[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <433A66D6.10900@baden-online.de>
Date: Wed Sep 28 10:48:05 2005
From: peer at baden-online.de (Peer Janssen)
Subject: Suggestion for IDS
Valdis.Kletnieks@...edu wrote:
>On Wed, 28 Sep 2005 15:54:41 +0700, Fajar Edisya Putera said:
>
>>plan to install IDS to protect our resources
>>
>>
>An IDS doesn't *protect* your resources, any more than a concealed
>video surveillance camera protects anything. It may tell you who did it, and
>what they did, *after the fact*, but it won't *protect* you.
>
>
Really? Is there no software package capable of withholding inspected
packages until cleared by said IDS?
If I get it right, netfilter actually IS able to reject (and log)
packages. Why should an IDS sniffing on a level higher up on the "OSI
chain of command" be unable to do the same?
Dropping packets, closing ports and resetting connections (besides
logging, maybe notifying users) look like natural useful reactions to
the detections deliverad of an IDS to me.
Or are we just talking about definitions (regarding the "D" in IDS),
instead of talking about IDPS-ses which the OP clearly seems to imply?
(P for prevention)
So what are the IDPS-ses you recommend?
Peer
Powered by blists - more mailing lists