NSS Group logo

Cisco Secure IDS

Section 1 - Detection Engine

Test 1.1 � Attack Recognition

Attacks

Default ARR

Custom ARR

Test 1.1.1 - Backdoors

5

5

5

Test 1.1.2 - DNS

2

1

1

Test 1.1.3 - DOS

11

11

11

Test 1.1.4 - False negatives (modified exploits)

7

5

5

Test 1.1.5 - Finger

4

4

4

Test 1.1.6 - FTP

4

4

4

Test 1.1.7 - HTTP

35

35

35

Test 1.1.8 - ICMP

2

2

2

Test 1.1.9 - Reconnaissance

10

10

10

Test 1.1.10 - RPC

2

1

1

Total

82

78 / 82

78 / 82

 

Test 1.2 � Resistance to False Positives

Pass/Fail

Test 1.2.1 - Audiogalaxy FTP traffic

PASS

Test 1.2.2 - Normal directory traversal (below Web root)

FAIL

Test 1.2.3 - MDAC heap overflow using GET instead of POST

PASS

Test 1.2.4 - Retrieval of Web page containing �suspicious� URLs

PASS

Test 1.2.5 - MSTREAM communications using invalid commands

FAIL

Test 1.2.6 - Normal NetBIOS copy of �suspicious� files

PASS

Test 1.2.7 - Normal NetBIOS traffic

PASS

Test 1.2.8 - POP3 e-mail containing �suspicious� URLs

PASS

Test 1.2.9 - POP3 e-mail with �suspicious� DLL attachment

PASS

Test 1.2.10 - POP3 e-mail with �suspicious� Web page attachment

PASS

Test 1.2.11 - SMTP e-mail transfer containing �suspicious� URLs

PASS

Test 1.2.12 - SMTP e-mail transfer with �suspicious� DLL attachment

PASS

Test 1.2.13 - SMTP e-mail transfer with �suspicious� Web page attachment

PASS

Test 1.2.14 - SNMP V3 packet with invalid request ID

PASS

Total Passed

12 / 14

 

Section 2 - NIDS Performance Under Load

Test 2.1 � UDP traffic to random valid ports

 

25Mbps

 

50Mbps

 

75Mbps

 

100Mbps

 

Max

Test 2.1.1 - 64 byte packet test - max 148,000pps

100%

100%

100%

100%

100Mbps

Test 2.1.2 - 440 byte packet test - max 26,000pps

100%

100%

100%

100%

100Mbps

Test 2.1.3 - 1514 byte packet test - max 8172pps

100%

100%

100%

100%

100Mbps

 

Test 2.2 � HTTP �maximum stress� traffic with no transaction delays

 

25Mbps

 

50Mbps

 

75Mbps

 

100Mbps

 

Max

Test 2.2.1 - Max 250 connections per second - ave packet size 1200 bytes - max 10,000 packets per second

 

100%

 

100%

 

100%

 

100%

 

100Mbps

Test 2.2.2 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second

 

100%

 

100%

 

100%

 

100%

 

100Mbps

Test 2.2.3 - Max 1000 connections per second - ave packet size 440 bytes - max 28,000 packets per second

 

100%

 

100%

 

100%

 

100%

 

100Mbps

Test 2.2.4 - Max 2000 connections per second - ave packet size 350 bytes - max 36,000 packets per second

 

100%

 

100%

 

100%

 

100%

 

100Mbps

 

Test 2.3 � HTTP �maximum stress� traffic with transaction delays

 

25Mbps

 

50Mbps

 

75Mbps

 

100Mbps

 

Max

Test 2.3.1 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second - 10 sec delay - max 5,000 open connections

 

100%

 

100%

 

100%

 

100%

 

100Mbps

Test 2.3.2 - Max 1000 connections per second - ave packet size 440 bytes - max 10,000 packets per second - 10 sec delay - max 5,000 open connections

 

100%

 

100%

 

100%

 

100%

 

100Mbps

 

 

Test 2.4 � Protocol mix

250Mbps

500Mbps

750Mbps

1Gbps

Max

Test 2.4.1 - 72% HTTP (540 byte packets) + 20% FTP + 4% UDP (256 byte packets). Max 38 connections per second - ave packet size 555 bytes - max 2,200 packets per second - max 14 open connections

 

100%

 

100%

 

100%

 

100%

 

100Mbps

 


 

Test 2.5 � Real World traffic

250Mbps

500Mbps

750Mbps

1Gbps

Max

Test 2.5.1 - Pure HTTP (simulated browsing session on NSS Web site). Max 10 connections per second - 3 new users per second - ave packet size 1000 bytes - max 11,000 packets per second

 

100%

 

100%

 

100%

 

100%

 

100Mbps

 

Section 3 - Network IDS Evasion

Test 3.1 � Evasion Baselines

Detected?

Test 3.1.1 - NSS Back Orifice ping

YES

Test 3.1.2 - Back Orifice connection

YES

Test 3.1.3 - FTP CWD root

YES

Test 3.1.4 - Fragroute baseline (test-cgi probe using HEAD)

YES

Test 3.1.5 - ISAPI printer overflow

YES

Test 3.1.6 - Showmount export lists

YES

Test 3.1.7 - Test CGI probe (/cgi-bin/test-cgi)

YES

Test 3.1.8 - PHF remote command execution

YES

Test 3.1.9 - Whisker baseline (test-cgi probe using HEAD)

YES

Total

9 / 9

 

Test 3.2 � Packet Fragmentation/Stream Segmentation

Detected?

