Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems

ISO/IEC 18043:2006 provides guidance for an organization that decides to include an intrusion detection capability within its IT infrastructure. It is a "how to" for managers and users who want to: understand the benefits and limitations of IDS; develop a strategy and implementation plan for IDS; effectively manage the outputs of an IDS; integrate intrusion detection into the organization's security practices; and understand the legal and privacy issues involved in the deployment of IDS. ISO/IEC 18043:2006 provides information that will facilitate collaboration among organizations using IDS. The common framework it provides will help make it easier for organizations to exchange information about intrusions that cut across organizational boundaries. ISO/IEC 18043:2006 provides a brief overview of the intrusion detection process; discusses what an IDS can and cannot do; provides a checklist that helps identify the best IDS features for a specific IT environment; describes various deployment strategies; provides guidance on managing alerts from IDSs; and discusses management and legal considerations.

Technologies de l'information — Techniques de sécurité — Sélection, déploiement et opérations des systèmes de détection d'intrusion

General Information

Status
Withdrawn
Publication Date
18-Jun-2006
Withdrawal Date
18-Jun-2006
Current Stage
9599 - Withdrawal of International Standard
Start Date
11-Feb-2015
Completion Date
30-Oct-2025
Ref Project

Relations

Standard
ISO/IEC 18043:2006 - Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection systems
English language
46 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 18043:2006
Russian language
12 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 18043:2006 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems". This standard covers: ISO/IEC 18043:2006 provides guidance for an organization that decides to include an intrusion detection capability within its IT infrastructure. It is a "how to" for managers and users who want to: understand the benefits and limitations of IDS; develop a strategy and implementation plan for IDS; effectively manage the outputs of an IDS; integrate intrusion detection into the organization's security practices; and understand the legal and privacy issues involved in the deployment of IDS. ISO/IEC 18043:2006 provides information that will facilitate collaboration among organizations using IDS. The common framework it provides will help make it easier for organizations to exchange information about intrusions that cut across organizational boundaries. ISO/IEC 18043:2006 provides a brief overview of the intrusion detection process; discusses what an IDS can and cannot do; provides a checklist that helps identify the best IDS features for a specific IT environment; describes various deployment strategies; provides guidance on managing alerts from IDSs; and discusses management and legal considerations.

ISO/IEC 18043:2006 provides guidance for an organization that decides to include an intrusion detection capability within its IT infrastructure. It is a "how to" for managers and users who want to: understand the benefits and limitations of IDS; develop a strategy and implementation plan for IDS; effectively manage the outputs of an IDS; integrate intrusion detection into the organization's security practices; and understand the legal and privacy issues involved in the deployment of IDS. ISO/IEC 18043:2006 provides information that will facilitate collaboration among organizations using IDS. The common framework it provides will help make it easier for organizations to exchange information about intrusions that cut across organizational boundaries. ISO/IEC 18043:2006 provides a brief overview of the intrusion detection process; discusses what an IDS can and cannot do; provides a checklist that helps identify the best IDS features for a specific IT environment; describes various deployment strategies; provides guidance on managing alerts from IDSs; and discusses management and legal considerations.

ISO/IEC 18043:2006 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC 18043:2006 has the following relationships with other standards: It is inter standard links to ISO/IEC 27039:2015. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC 18043:2006 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 18043
First edition
2006-06-15
Information technology β€” Security
techniques β€” Selection, deployment and
operations of intrusion detection systems
Technologies de l'information β€” Techniques de sΓ©curitΓ© β€” SΓ©lection,
déploiement et opérations des systèmes de détection d'intrusion

Reference number
Β©
ISO/IEC 2006
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.

Β©  ISO/IEC 2006
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 β€’ CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii Β© ISO/IEC 2006 – All rights reserved

Contents Page
Foreword. iv
Introduction . v
1 Scope .1
2 Terms and definitions .1
3 Background.4
4 General.5
5 Selection .6
5.1 Information Security Risk Assessment.7
5.2 Host or Network IDS .7
5.3 Considerations.7
5.4 Tools that complement IDS .13
5.5 Scalability .17
5.6 Technical support.17
5.7 Training.17
6 Deployment .18
6.1 Staged Deployment .18
7 Operations .22
7.1 IDS Tuning.22
7.2 IDS Vulnerabilities .22
7.3 Handling IDS Alerts .22
7.4 Response Options .25
7.5 Legal Considerations .26
Annex A (informative) Intrusion Detection System (IDS): Framework and Issues to be Considered .27
A.1 Introduction to Intrusion Detection.27
A.2 Types of intrusions and attacks.28
A.3 Generic Model of Intrusion Detection Process.29
A.4 Types of IDS .35
A.5 Architecture.38
A.6 Management of an IDS .39
A.7 Implementation and Deployment Issues.42
A.8 Intrusion Detection Issues.44
Bibliography .46
Β© ISO/IEC 2006 – All rights reserved iii

