Betting Sites Not On Gamstop UK 2025Betting Sites Not On GamstopCasino Not On GamstopBest Casinos Not On GamstopNon Gamstop Casinos UKUK Casino Not On Gamstop
NSS Group logo

ISS Proventia A201 Test Results

Section 1 - Detection Engine

Test 1.1 � Attack Recognition

Attacks

Default ARR

Custom ARR

Test 1.1.1 - Backdoors

5

5

5

Test 1.1.2 - DNS

2

2

2

Test 1.1.3 - DOS

11

9

11

Test 1.1.4 - False negatives (modified exploits)

7

7

7

Test 1.1.5 - Finger

4

4

4

Test 1.1.6 - FTP

4

3

4

Test 1.1.7 - HTTP

35

29

35

Test 1.1.8 - ICMP

2

2

2

Test 1.1.9 - Reconnaissance

10

10

10

Test 1.1.10 - RPC

2

1

2

Total

82

72 / 82

82 / 82

Test 1.2 � Resistance to False Positives

Pass/Fail

Test 1.2.1 - Audiogalaxy FTP traffic

PASS

Test 1.2.2 - Normal directory traversal (below Web root)

PASS

Test 1.2.3 - MDAC heap overflow using GET instead of POST

PASS

Test 1.2.4 - Retrieval of Web page containing �suspicious� URLs

PASS

Test 1.2.5 - MSTREAM communications using invalid commands

PASS

Test 1.2.6 - Normal NetBIOS copy of �suspicious� files

PASS

Test 1.2.7 - Normal NetBIOS traffic

PASS

Test 1.2.8 - POP3 e-mail containing �suspicious� URLs

PASS

Test 1.2.9 - POP3 e-mail with �suspicious� DLL attachment

PASS

Test 1.2.10 - POP3 e-mail with �suspicious� Web page attachment

PASS

Test 1.2.11 - SMTP e-mail transfer containing �suspicious� URLs

PASS

Test 1.2.12 - SMTP e-mail transfer with �suspicious� DLL attachment

PASS

Test 1.2.13 - SMTP e-mail transfer with �suspicious� Web page attachment

PASS

Test 1.2.14 - SNMP V3 packet with invalid request ID

PASS

Total Passed

14 / 14

Section 2 - NIDS Performance Under Load

Test 2.1 � UDP traffic to random valid ports

25Mbps

50Mbps

75Mbps

100Mbps

Max

Test 2.1.1 - 64 byte packet test - max 148,000pps

100%

100%

100%

99%

95Mbps

Test 2.1.2 - 440 byte packet test - max 26,000pps

100%

100%

100%

100%

100Mbps

Test 2.1.3 - 1514 byte packet test - max 8172pps

100%

100%

100%

100%

100Mbps

Test 2.2 � HTTP �maximum stress� traffic with no transaction delays

25Mbps

50Mbps

75Mbps

100Mbps

Max

Test 2.2.1 - Max 250 connections per second - ave packet size 1200 bytes - max 10,000 packets per second

100%

100%

100%

100%

100Mbps

Test 2.2.2 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second

100%

100%

100%

100%

100Mbps

Test 2.2.3 - Max 1000 connections per second - ave packet size 440 bytes - max 28,000 packets per second

100%

100%

100%

100%

100Mbps

Test 2.2.4 - Max 2000 connections per second - ave packet size 350 bytes - max 36,000 packets per second

100%

100%

100%

100%

100Mbps

Test 2.3 � HTTP �maximum stress� traffic with transaction delays

25Mbps

50Mbps

75Mbps

100Mbps

Max

Test 2.3.1 - Max 500 connections per second - ave packet size 540 bytes - max 23,000 packets per second - 10 sec delay - max 5,000 open connections

100%

100%

100%

100%

100Mbps

Test 2.3.2 - Max 1000 connections per second - ave packet size 440 bytes - max 10,000 packets per second - 10 sec delay - max 5,000 open connections

100%

100%

100%

100%

100Mbps

��

Test 2.4 � Protocol mix

250Mbps

500Mbps

750Mbps

1Gbps

Max

Test 2.4.1 - 72% HTTP (540 byte packets) + 20% FTP + 4% UDP (256 byte packets). Max 38 connections per second - ave packet size 555 bytes - max 2,200 packets per second - max 14 open connections

100%

100%

100%

100%

100Mbps


Test 2.5 � Real World traffic

250Mbps

500Mbps

750Mbps

1Gbps

Max

Test 2.5.1 - Pure HTTP (simulated browsing session on NSS Web site). Max 10 connections per second - 3 new users per second - ave packet size 1000 bytes - max 11,000 packets per second

100%

100%

100%

100%

100Mbps

Section 3 - Network IDS Evasion

Test 3.1 � Evasion Baselines

Detected?

