Results 1 to 5 of 5

Thread: Parameters needed for security in IDS

  1. #1
    Join Date
    Aug 2009
    Posts
    76

    Parameters needed for security in IDS

    I'll put an IDS on the network ..

    My question:

    1) Ask an IDS on a DMZ or behind a firewall? (knowing that there's more DMZ)

    2) What are the parameters to be secure in place on the Linux machine that hosts the IDS?

  2. #2
    Join Date
    May 2008
    Posts
    3,516

    Re: Parameters needed for security in IDS

    Here is the answer to your question:
    1. Neither one nor the other. Or both.

    To put things in order. Say you have the ability, in terms of human resources to operate an IDS, and you also have the technical resources to do so. I have just read the string of questions you've posted so far and how questions are asked makes me think that your eyes are bigger than the belly and that "some" elements you escape again, probably for a short moment, time to update knowledge representing thousands of pages of documentation.

    Before installing an IDS, and subject to two conditions set above, you should have valued the assets to protect, especially the risks. Having answered these questions you would know what your network requires the utmost vigilance. From there you would have an architecture designed accordingly and installed special defenses in depth. You deduct the points and therefore sensitive or where to place the probes of your IDS.

    To illuminate the connection take an example. If you are the biggest threat lies outside the network (Internet) then you need at least one probe or in the DMZ or behind the firewall, but before this one. It is very useful to observe what is happening outside the door rather than being barricaded behind to listen to the sounds that filter without knowing what is happening outside. You'll look smart when the door will explode and you'll be facing an opponent that can contain. So if you had seen what was happening outside you would have seen the forces are gathering outside your door.
    If your business involves the use of sensitive data especially if they are familiar to users, or some, then it is leaving the internal LAN that should be at least one probe to find collaborators too curious roam around restricted areas.

    These two examples, none of which fits your preconceived idea of the issue to explain that there is no recipe.

  3. #3
    Join Date
    Aug 2009
    Posts
    76

    Re: Parameters needed for security in IDS

    Yes, I doubt I understood that it was repeated moult once. I just need your opinion. I still get your views on the right architecture as follows:

    I have 7 dmz on a series of blue pix DMZ = Group 1
    I am 8 dmz on a series of white pix DMZ = Group 2
    1 paw of each pix on a Lan
    1 Lan admin behind a pix with a paw on the client lan

    I'll put the IDS in this way:
    1 IDS before the firewall 1 1 between the IDS and FIREWALL1 group DMZ 1
    1 IDS before the firewall, 2 1 between the IDS and FIREWALL2 group DMZ 2
    1 IDS before pix of Lan Admin

    Why 1 upstream / 1 downstream : It is important to be alerted before (with proper filters) to notice that after a time the firewall is crossed!
    Monitoring more coherent and more convincing.
    Needless course have rules, filters, a work of scripting, dev, for the visibility of upstream and downstream, alert notification, while a square ..

    In total, 7 IDS (I'm not going into details of the archi ...). The very central to a console. Why such an establishment? We host of very sensitive data

    I would like your opinion on this development ..

  4. #4
    Join Date
    Nov 2008
    Posts
    1,066

    Re: Parameters needed for security in IDS

    I see no point in installing an IDS before the firewall. We can only do this when you have no confidence in the setup of the firewall. And then it generates too many alerts that do not pass the firewall. What is the human time available to monitor IDS alerts?

  5. #5
    Join Date
    May 2008
    Posts
    3,516

    Re: Parameters needed for security in IDS

    Quote Originally Posted by KABIRA16 View Post
    I have 7 dmz on a series of blue pix DMZ = Group 1
    I am 8 dmz on a series of white pix DMZ = Group 2
    I do not understand. The rest, for that matter, your elliptical style does not help. Post a scheme would be preferable. I do not give any opinion on something I do not understand.

    However in the absence of schema, it is not necessarily consistent or necessary to multiply the probes (not ids). The switches properly configured to simplify things and in addition to improving safety. The tap boxes are also useful.

    Quote Originally Posted by KABIRA16 View Post
    We host of very sensitive data
    Quite amazing. Structures facing such problems have such obligations and therefore such a technical area and they have financial or internal expertise or can afford to pay specialists.

    It is something that escapes me at this point.

Similar Threads

  1. URL dynamic parameters
    By Bricklayer in forum Software Development
    Replies: 6
    Last Post: 02-08-2010, 10:30 AM
  2. VBA Recordset / Parameters
    By Gunner 1 in forum Software Development
    Replies: 5
    Last Post: 17-02-2010, 12:38 AM
  3. Application skills needed for safeguarding the WEB server security
    By Muwafaq in forum Technology & Internet
    Replies: 4
    Last Post: 14-02-2010, 04:17 AM
  4. How to Pass Parameters via URL
    By Paramartha in forum Software Development
    Replies: 4
    Last Post: 23-09-2009, 06:13 AM
  5. BIOS parameters
    By bayz in forum Overclocking & Computer Modification
    Replies: 4
    Last Post: 01-01-2009, 10:48 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,947,099.43903 seconds with 17 queries