[240] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

No subject found in mail header

daemon@ATHENA.MIT.EDU (owner-ids@uow.edu.au)
Sun May 21 09:30:27 1995

Date: Sun, 21 May 1995 20:53:59 +1000
From: owner-ids@uow.edu.au
Apparently-To: ids-outgoing@wyrm.cc.uow.edu.au

>>From ids-owner  Sun May 21 07:59:59 1995
>Received: from bb.iu.net (bb.iu.net [198.69.25.2]) by wyrm.cc.uow.edu.au (8.6.11/8.6.11) with ESMTP id HAA04786 for <ids@uow.edu.au>; Sun, 21 May 1995 07:35:42 +1000
>Received: from  (netport-15.iu.net [198.69.25.215]) by bb.iu.net (8.6.12/8.6.12) with SMTP id RAA23389 for <ids@uow.edu.au>; Sat, 20 May 1995 17:43:18 -0400
>Message-Id: <199505202143.RAA23389@bb.iu.net>
>X-Sender: jtruitt@iu.net
>Mime-Version: 1.0
>Content-Type: text/plain; charset="us-ascii"
>Date: Sat, 20 May 1995 17:28:48 -0400
>To: ids@uow.edu.au
>From: jtruitt@iu.net (Jim Truitt)
>Subject: ftp://ftp.sei.cmu.edu/pub/argus-1.5/argus-1.5.announce
>X-Mailer: <PC Eudora Version 1.4>
Sender: owner-ids@wyrm.cc.uow.edu.au
Precedence: bulk
Reply-To: ids@wyrm.cc.uow.edu.au

>        Crosspost
>> 
>> Argus 1.5
>> Software Engineering Institute
>> Carnegie Mellon University
>> argus@sei.cmu.edu
>> ftp://ftp.sei.cmu.edu/pub/argus-1.5
>> 
>> This is to announce the availability of the public domain package, Argus,
>> a generic IP network transaction auditing tool.  Argus runs as an
>> application level daemon, promiscuously reading network datagrams from
>> a specified interface, and generates network traffic status records
>> for the network activity that it encounters.  Argus has been built and tested
>> under SunOS 4.x, Solaris 2.3, and SGI IRIX5.2.  The issue of portability has
>> been principally addressed by the use of libpcap-0.0.x.
>> 
>> Argus, enables a site to generate comprehensive network transaction
>> audit logs, in a fashion that provides for high degrees of data reduction,
>> and high degrees of semantic preservation.  This has allowed us to perform
>> extensive analysis of our network traffic, historically.  The package
>> includes two example programs for analyzing the network transaction audit
>> logs.
>> 
>> By processing these historical network logs, we have been able to,
>> among other things:
>> 
>>    1. Verify that our network security access control policies are
>>       actually being enforced and detect attempts to break through
>>       our firewall and host based mechanisms.
>> 
>>    2. Perform grade of service analysis for every IP based network
>>       service that is offered in our network infrastructure.
>> 
>>    3. Identify and troubleshoot difficult transient network problems such
>>       as intermittent service failure, denial of service attacks and
>>       host and network configuration problems.
>> 
>> And by using the realtime features of Argus, we have been able to
>> develop complex proactive network management tools.
>> 
>> 
>> The data that Argus generates makes possible the ability to analyze
>> network activity and performance in ways that have not been possible
>> before.  We are routinely answering questions such as:
>> 
>>    "Has anyone scanned this subnet for system vulnerabilities, such
>>        as that performed by SATAN?"
>> 
>>    "A new intrusion method has been discovered, has anyone tried
>>     to use it to attack the CERT Coordination Center's network in
>>     the past year?"
>> 
>>    "Did a new MUD server appear on any of the SEI machines last
>>        Tuesday?"
>> 
>>    "What network traffic was blocked by our router-enforced firewall?"
>> 
>>    "What is the average HTTP transaction connection time when a CMU
>>        host accesses MIT's WWW server?"
>> 
>>    "If we move the News server to another subnet, what other machines
>>        should be moved with it?"
>> 
>> Each of these questions can be answered from the same historical network
>> activity audit log.
>> 
>> 
>> Comprehensive network transaction auditing can make a major impact on
>> a sites network security.  As we have had a great deal of success in
>> using Argus to improve the network security at the Software Engineering
>> Institute and CERT Coordination Center, we would like to emphasize this
>> advantage of the use of Argus.
>> 
>> We have found that comprehensive network transaction auditing can be a
>> powerful network management tool, and we think that a large number
>> of sites can benefit from the prototype work that we have done in this
>> area.  We hope that you find Argus and the support tools helpful.
>> 
>> If you have any questions, comments or suggestions please send
>> mail to argus@sei.cmu.edu.
>> 
>> 
>> Again, thank you for your interest in Argus.
>> 
>> Carter Bullard
>> Software Engineering Institute
>> Carnegie Mellon University
>> wcb@sei.cmu.edu
>> 
>> Chas DiFatta
>> Software Engineering Institute
>> Carnegie Mellon University
>> chas@sei.cmu.edu
>> 

-- 
+---------------------+--------------------------------------------------+
|  ____       ___     | Justin Lister                 ruf@cs.uow.edu.au  |
| |    \\   /\ __\    |     Center for Computer Security Research        |
| | |) / \_/ / |_     | Dept. Computer Science      voice: 61-42-214-327 |
| |  _ \\   /| _/     | University of Wollongong      fax: 61-42-214-329 |
| |_/ \/ \_/ |_| (tm) |     Computer Security a utopian dream...         |
|                     |       Disclaimer: dreaming is at own risk        |
+---------------------+--------------------------------------------------+

home help back first fref pref prev next nref lref last post