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 18043 was prepared by Joint Technical Committee ISO/IEC JTC 1 Information technology,
Subcommittee SC 27, IT Security techniques.
Legal notice
The National Institute of Standards and Technology (NIST), hereby grant non-exclusive license to ISO/IEC to
use the NIST Special Publication on Intrusion Detection Systems (SP800-31) in the development of the
ISO/IEC 18043 International Standard. However, the NIST retains the right to use, copy, distribute, or modify
the SP800-31 as they see fit.
iv Β© ISO/IEC 2006 – All rights reserved

Introduction
Organizations should not only know when, if, and how an intrusion of their network, system or application
occurs, they also should know what vulnerability was exploited and what safeguards or appropriate risk
treatment options (i.e. risk transfer, risk acceptance, risk avoidance) should be implemented to prevent similar
intrusions in the future. Organizations should also recognize and deflect cyber-based intrusions. This requires
an analysis of host and network traffic and/or audit trails for attack signatures or specific patterns that usually
indicate malicious or suspicious intent. In the mid-1990s, organizations began to use Intrusion Detection
Systems (IDS) to fulfil these needs. The general use of IDS continues to expand with a wider range of IDS
products being made available to satisfy an increasing level of organizational demands for advanced intrusion
detection capability.
In order for an organization to derive the maximum benefits from IDS, the process of IDS selection,
deployment, and operations should be carefully planned and implemented by properly trained and
experienced personnel. In the case where this process is achieved, then IDS products can assist an
organization in obtaining intrusion information and can serve as an important security device within the overall
information and communications technology (ICT) infrastructure.
This International Standard provides guidelines for effective IDS selection, deployment and operation, as well
as fundamental knowledge about IDS. It is also applicable to those organizations that are considering
outsourcing their intrusion detection capabilities. Information about outsourcing service level agreements can
be found in the IT Service Management (ITSM) processes based on ISO/IEC 20000.

Β© ISO/IEC 2006 – All rights reserved v

INTERNATIONAL STANDARD ISO/IEC 18043:2006(E)

Information technology β€” Security techniques β€” Selection,
deployment and operations of intrusion detection systems
1 Scope
This International Standard provides guidelines to assist organizations in preparing to deploy Intrusion
Detection System (IDS). In particular, it addresses the selection, deployment and operations of IDS. It also
provides background information from which these guidelines are derived.
This International Standard is intended to be helpful to
a) an organization in satisfying the following requirements of ISO/IEC 27001:
⎯ The organization shall implement procedures and other controls capable of enabling prompt
detection of and response to security incidents.
⎯ The organization shall execute monitoring and review procedures and other controls to properly
identify attempted and successful security breaches and incidents.
b) an organization in implementing controls that meet the following security objectives of ISO/IEC 17799:
⎯ To detect unauthorized information processing activities.
⎯ Systems should be monitored and information security events should be recorded. Operator logs and
fault logging should be used to ensure information system problems are identified.
⎯ An organization should comply with all relevant legal requirements applicable to its monitoring and
logging activities.
⎯ System monitoring should be used to check the effectiveness of controls adopted and to verify
conformity to an access policy model.
An organization should recognize that deploying IDS is not a sole and/or exhaustive solution to satisfy or meet
the above-cited requirements. Furthermore, this International Standard is not intended as criteria for any kind
of conformity assessments, e.g., Information Security Management System (ISMS) certification, IDS services
or products certification.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
attack
attempts to destroy, expose, alter, or disable an Information System and/or information within it or otherwise
breach the security policy
Β© ISO/IEC 2006 – All rights reserved 1

2.2
attack signature
sequence of computer activities or alterations that are used to execute an attack and which are also used by
an IDS to discover that an attack has occurred and often is determined by the examination of network traffic or
host logs
NOTE This may also be referred to as an attack pattern.
2.3
attestation
variant of public-key encryption that lets IDS software programs and devices authenticate their identity to
remote parties.
NOTE See Clause 2.21, Remote attestation.
2.4
bridge
network equipment that transparently connects a local area network (LAN) at OSI layer 2 to another LAN that
uses the same protocol
2.5
cryptographic hash value
mathematical value that is assigned to a file and used to β€œtest” the file at a later date to verify that the data
contained in the file has not been maliciously changed
2.6
DoS (Denial-of-Service) attack
prevention of authorized access to a system resource or the delaying of system operations and functions
[ISO/IEC 18028-1]
2.7
Demilitarized Zone
DMZ
logical and physical network space between the perimeter router and the exterior firewall
NOTE 1 The DMZ may be between networks and under close observation but does not have to be so.
NOTE 2 They are generally unsecured areas containing bastion hosts that provide public services.
2.8
exploit
defined way to breach the security of an Information System through vulnerability
2.9
firewall
type of security gateway or barrier placed between network environments – consisting of a dedicated device
or a composite of several components and techniques – through which all traffic from one network
environment to another, and vice versa, traverses and only authorized traffic is allowed to pass
[ISO/IEC 18028-1]
2.10
false positive
IDS alert when there is no attack
2.11
false negative
no IDS alert when there is an attack
2 Β© ISO/IEC 2006 – All rights reserved