Test 3.1.1 - NSS Back Orifice ping

YES

Test 3.1.2 - Back Orifice connection

YES

Test 3.1.3 - FTP CWD root

YES

Test 3.1.4 - Fragroute baseline (test-cgi probe using HEAD)

YES

Test 3.1.5 - ISAPI printer overflow

YES

Test 3.1.6 - Showmount export lists

YES

Test 3.1.7 - Test CGI probe (/cgi-bin/test-cgi)

YES

Test 3.1.8 - PHF remote command execution

YES

Test 3.1.9 - Whisker baseline (test-cgi probe using HEAD)

YES

Total

9 / 9

Test 3.2 � Packet Fragmentation/Stream Segmentation

Detected?

Decoded?

Test 3.2.1 - IP fragmentation - ordered 8 byte fragments

YES

YES

Test 3.2.2 - IP fragmentation - ordered 24 byte fragments

YES

YES

Test 3.2.3 - IP fragmentation - out of order 8 byte fragments

YES

YES

Test 3.2.4 - IP fragmentation - ordered 8 byte fragments, duplicate last packet

YES

YES

Test 3.2.5 - IP fragmentation - out of order 8 byte fragments, duplicate last packet

YES

YES

Test 3.2.6 - IP fragmentation - ordered 8 byte fragments, reorder fragments in reverse

YES

YES

Test 3.2.7 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour new)

YES

YES

Test 3.2.8 - IP fragmentation - ordered 16 byte fragments, fragment overlap (favour old)

YES

YES

Test 3.2.9 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with invalid TCP checksums

YES

YES

Test 3.2.10 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with null TCP control flags

YES

YES

Test 3.2.11 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with requests to resync sequence numbers mid-stream

YES

YES

Test 3.2.12 - TCP segmentation - ordered 1 byte segments, duplicate last packet

YES

YES

Test 3.2.13 - TCP segmentation - ordered 2 byte segments, segment overlap (favour new)

YES

YES

Test 3.2.14 - TCP segmentation - ordered 1 byte segments, interleaved duplicate segments with out-of-window sequence numbers

YES

YES

Test 3.2.15 - TCP segmentation - out of order 1 byte segments

YES

YES

Test 3.2.16 - TCP segmentation - out of order 1 byte segments, interleaved duplicate segments with faked retransmits

YES

YES

Test 3.2.17 - TCP segmentation - ordered 1 byte segments, segment overlap (favour new)

YES

YES

Test 3.2.18 - TCP segmentation - out of order 1 byte segments, PAWS elimination (interleaved dup segments with older TCP timestamp options)

YES

YES

Test 3.2.19 - IP fragmentation - out of order 8 byte fragments, interleaved duplicate packets scheduled for later delivery

YES

YES

Total

19 / 19

19 / 19

��



Test 3.3 � URL Obfuscation

Detected?

Decoded?

Test 3.3.1 - URL encoding

YES

YES

Test 3.3.2 - /./ directory insertion

YES

YES

Test 3.3.3 - Premature URL ending

YES

YES

Test 3.3.4 - Long URL

YES

YES

Test 3.3.5 - Fake parameter

YES

YES

Test 3.3.6 - TAB separation

YES

YES

Test 3.3.7 - Case sensitivity

YES

YES

Test 3.3.8 - Windows \ delimiter

YES

YES

Test 3.3.9 - Session splicing

YES

YES

Total

9 / 9

9 / 9

Test 3.4 � Miscellaneous Obfuscation Techniques

Detected?

Decoded?

Test 3.4.1 - Altering default ports

YES

YES

Test 3.4.2 - Inserting spaces in FTP command lines

YES

YES

Test 3.4.3 - Inserting non-text Telnet opcodes in FTP data stream

YES

YES

Test 3.4.4 - Altering protocol and RPC PROC numbers

YES

YES

Test 3.4.5 - RPC record fragging

YES

YES

Test 3.4.6 - Polymorphic mutation (ADMmutate)

YES

YES

Total

6 / 6

6 / 6

Section 4 - Stateful Operation Test

Test 4.1 � Attack Replay

Alerts?