Decoded?

Test 3.2.1 - IP fragmentation - ordered 8 byte fragments

 

YES

YES

Test 3.2.2 - IP fragmentation - ordered 24 byte fragments

 

YES

YES

Test 3.2.3 - IP fragmentation - out of order 8 byte fragments

 

YES

YES

Test 3.2.4 - IP fragmentation - ordered 8 byte fragments, duplicate last packet

 

YES

YES

Test 3.2.5 - IP fragmentation - out of order 8 byte fragments, duplicate last packet

YES

YES

Test 3.2.6 - IP fragmentation - ordered 8 byte fragments, reorder fragments in reverse

YES

YES

Test 3.2.7 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour new)

YES

YES

Test 3.2.8 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour old)

YES

YES

Test 3.2.9 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with invalid TCP checksums

YES

YES

Test 3.2.10 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with null TCP control flags

YES

YES

Test 3.2.11 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with requests to resync sequence numbers mid-stream

YES

YES

Test 3.2.12 - TCP segmentation - ordered 1 byte segments, duplicate last packet

YES

YES

Test 3.2.13 - TCP segmentation - ordered 2 byte segments, segment overlap (favour new)

YES

YES

Test 3.2.14 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with out-of-window sequence numbers

YES

YES

Test 3.2.15 - TCP segmentation - out of order 1 byte segments

 

YES

YES

Test 3.2.16 - TCP segmentation - out of order 1 byte segments, interleaved duplicate segments with faked retransmits

YES

YES

Test 3.2.17 - TCP segmentation - ordered 1 byte segments, segment overlap (favour new)

YES

YES

Test 3.2.18 - TCP segmentation - out of order 1 byte segments, PAWS elimination (interleaved dup segments with older TCP timestamp options)

YES

NO

Test 3.2.19 - IP fragmentation - out of order 8 byte fragments, interleaved duplicate packets scheduled for later delivery

YES

YES

Total

19 / 19

18 / 192

 



 

Test 3.3 � URL Obfuscation

Detected?

Decoded?

Test 3.3.1 - URL encoding

YES

YES

Test 3.3.2 - /./ directory insertion

YES

YES

Test 3.3.3 - Premature URL ending

YES

YES

Test 3.3.4 - Long URL

YES

YES

Test 3.3.5 - Fake parameter

YES

YES

Test 3.3.6 - TAB separation

YES

YES

Test 3.3.7 - Case sensitivity

YES

YES

Test 3.3.8 - Windows \ delimiter

YES

YES

Test 3.3.9 - Session splicing

YES

YES

Total

9 / 9

9 / 9

 

Test 3.4 � Miscellaneous Obfuscation Techniques

Detected?

Decoded?

Test 3.4.1 - Altering default ports

YES

YES

Test 3.4.2 - Inserting spaces in FTP command lines

YES

YES

Test 3.4.3 - Inserting non-text Telnet opcodes in FTP data stream

YES

YES

Test 3.4.4 - Altering protocol and RPC PROC numbers

YES

YES

Test 3.4.5 - RPC record fragging

YES

YES

Test 3.4.6 - Polymorphic mutation (ADMmutate)

YES

YES

Total

6 / 6

6 / 6

 

Section 4 - Stateful Operation Test

Test 4.1 � Attack Replay

Alerts?

DOS?

Notes

Test 4.1.1 - Snot traffic

YES

NO

388 alerts raised (considered average).

Test 4.2.2 - Stick Traffic

YES

NO

123 alerts raised (considered reasonable)

 

Test 4.2 � Simultaneous Open Connections (default settings)

Number of open connections

10,000

25,000

50,000

100,000

250,000

500,000

1,000,000

Test 4.2.1 - Attack Detection

PASS

PASS

PASS

FAIL1

FAIL1

FAIL1

FAIL1

Test 4.2.2 - State Preservation

PASS

PASS

PASS

FAIL1

FAIL1

FAIL1

FAIL1

 

Test 4.3 � Simultaneous Open Connections (after tuning)

Number of open connections

10,000

25,000

50,000

100,000

250,000

500,000

1,000,000

Test 4.3.1 - Attack Detection

PASS

PASS

PASS

FAIL1

FAIL1

FAIL1

FAIL1

Test 4.3.2 - State Preservation

PASS

PASS

PASS

FAIL1

FAIL1

FAIL1

FAIL1

 

Notes:

  1. Sensor ceases to detect attacks when open connections pushed beyond the claimed maximum supported for the device (50,000) - requires reboot to reset.  Problem shoudl be resolved by the time this report is published.

  2. No support for PAWS prevented one evasion attempt from being correctly decoded, although suspicious activity (TCP Seg overwrite) was detected

We installed one Cisco IDS-4235 sensor with a default signature set loaded. The network card was the built-in 100/1000 card with custom drivers. 

Basic sensor and event management is adequate out of the box with the IEV and IDM utilities. In larger deployments, however, CiscoWorks would need to be deployed, providing comprehensive multi-sensor management, alert monitoring and reporting capabilities. 

Cisco IDS performed well in our performance tests, demonstrating that it could handle high levels of traffic. The packet capture capabilities with both stateless UDP traffic (all packet sizes) and with normal session-based traffic were flawless throughout, gaining 100% detection rates in all tests 

Stateful operation was fine up to the supported maximum of 50,000 open connections. Beyond that, however, there remains one problem to be solved.

Click here to return to the Cisco questionnaire
Click here to return to the Cisco Review 
Click here to return to the IDS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.