Betting Sites Not On Gamstop UK 2025Betting Sites Not On GamstopCasino Not On GamstopNon Gamstop Casinos UKBest Casinos Not On Gamstop
NSS Group logo

NSW Dragon Sensor 4.1

Network load

0%

25%

50%

75%

100%

Background traffic load – 64 byte packets (packets per second)

0

37000

74000

110000

148000

IP port scan

Y

Y

Y

Y

N/A1

SYN stealth port scan

Y

Y

Y

Y

N/A1

FIN stealth port scan

Y

Y

Y

Y

N/A1

UDP port scan

Y

Y

Y

Y

N/A1

Nmap remote OS ID attempt 2

Y

Y

Y

Y

N/A1

CyberCop scan

N

N

N

N

N/A1

Chargen attack

N

N

N

N

N/A1

SYN flood DoS

N

N

N

N

N/A1

WinNuke OOB

N

N

N

N

N/A1

BackOrifice probe

Y

Y

Y

Y

N/A1

FTP Bounce attack

Y

Y

Y

Y

N/A1

Web PHF attack

Y

Y

Y

Y

N/A1

Bonk 3

Y

Y

Y

Y

N/A1

Land 4

Y

Y

Y

Y

N/A1

Nestea 3

Y

Y

Y

Y

N/A1

NewTear 3

Y

Y

Y

Y

N/A1

SYNdrop 3

Y

Y

Y

Y

N/A1

Teardrop

Y

Y

Y

Y

N/A1

Jolt2

N

N

N

N

N/A1

High volume boping/bosting (10,000 pings)

100%

100%

32%

N/A1

N/A1

Notes:

1.The sensor became unreliable at 75 per cent load and crashed at 100 per cent. The vendor believes it to be a problem with the 3Com card or driver under Red Hat Linux 6.2 and is working on a solution at the time of writing.

2.Reported as TCP flags

3.Reported as fragment overlap

4.Reported as same IP address

IDS Evasion - fragrouter

Detected?

Ordered 8-byte IP fragments

Y

Ordered 24-byte IP fragments

Y

Ordered 8-byte IP fragments, one fragment sent out of order

Y

Ordered 8-byte IP fragments, duplicating the penultimate fragment in each packet

N

Out of order 8-byte IP fragments, duplicating the penultimate fragment in each packet

N

Ordered 8-byte IP fragments, sending the marked last fragment first

P

Ordered 16-byte IP fragments, preceding each fragment with an 8-byte null data fragment that overlaps the latter half of it

N

IDS Evasion – Whisker

Detected?

Mode 1: URL encoding

P

Mode 2: /./ directory insertion

P

Mode 3: Premature URL ending

P

Mode 5: Fake parameter

P

Mode 7: Case sensitivity

P

Mode 8: Windows \ delimiter


Dragon Sensor provides no real-time monitoring of attacks – it all has to be done via reporting. Nor it is easy to clear down or filter out old attacks, making it very cumbersome to try and determine the exact number of attacks detected.

Despite having the biggest library of signatures (over 1000) of the products tested, Dragon surprised us by missing Chargen, SYN Flood, WinNuke and Jolt2 attacks, and also offered incomplete fragmentation reassembly (missing some of the fragrouter attacks), though all the Whisker IDS evasion attacks were detected effectively.

Unfortunately we noticed erratic behaviour of the Sensor at network loads in excess of 50 per cent, and a complete failure of the Sensor (causing a total machine crash) at 100 per cent loads. This is a bizarre fault to have in a shipping product, and we believe that we experienced a rare configuration problem that may be related to the combination of 3Com 3C905 cards under Red Hat Linux 6.2. The vendor is working on a solution at the time of writing.

We would not dismiss Dragon Sensor completely because of this apparently isolated problem, but would certainly advocate careful evaluation in your own environment prior to purchase.

Click here to return to the NSW Dragon Sensor Review
Click here to return to the NSW Dragon Sensor Questionnaire
Click here to return to the IDS Index Section

Send mail to [email protected] with
questions or comments about this web site.
Copyright � 1991-2001 The NSS Group.
All rights reserved.

Featured sites