2.12
host
addressable system or computer in TCP/IP based networks like the Internet
2.13
intruder
individual who is conducting, or has conducted, an intrusion or attack against a victim’s host, site, network, or
organization
2.14
intrusion
unauthorized access to a network or a network-connected system, i.e. deliberate or accidental unauthorized
access to an information system, to include malicious activity against an information system, or unauthorized
use of resources within an information system
2.15
intrusion detection
formal process of detecting intrusions, generally characterized by gathering knowledge about abnormal usage
patterns as well as what, how, and which vulnerability has been exploited to include how and when it occurred
2.16
intrusion detection system
IDS
information system used to identify that an intrusion has been attempted, is occurring, or has occurred and
possibly respond to intrusions in Information Systems and networks
2.17
intrusion prevention system
IPS
variant on intrusion detection systems that are specifically designed to provide an active response capability
2.18
honeypot
generic term for a decoy system used to deceive, distract, divert and to encourage the attacker to spend time
on information that appears to be very valuable, but actually is fabricated and would not be of interest to a
legitimate user
2.19
penetration
unauthorized act of bypassing the security mechanisms of an Information System
2.20
provisioning
process of remotely searching for new software updates from a vendor's website and downloading
authenticated updates
2.21
remote attestation
processes of using digital certificates to ensure the identity as well as the hardware and software configuration
of IDS and to securely transmit this information to a trusted operations center
2.22
response (incident response or intrusion response)
actions taken to protect and restore the normal operational conditions of an Information System and the
information stored in them when an attack or intrusion occurs
Β© ISO/IEC 2006 – All rights reserved 3

2.23
router
network device that is used to establish and control the flow of data between different networks, which
themselves can be based on different networks protocols, by selecting paths or routes based upon routing
protocol mechanisms and algorithms
NOTE The routing information is kept in a routing table.
[ISO/IEC 18028-1]
2.24
server
computer system or program that provides services to other computers
2.25
Service Level Agreement
contract that defines the technical support or business performance objectives including measures for
performance and consequences for failure the provider of a service can provide its clients
2.26
sensor
component/agent of IDS, which collects event data from an Information System or network under observation
NOTE Also referred to as a monitor.
2.27
subnet
portion of a network that shares a common address component
2.28
switch
device which provides connectivity between networked devices by means of internal switching mechanisms
NOTE Switches are distinct from other local area network interconnection devices (e.g. a hub) as the technology
used in switches sets up connections on a point-to-point basis. This ensures the network traffic is only seen by the
addressed network devices and enables several connections to exist simultaneously routing.
[ISO/IEC 18028-1]
2.29
Test Access Points
TAP
typically passive devices that do not install any overhead on the packet; they also increase the level of the
security as they make the data collection interface invisible to the network, where a switch can still maintain
layer 2 information about the port. A TAP also gives the functionality of multiple ports so network issues can
be debugged without losing the IDS capability.
2.30
trojan horse
malicious program that masquerades as a benign application
3 Background
The purpose of Intrusion Detection System (IDS) is passively monitoring, detecting and logging inappropriate,
incorrect, suspicious or anomalous activity that may represent an intrusion and provide an alert when these
activities are detected. It is the responsibilities of the appointed IT Security personnel are actively reviewing
IDS logs and making a decision on follow-up actions to be taken for any inappropriate access attempts.
4 Β© ISO/IEC 2006 – All rights reserved

When an organization needs to detect promptly intrusions to the organization’s Information System and
response appropriately to them, an organization should consider deploying IDS. An organization can deploy
IDS by getting IDS software and/or hardware products or by outsourcing capabilities of IDS to an IDS service
provider.
There are many commercially available or open-source IDS products and services that are based on
different technologies and approaches. In addition, IDS is not β€œplug and play” technology. Thus, when an
organization is preparing to deploy IDS, an organization should, as a minimum, be familiar with guidelines
and information provided by this standard.
Fundamental knowledge about IDS is mainly presented in Annex A. This Annex explains the different
characteristics of two basic types of IDS: Host-based IDS (HIDS) and Network-based IDS (NIDS), as well as
two basic approaches for detection analysis i.e. Misuse-based approach and Anomaly-based approach.
An HIDS derives its source of information to be detected from a single host, while a NIDS derives it from
traffic on a segment of a network. The misuse-based approach models attacks on information systems as
specific attack signatures, and then systematically scans the system for occurrences of these attack
signatures. This process involves a specific encoding of previous behaviours and actions that were deemed
intrusive or malicious. The anomaly-based approach attempt to detect intrusions by noting significant
departures from normal behaviour. And function on the assumption that attacks are different from
normal/legitimate activity and can therefore be detected by systems that identify these differences
An organization should understand that the source of information and the different analysis approaches may
result in both advantages and disadvantages or limitations, which can impact the ability or inability to detect
specific attacks and influence the degree of difficulty associated with installing and maintaining the IDS.
4 General
IDS functions and limitation, presented in Annex A, indicate that an organization should combine host-based
(including application monitoring) and network-based approaches to achieve reasonably complete coverage of
potential intrusions. Each type of IDS has its strengths and limitations; together they can provide better
security event coverage and alert analysis.
Combining the IDS technologies depends on the availability of a correlation engine on the alert management
system. Manual association of HIDS and NIDS alerts may result in IDS operator overload without any
additional benefit and the result may be worse than choosing the most appropriate output from one type of
IDS.
The process of selecting, deploying and operating IDS within an organization is shown in Figure 1 along with
the clause that addresses the key steps in this process.
Β© ISO/IEC 2006 – All rights reserved 5

