On Thu, Feb 18, 2010 at 2:59 PM, bofh <goodb...@gmail.com> wrote:
> On Thu, Feb 18, 2010 at 11:48 AM, Laurens Vets <laur...@daemon.be> wrote:
>
>> <interesting & spot on remarks>
>>
>>
>>  Just don't get ISS crap.
>>>
>>> Also, snort is good, but you must know what you're doing.  Our snort box,
>>> running on an old throw away box, and only capturing/analyzing 10 minutes
>>> of
>>> every hour, is giving us *MORE* useful data than half a mil worth of ISS
>>> crap.
>>>
>>
>> Care to elaborate? :)
>>
>> Which parts?  ISS suck so much that even though IBM spent $$ to acquire
> them, IBM is now killing the entire product line?  What kills me (and *TAKE
> NOTE - THOSE WHO REPORT TO PHBs*) is that just a few months ago, we read a
> report on how ISS's IPS took top billing in some magazine or review.

I haven't done my indepth homework on commercial solutions - we're a
small company with a small budget, and have been reviewing various
solutions in the <20k / yr range (trustwave, alert logic, tripwire,
etc). But a good point has been brought up about overall access and
the depth of information available.. I'll have to dig deeper on this.
I don't know if this is a big enough issue for us to overcome the
major plus (offloading the constant analysis, our team is small).


> On what we're doing internally, we're capturing data for 10 minutes every
> hour, and then having the box analyze that data using a variety of tools
> including snort.  It then sends us information on crap such as botnet
> command/control traffic among other things.  Things that we have full
packet
> captures on, that ISS refuses to provide.  We also drop it into a graphing
> tool, so we get nice maps of green/good traffic and red/bad traffic, and
you
> can see that 3 boxes that's talking to all the botnet C&C servers, etc.

Sounds pretty rockin' - I'm sure it took a while to get that sorted
out and up to a usable form.

> We're still working on it, and I hope the new(er) servers we are putting in
> will be able to provide better/more info.  Hopefully we'll buy some really
> beefy servers later in the year so that we can do full analysis.
>
> I'll send a list of the tools we used later, have to ping my guy for it :)

That would be fantastic, I am surely interested in some of the details
of how you have put this together.

Thanks for sharing!

~Jason

Reply via email to