D-Link DFL-2500 User Guide - Page 205

Signature Groups, Automatic Update of Signature, Database

Page 205 highlights

186 Chapter 19. Intrusion Detection System (IDS) 3. The pattern-matching engine searches the payload of the packet for pre-defined signatures. If a match is found, the final level of IDS processing is carried out - the action. If not, the packet is dropped. 4. As this packet will not be accepted by the firewall, the only interesting action is to log the attempted intrusion. 19.3 Signature Groups Usually, several attacks exist for a specific protocol, and it would be most favorable to search for all of them at the same time when analyzing network traffic. To do this, signatures that refer to the same protocol are grouped together. For example, all signatures that refer to the FTP protocol are located in one group, while signatures that refer to POP3 are located in another group. In addition to this, signatures that originate from the same source are also grouped together. This means that signatures that are only valid when originating from the external network are grouped together, while signatures that are valid when originating from the internal network are located in another group. This is done in order to allow more effective processing for the IDS. 19.4 Automatic Update of Signature Database Discovering new attacks is an ongoing process. New attacks are sometimes discovered daily, so it is important to have an up-to-date signature database in order to protect the network from the latest threats. The signature database contains all signatures and signature groups currently recognized by the IDS. A new, updated signature database can be automatically downloaded by the firewall, at a configurable interval. This is done through a HTTP connection to a D-Link server, hosting the latest signature database file. If this signature database file has a newer version than the current, the new signature database will be downloaded, thus replacing the old version. This will ensure that the signature database is always up-to-date. Figure 19.3 is a simplified picture that describes the communication flow when a new signature database file is downloaded: D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

186
Chapter 19. Intrusion Detection System (IDS)
3. The pattern-matching engine searches the payload of the packet for
pre-defined signatures. If a match is found, the final level of IDS
processing is carried out – the action. If not, the packet is dropped.
4. As this packet will not be accepted by the firewall, the only
interesting action is to log the attempted intrusion.
19.3
Signature Groups
Usually, several attacks exist for a specific protocol, and it would be most
favorable to search for all of them at the same time when analyzing network
traffic. To do this, signatures that refer to the same protocol are grouped
together. For example, all signatures that refer to the FTP protocol are
located in one group, while signatures that refer to POP3 are located in
another group. In addition to this, signatures that originate from the same
source are also grouped together. This means that signatures that are only
valid when originating from the external network are grouped together,
while signatures that are valid when originating from the internal network
are located in another group. This is done in order to allow more effective
processing for the IDS.
19.4
Automatic Update of Signature
Database
Discovering new attacks is an ongoing process. New attacks are sometimes
discovered daily, so it is important to have an up-to-date signature
database in order to protect the network from the latest threats. The
signature database contains all signatures and signature groups currently
recognized by the IDS.
A new, updated signature database can be automatically downloaded by
the firewall, at a configurable interval. This is done through a HTTP
connection to a D-Link server, hosting the latest signature database file. If
this signature database file has a newer version than the current, the new
signature database will be downloaded, thus replacing the old version. This
will ensure that the signature database is always up-to-date.
Figure
19.3
is a simplified picture that describes the communication flow
when a new signature database file is downloaded:
D-Link Firewalls User’s Guide