Figure 1 β€” Selection, deployment and operations of IDS
5 Selection
There are many IDS products and families of products available. They range from extremely capable freeware
offerings that can be deployed on a low-cost host to very expensive commercial systems requiring the latest
hardware available. As there are so many different IDS products to choose from, the process of selecting IDS
that represents the best fit for an organization’s needs is difficult. Furthermore, there may be limited
compatibility between various IDS products offered in the market place. Additionally, because of mergers and
the potentially wide geographical distribution of an organization, organizations may be forced to use different
IDS and the integration of these diverse IDS can be very challenging.
Vendor brochures may not describe how well an IDS can detect intrusions and how difficult it is to deploy,
operate and maintain in an operational network with significant amounts of traffic. Vendors may indicate which
attacks can be detected, but without access to an organization’s network traffic, it is very difficult to describe
how well the IDS can perform and avoid false positives and negatives. Consequently, relying on vendor
provided information about IDS capabilities is neither sufficient nor recommended.
ISO/IEC 15408 (all parts) may be used in the evaluation of an IDS. In such a case, a document called
β€œSecurity Target” may contain more accurate and reliable description than vendor brochures concerning IDS
performance. An organization should use this document in their selection process.
The following clauses provide the major factors that should be used by an organization in the IDS selection
process.
6 Β© ISO/IEC 2006 – All rights reserved

5.1 Information Security Risk Assessment
Prior to the selection of an IDS, an organization should perform an information security risk assessment,
aimed at identifying the attacks and intrusions (threats) to which the organization’s specific information
systems might be vulnerable, taking into account factors such as the nature of information used by the system
and how it needs to be protected, the types of communication systems used, and other operational and
environmental factors. By considering these potential threats in the context of their specific information
security objectives, the organization can identify controls which provide cost-effective mitigation of the risks
The identified controls would provide the basis of the requirements for the functions provided by their IDS.
NOTE Information security risk management will be the subject of a future International Standard (ISO/IEC 13335-2).
Once the IDS is installed and operational an ongoing process of risk management should be implemented to
periodically review the effectiveness of the controls in light of changes to the system’s operations and the
threat environment
5.2 Host or Network IDS
IDS deployment should be based on an organizational Risk Assessment and asset protection priorities. When
selecting IDS, the most effective method to monitor events should be investigated. Both host-based IDS
(HIDS) and Network-based (NIDS) can be deployed in tandem. Where such an IDS monitoring method is
selected, an organization should implement it in stages starting with a NIDS, as they are usually the simplest
to install and maintain, then HIDS should be deployed on critical servers.
Each option has its own advantages and disadvantages. For example, in the case where an IDS is deployed
outside an external firewall, an IDS can generate a large number of alerts that do not require careful analysis
because a large amount of the alerting events can indicate scans that are already being effectively prevented
by the external firewall.
5.2.1 Host Based IDS (HIDS)
The choice of a HIDS demands the identification of target hosts. The expensive nature of full-scale
deployment on every host in an organization normally results in the deployment of HIDS on critical hosts only.
Therefore the deployment of HIDS should be prioritized according to risk analysis results and cost-benefit
considerations. An organization should deploy an IDS capable of centralized management and reporting
functions when HIDS is deployed on all or a significant number of hosts.
5.2.2 Network Based IDS (NIDS)
The main factor to consider when deploying a NIDS is where to locate the system sensors. Options include:
β€’ Inside external firewalls;
β€’ Outside external firewalls;
β€’ On major network backbones;
β€’ On critical subnets.
5.3 Considerations
5.3.1 System Environment
Based on a security risk assessment, an organization should first determine, in order of priority, what assets
should be protected and then tailor the IDS to that environment. At a minimum, the following system
environment information needs to be collected to accomplish this objective:
Β© ISO/IEC 2006 – All rights reserved 7

β€’ Network diagrams and maps specifying the number and locations of hosts, entry points to networks
and connections to external networks;
β€’ Description of the enterprise network management system;
β€’ Operating systems for each host;
β€’ Number and types of network devices such as routers, bridges, and switches;
β€’ Number and types of servers and dialup connections;
β€’ Descriptors of any network servers, including types, configurations, application software and versions
running on each;
β€’ Connections to external networks, including nominal bandwidth and supported protocols;
β€’ Document return paths that are not the same as the incoming connection path i.e. asymmetric data
flow.
5.3.2 Security
After the technical attributes of the system’s environment have been documented, the security protection
mechanisms presently installed should be identified. At a minimum, the following information is needed:
β€’ Demilitarized Zone (DMZ)
β€’ Numbers, types, and locations of firewalls and filtering routers;
β€’ Identification of authentication servers;
β€’ Data and link encryption;
β€’ MALWARE/Anti-virus packages;
β€’ Access control products;
β€’ Specialized security hardware such as cryptographic hardware;
β€’ Virtual private networks;
β€’ Any other installed security mechanisms.
5.3.3 IDS Security Policy
After the system and general security environments have been identified, the security policy for the IDS
should be defined. At a minimum, the policy needs to answer the following key questions:
β€’ What information assets are to be monitored?
β€’ What type of IDS is needed?
β€’ Where can the IDS be placed?
β€’ What types of attacks should be detected?
β€’ What type of information should be logged?
β€’ What type of response or alert can be provided when an attack is detected?
8 Β© ISO/IEC 2006 – All rights reserved

