* Problems associated with deploying an intrusion detection system This article is the second in a short series examining vulnerability assessment systems and intrusion detection systems. The first article looked at fundamental concepts and terminology; this one has basic advice on deploying an IDS and covers some aspects of data analysis.IDS sensors can be located anywhere that is interesting to attackers and to defenders. You can install an IDS outside the main perimeter firewall, in the demilitarized zone (DMZ) between the outer firewall and internal firewalls (the typical location of Web servers), behind internal firewalls, and inside critical subnets in a complex topology that segregates sections of the intranet from each other for security reasons.The most important rule when installing an IDS is that you must not rush the installation. You should let the system accumulate knowledge of normal usage patterns so that you can keep false alarms to a minimum.Now, defining “normal” behavior is not as easy as it sounds – a problem that I’m sure parents of teenagers have discovered for themselves. IDSs use statistical or artificial intelligence techniques (these are not equivalent, by the way) to spot deviations from the norm. Definition of the norm – what is expected, repeatable, authorized, unexceptional, and unexceptionable – becomes a critical phase in the deployment of these tools. Put another way, it is important _not_ to allow the baseline to include unexpected, rare, unauthorized, exceptional and exceptionable events into the standard data set. Ah, but here comes a very serious problem indeed: Just how are we to prevent such inclusion of nasty data if there is already criminal activity going on inside the network or if there are attacks in progress while the data are being collected? How would one know that these data were being included in the baseline?This is not a trivial problem; we’re talking about a fundamental difficulty here. If we have no particular expertise in detecting attacks and that’s why we are installing an IDS, then how do we tell if the baseline data are contaminated by attacks and internal shenanigans? I think that one approach to resolving what could become an impasse – a double bind – is to hire outside experts if necessary. Use the services of a managed-security company to establish that the baseline data are in fact acceptable and safe so that the IDS is initialized with clean data. These experts will work with you to verify that you aren’t setting yourselves up with the equivalent of unnoticed back doors through the IDS.Whether you have external experts involved or whether you handle the initialization (training) phase yourself, expect this part of the deployment to take weeks or even months to work out the bugs. You’ll not only have to let the system accumulate baseline data as explained above, but also to refine the alarm settings to minimize both false alarms and false negatives (that is, missing real anomalies or attacks). It is appropriate during this wearing-in phase to suspend alarms so that your staff are not constantly kept on edge by erratic reports from the new system. A continuous series of false alarms could not only be disruptive to productivity but could also desensitize your crew so that they simply ignore real alarms later. Finally, this period of adjustment can serve for development and refinement of the computer-emergency response team – more on that in a later column.In the next short contribution on this subject, I’ll look at some of the factors contributing to effective responses once your IDS notifies you of real attacks or security violations. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe