Argus 2.0 wishes
David Brumley
dbrumley at rtfm.stanford.edu
Mon Mar 6 18:32:35 EST 2000
I use argus for much of the same purposes as Russell. Speed and
robustness are our main issues.
cheers,
david
On Tue, 7 Mar 2000, Russell Fulton wrote:
>
> On Mon, 6 Mar 2000 10:03:18 -0800 Carter Bullard
> <cbullard at nortelnetworks.com> wrote:
>
> > There aren't too many illegal TCP bit combinations,
> > and this logic would be very useful, however, the Argus
> > reporting strategy is to have a status bit to report
> > each explicit condition. Each detected combination would
> > require a bit in a status field somewhere, and we don't
> > really have any status bits to spare in the 1.x version
> > of Argus.
>
>
> I'm aware of that, but I have an eye to the future ;-)
>
> >
> > As a result, I am starting to think a lot about
> > Argus 2.0, which will have a completely new Argus record
> > format. I am working on the basics right now.
> > I would like to stay with fixed length records, and 128 - 192
> > byte fixed length binary records are looking very attractive
> > to me. An alternative would be for Argus to output XML
> > formated data, but I would rather have Argus put out binary,
> > and have converters/translators that would generate XML
> > as an example.
>
> I agree with this. We can write utilities to transcribe into transport
> formats if we need them. The key advantage that Argus has is that it
> manages to pack a lot of information into a small record for archival
> purposes.
>
> >
> > I would love to hear what you guys would like to see
> > in Argus 2.0. My list is focused on performance metrics,
> > but enhanced TCP state metrics are things that would be
> > more than reasonable. Any ideas????
> >
>
> Hmmm.... Perhaps the best way of doing this is for some of us to
> describe how we use argus and what we see as its strenghts and
> weaknesses.
>
> I use argus in (at least) 3 distinct ways:
>
> 1/ I have a perl script that reads data from an ra process which
> connects to argus server via a socket. This provides near real time
> detection of network and host scans.
>
> 2/ I have a bunch of overnight jobs which do more detailed analysis of
> the days logs. There is another scan detector which acts as a backup
> to 1 but also picks up very slow scans -- down to a packet or two a day.
> I am currently running a filter that picks up Pretty Park traffic and I
> also log all non http traffic to our many web servers.
>
> 3/ Every now and again I end up trolling back through the logs for some
> special reason, eg. looking for the actual compromise when we find a
> cracked system etc.
>
> So my focus is very much on detecting unwanted activity entering and
> leaving our network, either in (more or less) real time or well after
> the fact.
>
> What I like about argus:
> 1/ Having the ability to process historical data, be it yesterday, last
> week or last month. This is something you don't get with standard NIDS.
> 2/ being able to keep several months data on line on a fairly modest PC
> (OK we also have a fairly modest Internet feed (around 1Mbps) which
> helps.
>
> Weakness: From a NIDS point of view (which isn't what argus was
> designed as) not being able to get into the packet payload is a
> limitation. What I really want is a cross between argus and snort.
>
> Wish List:
>
> 1/ Better reporting of 'anomolous' tcp traffic. One way of doing this
> would be to have a separate record class for things that are not part
> of a 'proper' tcp stream which used the status bits differently.
>
> 2/ a perl client ;-) I have wondered about building perl callouts for a
> client. I have never done anything invovling C/Perl interface so I
> don't know how difficult or otherwise that would be and when it comes
> down to it starting up ra from within perl seems to work OK.
>
> I have toyed with the idea of logging content from addresses that are
> scanning (to look for exploit attempts) but this is probably a waste of
> time since most scanning is automated and any exploit attempts are
> likely to come from somewhere else entirely. To do this you need to be
> able to start your packet capture very quickly (I tried to fork tcpdump
> from my watcher script but it gets real messy trying to keep track of
> processes and kill them off at appropriate times).
>
> I am happy to see argus stay a UNIX tool for the moment.
>
> Cheers, Russell.
>
>
--
#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
David Brumley - Stanford Computer Security - dbrumley at Stanford.EDU
Phone: +1-650-723-2445 WWW: http://www.stanford.edu/~dbrumley
Fax: +1-650-725-9121 PGP: finger dbrumley-pgp at sunset.Stanford.EDU
#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
c:\winnt> secure_nt.exe
Securing NT. Insert Linux boot disk to continue......
"I have opinions, my employer does not."
More information about the argus
mailing list