The IDS security policy represents the goals the organization has for the IDS investment. This is the initial
step in attempting to gain the maximum value from the IDS asset.
In order to specify IDS security policy goals and objectives, an organization should first identify the
organization’s risks from internal and external sources. An organization should realize that some IDS vendors
define IDS security policy as the set of rules that IDS are used to generate alerts.
A review of the existing organization security policy should provide a template against which the requirements
of the IDS can be determined and stated in terms of standard security goals of confidentiality, integrity,
availability, and non-repudiation as well as more generic management goals such as privacy, protection from
liability, manageability.
An organization should determine how it would react when an IDS detects that a security policy has been
violated. Specifically, in the case that an organization wishes to respond actively to certain kinds of violations,
the IDS should be configured to do so and the operational staff should be informed of the organization’s
response policy so that they can deal with alarms in an appropriate manner. For example, a law enforcement
investigation may be required to assist in the effective resolution of a security incident. Relevant information,
including IDS logs, may be required to be handed over to the law enforcement body for evidentiary purposes.
Additional information concerning security incident management can be found in ISO/IEC TR 18044.
5.3.4 Performance
Performance is another factor to consider when selecting IDS. At a minimum, the following questions should
be answered:
β€’ What bandwidth needs to be processed by the IDS?
β€’ What level of false alarms can be tolerated when operating at that bandwidth?
β€’ Can the cost of a high speed IDS be justified or can a moderate or slow IDS suffice?
β€’ What are the consequences of missing a potential intrusion because of IDS performance limitations?
Sustainable performance can be defined as the ability to consistently detect attacks within a given bandwidth
utilization. In most environments, there is little tolerance for an IDS missing or dropping packets in traffic that
could be part of an attack. At some point, as the bandwidth and/or network traffic increases, many IDS will no
longer be able to effectively and consistently detect intrusions.
A combination of load balancing and tuning can increase efficiency and performance. For example:
β€’ Knowledge is required of the organization’s network and its vulnerabilities: Every network is different;
an organization should determine what network assets need protection and what attack signature
tuning are likely to be associated with those assets. This is generally accomplished through a risk
assessment process.
β€’ Performance of most IDS can be much better in the case where they are configured to handle a
limited amount of network traffic and services. For example, an organization that does a lot of
e-commerce can need to monitor all Hypertext Transfer Protocol (HTTP) traffic and to tune one or
more IDS to look for only attack signatures associated with web traffic.
β€’ Proper load balancing configuration can allow the signature based IDS to work much faster and more
thoroughly because the signature based IDS needs only to process through an optimized smaller
attack signature database and not through a database of all possible attack signatures.
Load balancing is used to split available bandwidth in IDS deployment. However, bandwidth splitting is likely
to introduce problems such as: additional cost, management overhead, traffic de-synchronization, alert
duplication, and false negatives. Furthermore, current IDS technology is reaching gigabits speed and as a
result the benefits versus cost of load balancing may be minimal.
Β© ISO/IEC 2006 – All rights reserved 9

5.3.5 Verification of Capabilities
Reliance on vendor provided information about the capabilities of IDS is generally not sufficient. An
organization should request additional information and perhaps a demonstration of the suitability of a
particular IDS to the organization's environment and security goals. Most IDS vendors have experience in
adapting their products as target networks grow and some are committed to support new protocol standards,
platform types, and changes in the threat environment. At a minimum, an organization should ask to the IDS
vendor the following questions:
β€’ What assumptions were made regarding the applicability of the IDS to specific environments?
β€’ What are the details of the tests that were performed to verify the assertions about the IDS
capabilities?
β€’ What assumptions were made regarding IDS operators?
β€’ What IDS interfaces are provided (e.g. physical interfaces, communication protocols, reporting
formats for interfacing with correlation engines are all types of important interfaces)?
β€’ What are the alert export mechanisms or formats and are they properly documented (e.g. format or
syslog messages or MIB for SNMP messages)?
β€’ Can the IDS interface be configured with shortcut keys, customizable alarm features, and custom
attack signatures on the fly?
β€’ In the case where the IDS can be configured on the fly, are the features that provide this capability
documented and supported?
β€’ Can the product adapt to growth and change of the organization’s systems infrastructure?
β€’ Can the IDS product adapt to an expanding and increasingly diverse network?
β€’ Does the IDS provide fail-safe and fail-over capabilities and how do these capabilities integrate with
the same capabilities at the network link layer?
β€’ Does the IDS use a dedicated network for the alarms or are they transmitted in the same network that
it monitors?
β€’ What is the vendor’s reputation and product’s performance record?
5.3.6 Cost
The acquisition of IDS is not the actual cost of ownership. Additional costs include: acquisition of a system to
run the IDS software, specialized assistance in installing and configuring the IDS, personnel training, and
maintenance costs. Personnel to manage the system and to analyze the results are the largest cost. A useful
technique for measuring the IDS cost is the return on investment (ROI) or cost versus benefit analysis. In this
case, ROI is computed based on the savings realized by the organization when managing intrusions. The cost
of the IDS acquisition and operation needs to be balanced with the cost of the personnel required to help
resolve the alerts and the overhead caused by false alerts and inappropriate responses such as reinstalling an
Information System because of the inability to determine what has been compromised.
Operational IDS benefits include:
β€’ Identification of defective or mis-configured equipment;
β€’ Verification of configurations on the fly;
β€’ Providing early system usage statistics.
10 Β© ISO/IEC 2006 – All rights reserved

