Hi
I see what you are talking about now ...
Bar snort, where you may build a special filter to detect some of what you 
say, it would be an intriguing task to be able to trigger an anomaly alert 
when traffic on a certain port increases or changes significantly. I doubt it 
would have any usefulness in anything but the most stable production-style 
networks, and in that situation a trained eye and a good mrtg report would 
likely result in anomaly detection. I can't see it being useful in a small 
home-like network, any one of your family or s.b. member can fire-up a skype 
on an odd port and create an instant peek on some graphs triggering an 
anomaly. Needless to say, monitoring a server-farm like that would likely 
detect an intrusion, but then so will snort and any other ids ... just my 
0.02 CAD.
Cheers
Szemir

On February 7, 2005 22:59, Niels Voll wrote:
> It's an interesting idea to do anomaly detection for a small network.
> Arguably it's an easier problem to solve. For example, if there's a
> dramatic increase in traffic to a certain port within a small network or
> coming from a small network onto the public network, there's a chance
> that something might be amiss (e.g. one of my machines is compromised).
> I have never looked at software, which would monitor a network and for
> example keep statistical track of traffic by port numbers. I'm assuming
> it exists, and that it might be neat to build something onto that, so
> that a finished product might be useful to non-experts on small networks.
>
> It's a really intriguing idea ...
>
> Michael Gale wrote:
> > Hello,
> >
> >     No .. you understood me correctly. I am researching it at the
> > moment as only a enthusiast but am thinking about trying to create a
> > small little app that could do network anomaly detection on a small
> > network.
> >
> > From what I have gathered (which is not much at the moment) network
> > anomaly detection has only really been tested and used in large scale
> > academic networks.
> >
> > Some papers describe that it has been tested / used on Internet
> > backbones and other large networks and involve monitoring internet
> > traffic.
> >
> > Most of them tend to agree thought Network Anomaly Detection can not
> > work for a few reasons.
> >
> > 1. By statistically studying the network traffic of any given network
> > it can be noted that there is to much variation to statistically
> > monitor the network.
> >
> > 2. In order to provide a bases for the analyzes you would need to
> > train the anomaly detector on a clean network. This could be a problem.
> >
> > The last point, it seems so far that most of the documentation I have
> > found is based on using anomaly detection as part of a IDS. Which
> > generates false alarms because not ever anomaly is an attack.
> >
> > This is why I think it would be possible to create anomaly detector
> > which does only that. Graph and find anomalies (changes) in the network.
> >
> > So I was curious if any one has had any experience with this before.
> > Insight or documentation would be a great help.
> >
> > Michael.
> >
> > Niels Voll wrote:
> >> isn't network anomaly detection typically something, which can only
> >> be done on rather large networks? In addition, wouldn't one need
> >> management access (at least monitoring) to not only servers but
> >> especially to large numbers of routing devices (or have NIDS devices
> >> listening on a ton of network segments?).
> >>
> >> Or did I misunderstand what you meant by anomaly detection? In what
> >> context are you researching (e.g. academic, enthusiast, small
> >> business, enterprise, ISP, govt)?
> >>
> >>
> >> ...Niels
> >>
> >> Michael Gale wrote:
> >>> I'll take the lack of responses a no.
> >>>
> >>> Thanks anyways.
> >>>
> >>> Michael.
> >>>
> >>> Michael Gale wrote:
> >>>> Hello,
> >>>>
> >>>>     I am fairly new to the list :)
> >>>>
> >>>> Does any one here have experience with a NIDS (Network Intrusion
> >>>> Detection System) that uses a form of network anomaly detection ?
> >>>> or has any one here used any commercial software that does or
> >>>> claims to do network anomaly detection ?
> >>>>
> >>>> The reason I am asking is I am trying to research the current topic
> >>>> and have found a lot of view pro and against the method.
> >>>>
> >>>> I am looking at network anomaly detection for the purpose of only
> >>>> alerting as to what has changed on the network and not as a
> >>>> security measure.
> >>>>
> >>>> Thanks.
> >>>>
> >>>> Michael.
> >>>
> >>> _______________________________________________
> >>> clug-talk mailing list
> >>> [email protected]
> >>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> >>> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> >>> **Please remove these lines when replying
> >>
> >> _______________________________________________
> >> clug-talk mailing list
> >> [email protected]
> >> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> >> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> >> **Please remove these lines when replying
> >
> > _______________________________________________
> > clug-talk mailing list
> > [email protected]
> > http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> > Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> > **Please remove these lines when replying
>
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying


_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to