Thursday, March 09, 2006
The Art of Digital War - [Part 2] Alarms in Digital Intrusion
Word | Frequency | Word | Frequency | Word | Frequency | ||
The | 1101 | That | 389 | As | 228 | ||
And | 878 | Is | 334 | Be | 226 | ||
To | 726 | Not | 315 | Lord | 218 | ||
Of | 657 | This | 296 | He | 216 | ||
I | 561 | His | 292 | What | 203 | ||
You | 544 | But | 265 | So | 197 | ||
My | 508 | With | 257 | Him | 189 | ||
A | 498 | For | 247 | Have | 179 | ||
In | 414 | Your | 242 | …. | …… | ||
It | 414 | Me | 235 |
If we put these words in the ‘RIGHT CONTEXT’ you will get a classic in English literature.
‘To be or not to be: that’s the question’ is a famous quote from Shakespeare's Hamlet by Prince Hamlet (of
Now let us look at the current set of Intrusion Detection Systems. It generates Alarms with some severity (and lots of them are false positives) and the current breed of Enterprise Security Management software’s do some basic algorithms to do the scoring which ends up similar to the data in the following table.
Alarm | Risk Score / Priority / Event Count |
Alarm 100 | 1101 |
Alarm 12931 | 878 |
Alarm 14987 | 726 |
Alarm 231 | 657 |
For Example.
All these have a definitive start and end segments. However currently we look at all these transactions as events and then we do correlate based on these events.
Now why should we see events? Why can’t we see a conversation?
What is a Conversation?
A Conversation happens when a user logs into a system do certain activities and then logs off.A Conversation could be for few seconds to hours, depends upon the nature of the conversation. A Conversation could be polite or rude! So the idea is clear. A Conversation shows a set of events in itslogical order (or grouping them in its logical order).
1. Business Conversation
Legitimate web users or business partners accessing the Application server (Web Services).
2. Inter - Department Conversations
Understanding the applications which communicate across the department (in normal office hours)
Employees browsing the web pages, checking personal emails etc
4. Un-known Conversation
This type of conversations is the one which doesn’t fit into current business rules or policies.
5. Rude Conversation
An Attacker scanning a server and compromising it
6. Impolite Employee Conversation
Employees breaking the security policies
Self propagating worm attack
Data doesn’t tell a story unless it is interpreted in the right way.