In order to make financial decisions about IDS, questions about the total cost of IDS ownership should be
answered. To do this, the expense of deploying IDS across an organization should be analyzed. As a
minimum, the IDS cost analysis needs to be based on answers to the following questions:
β€’ What is the budget for the initial capital expenditure to purchase the IDS?
β€’ What is the required time period for IDS operations e.g. 24/7 or less?
β€’ What infrastructure is needed to process, analyze and report the IDS outputs and what can it cost?
β€’ Does the organization have the human and other resources required to configure the IDS to the
organization’s security policy, to operate, maintain, update, monitor the outputs of the IDS and
respond to alerts? If not, how can these functions be accomplished?
β€’ Are funds available for IDS training?
β€’ What is the scale of deployment and if it HIDS are used how many hosts will be protected?
The costs to an individual organization may be lessened by sharing overhead costs through outsourcing the
IDS monitoring and maintenance functions to a remotely managed intrusion detection services provider.
The most expensive part of an IDS deployment is the response. Figuring out what the response should be,
building the response teams, developing and deploying response policy and training and rehearsing are
significant costs that should be mentioned
5.3.7 Updates
The majority of IDS are attack signature based and the value of the IDS is only as good as the attack
signature database against which events are analyzed. New vulnerabilities and attacks are being discovered
frequently. Consequently, the IDS attack signature database should be updated frequently. Therefore, at a
minimum an organization should consider the following factors:
β€’ Timeliness of updates;
β€’ Effectiveness of internal distribution;
β€’ Implementation;
β€’ System impact.
5.3.7.1 Timeliness of updates for signature-based IDS
Maintaining current attack signatures is essential to the detection of known attacks. At a minimum, the
following questions should be addressed in order to ensure that attack signatures are updated in a timely
manner:
β€’ How fast does the IDS vendor issue attack signature updates when an exploit or a specific
vulnerability is discovered?
β€’ Is the notification process reliable?
β€’ Is the authenticity and integrity of the attack signature updates guaranteed?
β€’ Are there sufficient skills available in case the attack signatures should be customized within the
organization?
β€’ Is there a possibility to write or receive customized attack signatures in order to immediately respond
to a high-risk vulnerability or ongoing attack?
Β© ISO/IEC 2006 – All rights reserved 11

5.3.7.2 Effectiveness of internal distribution and implementation
Is the organization capable of quickly distributing and implementing site-specific updates within an appropriate
timeframe to all relevant systems? In many cases, attack signatures up-dates should be modified to include
site-specific IP addresses, ports, etc. More specifically, at a minimum the following questions should be
answered
β€’ In the case that manual distribution processes are in place, do administrators or users implement the
attack signature within an acceptable timeframe?
β€’ Can the effectiveness of automatic distribution and installation processes be measured?
β€’ Is there a mechanism to effectively track changes to the attack signature updates?
5.3.7.3 System Impact
In order to minimize the impact of attack signature updates on system performance, at a minimum the
following questions should be answered:
β€’ Does an attack signature update impact the performance of important services or applications?
β€’ Is it possible to be selective concerning the attack signature updates? This may be necessary to avoid
conflicts or performance impacts on services or applications.
5.3.8 Alert Strategies
The IDS configuration and operation should be based on an organization's monitoring policy. At a minimum,
an organization should ensure that IDS can support specific methods of alerting used by an organization's
existing infrastructure. Alert features that may be supported include e-mail, paging, Short Message System
(SMS), Simple Network Management Protocol (SNMP) event, and even automated blocking of attack sources.
In the case where IDS data is used for forensic purposes, including prosecutions and evidence for internal
discipline, IDS data should at a minimum be handled and managed in compliance with the legal and
regulatory requirements of the local jurisdictions in which it is likely to applied or submitted.
5.3.9 Identity Management
Identity management is a critical foundation for realizing IDS remote attestation and provisioning without
human intervention. Each of these capabilities requires the creation and use of trusted third parties as the
authority which despite some differences, is similar to the authority often assumed as part of a public key
infrastructure. These capabilities are also important for seamless, secure, controlled IDS data and IDS identity
exchange across enterprise network trust boundaries
5.3.9.1 Remote Attestation
IDS may contain millions of lines of code. Intentional insertion of malicious software in this large code base is
difficult to discover and can allow an attacker to control the IDS output. Consequently, strict authenticated
access-control over the IDS hardware and software is extremely important and should be based in part on the
identity of the entity making the access request. Remote attestation can provide this access control capability
without humans in the loop.
Remote attestation generates, in hardware, a cryptographic certificate or hash value attesting to the identity of
a device or the software running on the device with no user involvement. In the simplest form, identity is
represented by a cryptographic hash which allows different software programs or devices to be distinguished
from one another or changes in software to be discovered. This certificate may, at the IDS user's request, be
provided to any remote party, and in principle has the effect of proving to that party that the IDS is using
expected and unaltered software. If the software on the IDS has been altered, the certificate generated will
reflect this. That the IDS code base has changed.
12 Β© ISO/IEC 2006 – All rights reserved

