![]() |
Cisco Secure IDS
Test 1.1 � Attack Recognition |
Attacks |
Default ARR |
Custom ARR |
Test 1.1.1 - Backdoors |
5 |
5 |
5 |
Test 1.1.2 - DNS |
2 |
1 |
1 |
Test 1.1.3 - DOS |
11 |
11 |
11 |
Test 1.1.4 - False negatives (modified exploits) |
7 |
5 |
5 |
Test 1.1.5 - Finger |
4 |
4 |
4 |
Test 1.1.6 - FTP |
4 |
4 |
4 |
Test 1.1.7 - HTTP |
35 |
35 |
35 |
Test 1.1.8 - ICMP |
2 |
2 |
2 |
Test 1.1.9 - Reconnaissance |
10 |
10 |
10 |
Test 1.1.10 - RPC |
2 |
1 |
1 |
Total |
82 |
78 / 82 |
78 / 82 |
Test 1.2 � Resistance to False Positives |
Pass/Fail |
Test 1.2.1 - Audiogalaxy FTP traffic |
PASS |
Test 1.2.2 - Normal directory traversal (below Web root) |
FAIL |
Test 1.2.3 - MDAC heap overflow using GET instead of POST |
PASS |
Test 1.2.4 - Retrieval of Web page containing �suspicious� URLs |
PASS |
Test 1.2.5 - MSTREAM communications using invalid commands |
FAIL |
Test 1.2.6 - Normal NetBIOS copy of �suspicious� files |
PASS |
Test 1.2.7 - Normal NetBIOS traffic |
PASS |
Test 1.2.8 - POP3 e-mail containing �suspicious� URLs |
PASS |
Test 1.2.9 - POP3 e-mail with �suspicious� DLL attachment |
PASS |
Test 1.2.10 - POP3 e-mail with �suspicious� Web page attachment |
PASS |
Test 1.2.11 - SMTP e-mail transfer containing �suspicious� URLs |
PASS |
Test 1.2.12 - SMTP e-mail transfer with �suspicious� DLL attachment |
PASS |
Test 1.2.13 - SMTP e-mail transfer with �suspicious� Web page attachment |
PASS |
Test 1.2.14 - SNMP V3 packet with invalid request ID |
PASS |
Total Passed |
12 / 14 |
Section 2 - NIDS Performance Under Load
Test 2.1 � UDP traffic to random valid ports |
25Mbps |
50Mbps |
75Mbps |
100Mbps |
Max |
Test 2.1.1 - 64 byte packet test - max 148,000pps |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.1.2 - 440 byte packet test - max 26,000pps |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.1.3 - 1514 byte packet test - max 8172pps |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.2 � HTTP �maximum stress� traffic with no transaction delays |
25Mbps |
50Mbps |
75Mbps |
100Mbps |
Max |
Test 2.2.1 - Max 250 connections per second - ave packet size 1200 bytes - max 10,000 packets per second |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.2.2 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.2.3 - Max 1000 connections per second - ave packet size 440 bytes - max 28,000 packets per second |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.2.4 - Max 2000 connections per second - ave packet size 350 bytes - max 36,000 packets per second |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.3 � HTTP �maximum stress� traffic with transaction delays |
25Mbps |
50Mbps |
75Mbps |
100Mbps |
Max |
Test 2.3.1 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second - 10 sec delay - max 5,000 open connections |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.3.2 - Max 1000 connections per second - ave packet size 440 bytes - max 10,000 packets per second - 10 sec delay - max 5,000 open connections |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.4 � Protocol mix |
250Mbps |
500Mbps |
750Mbps |
1Gbps |
Max |
Test 2.4.1 - 72% HTTP (540 byte packets) + 20% FTP + 4% UDP (256 byte packets). Max 38 connections per second - ave packet size 555 bytes - max 2,200 packets per second - max 14 open connections |
100% |
100% |
100% |
100% |
100Mbps |
Test 2.5 � Real World traffic |
250Mbps |
500Mbps |
750Mbps |
1Gbps |
Max |
Test 2.5.1 - Pure HTTP (simulated browsing session on NSS Web site). Max 10 connections per second - 3 new users per second - ave packet size 1000 bytes - max 11,000 packets per second |
100% |
100% |
100% |
100% |
100Mbps |
Section 3 - Network IDS Evasion
Test 3.1 � Evasion Baselines |
Detected? |
Test 3.1.1 - NSS Back Orifice ping |
YES |
Test 3.1.2 - Back Orifice connection |
YES |
Test 3.1.3 - FTP CWD root |
YES |
Test 3.1.4 - Fragroute baseline (test-cgi probe using HEAD) |
YES |
Test 3.1.5 - ISAPI printer overflow |
YES |
Test 3.1.6 - Showmount export lists |
YES |
Test 3.1.7 - Test CGI probe (/cgi-bin/test-cgi) |
YES |
Test 3.1.8 - PHF remote command execution |
YES |
Test 3.1.9 - Whisker baseline (test-cgi probe using HEAD) |
YES |
Total |
9 / 9 |
Test 3.2 � Packet Fragmentation/Stream Segmentation |
Detected? |
Decoded? |
Test 3.2.1 - IP fragmentation - ordered 8 byte fragments
|
YES |
YES |
Test 3.2.2 - IP fragmentation - ordered 24 byte fragments
|
YES |
YES |
Test 3.2.3 - IP fragmentation - out of order 8 byte fragments
|
YES |
YES |
Test 3.2.4 - IP fragmentation - ordered 8 byte fragments, duplicate last packet
