Web applications are under attack.
Intrusion detection becomes very
important for all kinds of hosting ser-
vices, and those service providers will
look to the IDS vendors for products
and technical support.
IEEE
WHATS NEXT?
IT Pro: How will intrusion detection
technology evolve in the near future?
Computer Society
Clyde: Well definitely see improved
performancewe need to get to giga-
bit speeds, and also need to come
closer to the antivirus software model
online at
regarding ease of use and stream-

computer.org/join/
lined, regular updates.
We must also deal with new twists on
old attacks by collecting data from all
over the network via collectors embed-
ded in hubs, routers, and applications.
Deploying good rules will help deter-
mine when and from where an attack
Complete the online application
is happeningtracebacks will be really
important, but we have years to go
and
before thats consistently possible.
Hackers dont often realize that an Get immediate online access
IDS doesnt have to detect everything
they are doing to catch them.A system to Computer
just has to find one thing out of the
ordinary, latch onto it, and start track-
ing. If a hacker makes one mistake, Sign up for a FREE e-mail alias
does one thing that triggers the alarm,
youve got him.Youre essentially turn- you@computer.org
ing the tables on the attackers,and with
all the hackers and hacking resources
out there, thats very powerful.
Access the CS Digital Library
for only $50*
And thats just part of . . .
The Worlds Computer Society
*Regular price $99. Offer expires 15 August 2000
Anne C. Lear is a freelance technol-
ogy writer based in southern Califor-
nia. Contact her at stannabelle@yahoo.
com.

July August 2000 IT Pro 79

You might also like