In the case of IDS, the aim of remote attestation is to detect unauthorized changes to IDS software. For
example, if an attacker has replaced or modified one of the IDS applications, or a part of IDS operating system
with a maliciously altered version, the hash value will not be recognized by the remote service or other
software. As a result, the corruption of IDS software by a virus or Trojan can be detected by a remote party
(e.g. Network Operations Center), which can then act on this information. Because the attestation is β€œremote”,
others with whom the IDS interact with should also be able to tell that a particular IDS has been compromised.
Thus, they can avoid from sending information to it, until it has been fixed.
For the above reasons, IDS should remotely attest/report to the Network Operations Center (NOC) its status,
configuration, and other important information. This attestation capability or IDS authentication is critical to the
ability to assess the health of IDS and to perform numerous IDS configuration and update operations. More
specifically, attestation is the ability to remotely test the integrity of the IDS. When aggregated, these IDS
attestation reports provide situational awareness about the defensive posture of the network and are a critical
part of
...


ΠœΠ•Π–Π”Π£ΠΠΠ ΠžΠ”ΠΠ«Π™ ISO/IEC
БВАНДАРВ
ΠŸΠ΅Ρ€Π²ΠΎΠ΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅
2006-06-15
Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ. ΠœΠ΅Ρ‚ΠΎΠ΄Ρ‹
Π·Π°Ρ‰ΠΈΡ‚Ρ‹. Π’Ρ‹Π±ΠΎΡ€, ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΈ
ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ систСм обнаруТСния
вторТСния
Information technology β€” Security techniques β€” Selection, deployment
and operations of intrusion detection systems

ΠžΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ Π·Π° ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΡƒ русской вСрсии нСсёт GOST R
(Российская ЀСдСрация) Π² соотвСтствии со ΡΡ‚Π°Ρ‚ΡŒΡ‘ΠΉ 18.1 Устава ISO

Бсылочный Π½ΠΎΠΌΠ΅Ρ€
Β©
ISO/IEC 2006
ΠžΡ‚ΠΊΠ°Π· ΠΎΡ‚ отвСтствСнности ΠΏΡ€ΠΈ Ρ€Π°Π±ΠΎΡ‚Π΅ Π² PDF
Настоящий Ρ„Π°ΠΉΠ» PDF ΠΌΠΎΠΆΠ΅Ρ‚ ΡΠΎΠ΄Π΅Ρ€ΠΆΠ°Ρ‚ΡŒ ΠΈΠ½Ρ‚Π΅Π³Ρ€ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ ΡˆΡ€ΠΈΡ„Ρ‚Ρ‹. Π’ соотвСтствии с условиями лицСнзирования, принятыми
Ρ„ΠΈΡ€ΠΌΠΎΠΉ Adobe, этот Ρ„Π°ΠΉΠ» ΠΌΠΎΠΆΠ½ΠΎ Ρ€Π°ΡΠΏΠ΅Ρ‡Π°Ρ‚Π°Ρ‚ΡŒ ΠΈΠ»ΠΈ ΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ Π½Π° экранС, Π½ΠΎ Π΅Π³ΠΎ нСльзя ΠΈΠ·ΠΌΠ΅Π½ΠΈΡ‚ΡŒ, ΠΏΠΎΠΊΠ° Π½Π΅ Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½Π°
лицСнзия Π½Π° ΠΈΠ½Ρ‚Π΅Π³Ρ€ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ ΡˆΡ€ΠΈΡ„Ρ‚Ρ‹ ΠΈ ΠΎΠ½ΠΈ Π½Π΅ Π±ΡƒΠ΄ΡƒΡ‚ установлСны Π½Π° ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π΅, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ вСдСтся Ρ€Π΅Π΄Π°ΠΊΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅. Π’
случаС Π·Π°Π³Ρ€ΡƒΠ·ΠΊΠΈ настоящСго Ρ„Π°ΠΉΠ»Π° заинтСрСсованныС стороны ΠΏΡ€ΠΈΠ½ΠΈΠΌΠ°ΡŽΡ‚ Π½Π° сСбя ΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ Π·Π° соблюдСниС
Π»ΠΈΡ†Π΅Π½Π·ΠΈΠΎΠ½Π½Ρ‹Ρ… условий Ρ„ΠΈΡ€ΠΌΡ‹ Adobe. Π¦Π΅Π½Ρ‚Ρ€Π°Π»ΡŒΠ½Ρ‹ΠΉ сСкрСтариат ISO Π½Π΅ нСсСт Π½ΠΈΠΊΠ°ΠΊΠΎΠΉ отвСтствСнности Π² этом ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΈ.
Adobe - Ρ‚ΠΎΡ€Π³ΠΎΠ²Ρ‹ΠΉ Π·Π½Π°ΠΊ Ρ„ΠΈΡ€ΠΌΡ‹ Adobe Systems Incorporated.
ΠŸΠΎΠ΄Ρ€ΠΎΠ±Π½ΠΎΡΡ‚ΠΈ, относящиСся ΠΊ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½Ρ‹ΠΌ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π°ΠΌ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Π½Π½Ρ‹Π΅ для создания настоящСго Ρ„Π°ΠΉΠ»Π° PDF, ΠΌΠΎΠΆΠ½ΠΎ Π½Π°ΠΉΡ‚ΠΈ Π²
Ρ€ΡƒΠ±Ρ€ΠΈΠΊΠ΅ General Info Ρ„Π°ΠΉΠ»Π°; ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ создания PDF Π±Ρ‹Π»ΠΈ ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ для ΠΏΠ΅Ρ‡Π°Ρ‚ΠΈ. Π‘Ρ‹Π»ΠΈ приняты Π²ΠΎ Π²Π½ΠΈΠΌΠ°Π½ΠΈΠ΅ всС
ΠΌΠ΅Ρ€Ρ‹ прСдостороТности с Ρ‚Π΅ΠΌ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ ΠΏΡ€ΠΈΠ³ΠΎΠ΄Π½ΠΎΡΡ‚ΡŒ настоящСго Ρ„Π°ΠΉΠ»Π° для использования ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Π°ΠΌΠΈ-Ρ‡Π»Π΅Π½Π°ΠΌΠΈ
ISO. Π’ Ρ€Π΅Π΄ΠΊΠΈΡ… случаях возникновСния ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹, связанной со сказанным Π²Ρ‹ΡˆΠ΅, ΠΏΡ€ΠΎΡΡŒΠ±Π° ΠΏΡ€ΠΎΠΈΠ½Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π¦Π΅Π½Ρ‚Ρ€Π°Π»ΡŒΠ½Ρ‹ΠΉ
сСкрСтариат ΠΏΠΎ адрСсу, ΠΏΡ€ΠΈΠ²Π΅Π΄Π΅Π½Π½ΠΎΠΌΡƒ Π½ΠΈΠΆΠ΅.

