Research shows that intrusion prevention systems (IPSs) are not as effective at detecting malicious activity as many organisations that have deployed them may think.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Almost 78% of IPS systems tested by the University of South Wales failed to detect 34%-49% of attacks that used advanced evasion techniques (AETs) to hide attacks exploiting a well-known vulnerability.
An AET typically combines IPS evasion techniques to create more stealthy attacks that are dynamic, delivered over several layers of a network and harder to detect and block.
By breaking up attack payloads into multiple packets across multiple network layers, most IPSs cannot recognise malicious payloads.
AETs are a relatively new hacking techniques that enable malware, viruses, worms and other security threats to bypass next-generation firewalls and IPSs.
A research report launched at Infosecurity Europe 2013 in London presents the findings of an experiment that tested a number of evasion techniques against a set of well-known IPSs.
Read more about AETs
The experiment made use of the open source Evader tool created by security firm Stonesoft to generate the attacks and their evasions.
The IPSs used in the experiment were drawn from Sourcefire, IBM, PaloAlto, Fortigate, McAfee, Checkpoint, Juniper, Cisco and Stonesoft.
The IPS were all up-to-date and configured, using a best configuration scenario. This ensured all attack attempts against two well-known vulnerabilities were blocked if no AETs were used.
However, when AETs were used against the first vulnerability (CVE-2008-4250) between 0.072% and 6.669% of attacks were successful.
Most IPS tools detected 98.5% of the attacks with 1.5% or less of the attacks using evasion techniques being successful.
“While 1.5% may not sound like a lot, it certainly would matter if a multi-million pound piece of IP were at stake,” said Andrew Blyth, co-author of the report and professor of information security at the University of South Wales.
The first experiment used 2,759 attack combinations, which means a 6.669% failure rate equates to 184 successful attacks and 1.5% to around 41. Against the best performing IPS, two attacks were successful.
The best two systems during testing were found to be Cisco, with a success rate for detection of 99.928%; and Stonesoft, with a 99.565% rate.
Results were normalised to allow for the different speeds of the IPS appliances used in the experiment.
|IPS||CVE-2008-4250 Successful evasion(s)||Successful evasion(s) %||Detection rate %|
The most dramatic test results emerged with the second vulnerability (CVE-2004-1315) when between 0.265% and 49.431% of AETs were successful, which equates to between seven and 1,304.
Only two suppliers achieved a detection rate of 99% or higher. These were Fortigate and Stonesoft, with a detection rate of 99.242% and 99.735%, respectively.
Comparing the results of experiment one and two show that IPS tools are generally better at detecting standard buffer overrun type attacks than attacks aimed at web services, said Blyth.
Across both experiments, Fortigate – with 98.695% and 99.242% – and Stonesoft – with 99.565% and 99.735% – generally fared best overall, scoring high detection rates.
|IPS||CVE-2004-1315 Successful evasion(s)||Successful evasion(s) %||Detection rate %|
Cause for concern
The findings provide some cause for concern and should be a warning to organisations that rely on simple and/or outdated implementations of IPS, the research report said.
The report notes that the experiment shows that some of the IPS installed and available offer limited protection against attacks using advanced evasion techniques.
The key requirement of a successful system is to provide the broadest possible protection for a network. Based on the experiments, Stonesoft’s IPS offers the best protection, the report said.
However, the experiments show that using multiple IPS tools in combination is likely to provide the best and most comprehensive protection as none of the systems achieved a 100% detection rate, said Blyth.
“Having multiple protection devices on one network, whether it is firewalls, IPS or routers, is a good network defence principal to adhere to,” he said.
Defence in depth
When it comes to IPS, defence in depth is a good strategy because the experiments show that most IPS tools have a long way to go, particularly in terms of securing web applications, said Blyth.
If organisations were to buy only one IPS, then it should be Stonesoft, but if they are going for defence in depth, the three they should be looking at are Cisco, Fortigate and Stonesoft, the top performers across both experiments, he said.
Blyth said Evader is a standard open source tool that can be downloaded by any organisation and used to replicate the experiments.
“IPS suppliers cannot be held to account in terms of zero-day exploits, but they have a due-diligence requirement in testing their products to ensure that what they are doing is the best in the light of public open source knowledge as tested by Evader,” he said.