1998-10-09 - IP: Navy’s Open Source Security Project Shines

Header Data

From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@cyberpass.net
Message Hash: 2897722e79d18f2d422ce92605f1e78a885b210b3b5559f13380242bc5182e75
Message ID: <v04011705b243aac779c0@[139.167.130.246]>
Reply To: N/A
UTC Datetime: 1998-10-09 12:41:07 UTC
Raw Date: Fri, 9 Oct 1998 20:41:07 +0800

Raw message

From: Robert Hettinga <rah@shipwright.com>
Date: Fri, 9 Oct 1998 20:41:07 +0800
To: cypherpunks@cyberpass.net
Subject: IP: Navy's Open Source Security Project Shines
Message-ID: <v04011705b243aac779c0@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Delivered-To: ignition-point@majordomo.pobox.com
Date: Thu, 08 Oct 1998 23:28:13 -0400
From: Richard Sampson <rjsa@sprintmail.com>
Organization: Unknown Organization
MIME-Version: 1.0
To: "ignition-point@majordomo.pobox.com" <ignition-point@majordomo.pobox.com>
Subject: IP: Navy's Open Source Security Project Shines
Sender: owner-ignition-point@majordomo.pobox.com
Precedence: list
Reply-To: Richard Sampson <rjsa@sprintmail.com>

Navy's Open Source Security Project Shines
Oct 08, 1998 (Tech Web - CMP via COMTEX) -- An open source security
program created by a team of Navy programmers is proving to be one of
the most successful high-tech network burglar alarms online.

Late last month, the Navy released an unusual warning -- attackers were
probing military computers in ways that had previously gone unnoticed,
coordinating efforts around the world to keep any individual series of
probes virtually invisible.

Analysts had finally noticed the potential crackers' coordinated probes
using the Navy's SHADOW, or Secondary Heuristic Analysis System for
Defensive Online Warfare, intrusion-detection program.

"It was partly dumb luck," said Stephen Northcutt, the Navy's lead
analyst and programmer on the SHADOW team. But the software's
sensitivity to subtle attacks, combined with the number-crunching power
of statisticians associated with the project, let Northcutt and his
team of analysts tease evidence of the probes out of a mass of
apparently innocuous network logs, he said.

The SHADOW software is one of a growing number of intrusion-detection
tools on the market, designed to pick up and help analyze attempts to
break into computer networks instead of simply functioning as a passive
firewall-style siege wall.

Most of the major commercial-security vendors, such as Axent, Internet
Security Systems, or Network Associates, all provide
intrusion-detection programs, with support and service teams that can
help analyze possible attacks.

SHADOW is different in this respect. It is freely distributed online.
Like most open source programs, there is some documentation, but no
official support -- although there is a huge community of programmers
who have looked at the code and have written improvements and continue
to tinker with the way it functions.

The software itself is the product of more than two years of work by a
team led by Northcutt. The code was initially released to the public
last May, and revised later in the summer after a slew of comments and
criticism from outside developers.

It consists of two parts. Sensors sit outside a network firewall,
monitoring normal and potentially illicit attempts to enter the
network. An analysis system sits inside the firewall keeping a log of
activity, and periodically putting this information in front of a human
security analyst.

In the months since its release, the program has been picked up and
used by several major financial institutions, universities, local
government systems, and divisions of large companies that don't have
budgets for commercial intrusion-detection programs, Northcutt said.

"It's very good at doing some things and not so good at others," said
Allen Paller, chief researcher at the SANS Institute, a
network-security research and education organization. The program can
be initially difficult to use, since it requires users to program their
own filters to recognize attacks or probes not included in the original
documentation.

But the program's open source birth and evolution has made it strong
and extremely sensitive, Paller said. "The real strength of this
process is [the program] has been beaten on."

Northcutt is a proponent of pushing the open source model even beyond
the development of code, at least in the security field.

Most intrusion-detection programs function by picking up unusual events
-- malformed TCP or domain name system queries, handshakes between
servers and clients that don't look quite right, or other signs of
computer probes and attacks. SHADOW and other commercial trip-wire
programs do a good job of picking up things they recognize, Northcutt
and other security analysts said. But new attacks -- such as the
coordinated probes spotlighted by the Navy last month -- require
considerable expert analysis to spot.

"Attackers have been sharing very well inside their community," we have
no equivalent to the underground magazines and other communication
channels." -- Stephen Northcutt U.S. Navy That's where the open source
model comes in, Northcutt said. Intrusion-detection analysts can
function best if information about different attacks is widely and
freely distributed. The Navy site that distributes SHADOW publishes
much of the information it uncovers, and distributes new filters that
recognize new attacks and probes. This kind of open, widely shared
information is critical for stopping crackers, but must happen on a
wide scale, he said.

"Attackers have been sharing very well inside their community,"
Northcutt said. "We have no equivalent to the underground magazines and
other communication channels."

Paller agreed. His organization is one of several that sponsor
workshops where security professionals can share their experiences with
their peers. SANS also runs a security-oriented mailing list with
nearly 55,000 subscribers, many of whom served as SHADOW reviewers.

"Unless we get communication lines going, we can't keep up," Paller
said. "Otherwise, we don't have a chance."

-0-

Copyright (C) 1998 CMP Media Inc.


News provided by COMTEX.
[!HIGHTECH] [!INFOTECH] [COMMUNITY] [COMPUTER] [EDUCATION] [GOVERNMENT]
[INTERNET] [MARKET] [MILITARY] [NAVY] [NEWS] [NEWSGRID] [ONLINE]
[RESEARCH] [SOFTWARE] [TWB]


--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a
prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo@majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





Thread