|
YES |
YES |
Test 3.2.5 - IP fragmentation - out of order 8 byte fragments, duplicate last packet |
YES |
YES |
Test 3.2.6 - IP fragmentation - ordered 8 byte fragments, reorder fragments in reverse |
YES |
YES |
Test 3.2.7 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour new) |
YES |
YES |
Test 3.2.8 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour old) |
YES |
YES |
Test 3.2.9 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with invalid TCP checksums |
YES |
YES |
Test 3.2.10 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with null TCP control flags |
YES |
YES |
Test 3.2.11 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with requests to resync sequence numbers mid-stream |
YES |
YES |
Test 3.2.12 - TCP segmentation - ordered 1 byte segments, duplicate last packet |
YES |
YES |
Test 3.2.13 - TCP segmentation - ordered 2 byte segments, segment overlap (favour new) |
YES |
YES |
Test 3.2.14 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with out-of-window sequence numbers |
YES |
YES |
Test 3.2.15 - TCP segmentation - out of order 1 byte segments
|
YES |
YES |
Test 3.2.16 - TCP segmentation - out of order 1 byte segments, interleaved duplicate segments with faked retransmits |
YES |
YES |
Test 3.2.17 - TCP segmentation - ordered 1 byte segments, segment overlap (favour new) |
YES |
YES |
Test 3.2.18 - TCP segmentation - out of order 1 byte segments, PAWS elimination (interleaved dup segments with older TCP timestamp options) |
YES |
NO |
Test 3.2.19 - IP fragmentation - out of order 8 byte fragments, interleaved duplicate packets scheduled for later delivery |
YES |
YES |
Total |
19 / 19 |
18 / 192 |
Test 3.3 � URL Obfuscation |
Detected? |
Decoded? |
Test 3.3.1 - URL encoding |
YES |
YES |
Test 3.3.2 - /./ directory insertion |
YES |
YES |
Test 3.3.3 - Premature URL ending |
YES |
YES |
Test 3.3.4 - Long URL |
YES |
YES |
Test 3.3.5 - Fake parameter |
YES |
YES |
Test 3.3.6 - TAB separation |
YES |
YES |
Test 3.3.7 - Case sensitivity |
YES |
YES |
Test 3.3.8 - Windows \ delimiter |
YES |
YES |
Test 3.3.9 - Session splicing |
YES |
YES |
Total |
9 / 9 |
9 / 9 |
Test 3.4 � Miscellaneous Obfuscation Techniques |
Detected? |
Decoded? |
Test 3.4.1 - Altering default ports |
YES |
YES |
Test 3.4.2 - Inserting spaces in FTP command lines |
YES |
YES |
Test 3.4.3 - Inserting non-text Telnet opcodes in FTP data stream |
YES |
YES |
Test 3.4.4 - Altering protocol and RPC PROC numbers |
YES |
YES |
Test 3.4.5 - RPC record fragging |
YES |
YES |
Test 3.4.6 - Polymorphic mutation (ADMmutate) |
YES |
YES |
Total |
6 / 6 |
6 / 6 |
Section 4 - Stateful Operation Test
Test 4.1 � Attack Replay |
Alerts? |
DOS? |
Notes |
Test 4.1.1 - Snot traffic |
YES |
NO |
388 alerts raised (considered average). |
Test 4.2.2 - Stick Traffic |
YES |
NO |
123 alerts raised (considered reasonable) |
Test 4.2 � Simultaneous Open Connections (default settings) |
|||||||
Number of open connections |
10,000 |
25,000 |
50,000 |
100,000 |
250,000 |
500,000 |
1,000,000 |
Test 4.2.1 - Attack Detection |
PASS |
PASS |
PASS |
FAIL1 |
FAIL1 |
FAIL1 |
FAIL1 |
Test 4.2.2 - State Preservation |
PASS |
PASS |
PASS |
FAIL1 |
FAIL1 |
FAIL1 |
FAIL1 |
Test 4.3 � Simultaneous Open Connections (after tuning) |
|||||||
Number of open connections |
10,000 |
25,000 |
50,000 |
100,000 |
250,000 |
500,000 |
1,000,000 |
Test 4.3.1 - Attack Detection |
PASS |
PASS |
PASS |
FAIL1 |
FAIL1 |
FAIL1 |
FAIL1 |
Test 4.3.2 - State Preservation |
PASS |
PASS |
PASS |
FAIL1 |
FAIL1 |
FAIL1 |
FAIL1 |
Notes:
We installed one Cisco IDS-4235 sensor with a default signature set loaded. The network card was the built-in 100/1000 card with custom drivers. Basic sensor and event management is adequate out of the box with the IEV and IDM utilities. In larger deployments, however, CiscoWorks would need to be deployed, providing comprehensive multi-sensor management, alert monitoring and reporting capabilities. Cisco IDS performed well in our performance tests, demonstrating that it could handle high levels of traffic. The packet capture capabilities with both stateless UDP traffic (all packet sizes) and with normal session-based traffic were flawless throughout, gaining 100% detection rates in all tests Stateful operation was fine up to the supported maximum of 50,000 open connections. Beyond that, however, there remains one problem to be solved. Click here
to return to the Cisco questionnaire |
Send mail to webmaster
with questions or
|