How to minimize the threat
Computerworld - Intrusion-detection systems (IDS) are the subject of industry controversy after a Gartner Inc. report recommended that companies abandon these systems in favor of firewalls (see story).
If organizations want to stop the constantly evolving types of attacks, they must continue to rely on multitiered defense strategies consisting of network security components layered at the perimeter and internal network machines and devices. Such network security components not only include network- and host-based IDSs, but antivirus software, patch management, firewalls, scanners and intrusion-prevention systems (IPS).
Admittedly, this approach has challenges: Systems are not adequately integrated, do not identify and share vulnerability information, and rely on numerous rules to identify new threats that in turn produce volumes of alerts all of which are overwhelming the system and its operators.
The main culprits are IDS/IPS technologies that are generally able to spot attacks by common vulnerabilities and exposures, or CVE, identifying that they see on a network. However, these same technologies generally don't have the ability to determine if the targeted machine is actually vulnerable to the attack.
For instance, if malicious code has been written as a Windows-based attack targeting a Windows vulnerability, is the destination IP address actually running Windows or a Unix variant? And, if it's Windows, is it vulnerable to the attack, or has it already been patched? An IDS doesn't have the intelligence to answer these questions and generates incident alerts indiscriminately. In addition, even if the targeted machine is vulnerable, an IDS doesn't have the capability to remediate it.
Furthermore, best-practice and government-compliance directives now require higher standards of network security and integrity to protect consumer privacy, and they must be documented with change-tracking and audit-trail reports.
|Brett Oliphant is the chief technology officer at Lafayette, Ind.-based SecurityProfiling Inc. |
Companies are finding it increasingly difficult and expensive, especially in an environment with rising security standards and policy compliance requirements, to mitigate new threats and manage numerous systems. But relying solely on firewalls isn't the answer. Vendors must create ways to integrate systems, share information intelligently to better defend against blended threats, reduce management and cost requirements, and automate IDS/IPS configuration and tuning along with vulnerability identification and remediation functionalities.
A first and important step in this process is to improve IDS/IPS to minimize false positives that threaten productivity and result in rising costs. This can be accomplished by integrating client configuration data from client agents or a scanner, which will provide the system with data so it can determine if the targeted machines are vulnerable to the attacks, thereby reducing false positives.
The following functions are achieved through this integration:
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!