DOS?

Notes

Test 4.1.1 - Snot traffic

YES

NO

125 alerts raised (considered reasonable).

Test 4.2.2 - Stick Traffic

YES

NO

170 alerts raised (considered reasonable)

Test 4.2 � Simultaneous Open Connections (default settings)

Number of open connections

10,000

25,000

50,000

100,000

250,000

500,000

1,000,000

Test 4.2.1 - Attack Detection

PASS

PASS

PASS

PASS

PASS

FAIL1

FAIL1

Test 4.2.2 - State Preservation

PASS

PASS

PASS

PASS

PASS

FAIL1

FAIL1

Test 4.3 � Simultaneous Open Connections (after tuning)

Number of open connections

10,000

25,000

50,000

100,000

250,000

500,000

1,000,000

Test 4.3.1 - Attack Detection

PASS

PASS

PASS

PASS

PASS

FAIL2

FAIL2

Test 4.3.2 - State Preservation

PASS

PASS

PASS

PASS

PASS

FAIL2

FAIL2

Notes:

  1. Sensor actually can track pre-existing connections (not new ones) beyond the 250,000 limit, since it stops tracking new connections once the limit is reached and does not age out old ones.

  2. Support for one million connections requires a parameter change - max 250,000 connections supported with default settings. However, we were unable to tune for additional open connections due to the limited RAM (1GB) in the Proventia A201 appliance.

We installed one Proventia A201 appliance reporting to a single SiteProtector server. We used the Evaluation policy, which has all attack signatures enabled (apart from port probes) and some key audit signatures.

Centralised management and alerting capabilities are excellent when using the SiteProtector Console. Both sensor management and policy deployment are well catered for - one of the best we have seen - and although the move to a three-tiered architecture has introduced occasional slight delays in the �real time� alerting, it has made the product much more robust and scalable in larger deployments.�

Analysis and reporting has been improved by several orders of magnitude with this release, with an intuitive interface providing a quick and easy means of drilling down into the underlying data.

Any number of custom views can be saved and printed or exported. The use of complete evidence logs provide the means for more detailed forensic analysis if required. When using the optional Fusion module, event escalation and correlation capabilities are introduced providing enormous assistance to the administrator who has to deal with large volumes of data.�

Attack recognition was excellent using the Evaluation security policy, turning in one of the better recognition rates of the products tested out of the box. ISS were also one of the quickest to respond to the missing signatures, turning out a new signature pack which was made available to customers in less than 24 hours, and which then provided a 100 per cent recognition rate. Resistance to false positives also appeared to be very good, and we noted a significant reduction in �noise� in this release, with fewer test cases raising several alerts for a single exploit. All our �false negative� (modified exploit) cases were detected correctly, demonstrating that the RealSecure signatures are designed to detect the underlying vulnerability rather than a specific exploit.

Resistance to known evasion techniques was excellent, with Proventia being one of the few products to collect a clean sheet across the board in our IDS evasion tests. Fragroute, Whisker, ADMmutate and even RPC record fragging all failed to trick Proventia into ignoring valid attacks.�

Stateful operation was also very good, with Proventia tracking and maintaining state on 250,000 connections with the default settings. Unfortunately, it was not possible to tune the appliance to go beyond this due to the limit of 1GB installed RAM. Note that Proventia is designed to ignore new connections once the limit is exceeded, but does not age out old ones. We actually prefer old connections to be aged out, since the dropping of new connections does provide an easier method of evasion for the attacker.�

Resistance to Stick and Snot was acceptable, raising a fairly small number of alerts but never succumbing to a DoS condition and with no flooding at the Console. �

In terms of detection rates, Proventia sensor turned in some excellent results, demonstrating that it could handle almost all of our test traffic loads up to 100Mbps. In our more extreme tests - our wire speed 64 byte packet test, for example - the performance did just begin to tail off at wire speed, but even at this extreme load the device managed an excellent 95Mbps.

The Proventia sensor performed impeccably in all our �real world� tests, however, and so for all �normal� background traffic loads we feel quite happy to rate it at a minimum of 100Mbps (note that ISS actually claims 200Mbps for this device).

Click here to return to the ISS Proventia A201 Review
Click here to return to the ISS Proventia A201 questionnaire
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.