Π”ΠžΠšΠ£ΠœΠ•ΠΠ’ Π—ΠΠ©Π˜Π©Π•Π ΠΠ’Π’ΠžΠ Π‘ΠšΠ˜Πœ ΠŸΠ ΠΠ’ΠžΠœ

Β© ISO/IEC 2006
ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ. Если Π½Π΅ ΡƒΠΊΠ°Π·Π°Π½ΠΎ ΠΈΠ½ΠΎΠ΅, Π½ΠΈΠΊΠ°ΠΊΡƒΡŽ Ρ‡Π°ΡΡ‚ΡŒ настоящСй ΠΏΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΠΈ нСльзя ΠΊΠΎΠΏΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΈΠ»ΠΈ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π²
ΠΊΠ°ΠΊΠΎΠΉ-Π»ΠΈΠ±ΠΎ Ρ„ΠΎΡ€ΠΌΠ΅ ΠΈΠ»ΠΈ ΠΊΠ°ΠΊΠΈΠΌ-Π»ΠΈΠ±ΠΎ элСктронным ΠΈΠ»ΠΈ мСханичСским способом, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ Ρ„ΠΎΡ‚ΠΎΠΊΠΎΠΏΠΈΠΈ ΠΈ ΠΌΠΈΠΊΡ€ΠΎΡ„ΠΈΠ»ΡŒΠΌΡ‹, Π±Π΅Π·
ΠΏΡ€Π΅Π΄Π²Π°Ρ€ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ³ΠΎ письмСнного согласия ISO, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ Π΄ΠΎΠ»ΠΆΠ½ΠΎ Π±Ρ‹Ρ‚ΡŒ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½ΠΎ послС запроса ΠΎ Ρ€Π°Π·Ρ€Π΅ΡˆΠ΅Π½ΠΈΠΈ, Π½Π°ΠΏΡ€Π°Π²Π»Π΅Π½Π½ΠΎΠ³ΠΎ ΠΏΠΎ
адрСсу, ΠΏΡ€ΠΈΠ²Π΅Π΄Π΅Π½Π½ΠΎΠΌΡƒ Π½ΠΈΠΆΠ΅, ΠΈΠ»ΠΈ Π² ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚-Ρ‡Π»Π΅Π½ ISO Π² странС Π·Π°ΠΏΡ€Π°ΡˆΠΈΠ²Π°ΡŽΡ‰Π΅ΠΉ стороны.
ISO copyright office
Case postale 56 β€’ CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
ΠžΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π½ΠΎ Π² Π¨Π²Π΅ΠΉΡ†Π°Ρ€ΠΈΠΈ
ii Β© ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

Π‘ΠΎΠ΄Π΅Ρ€ΠΆΠ°Π½ΠΈΠ΅ Π‘Ρ‚Ρ€Π°Π½ΠΈΡ†Π°
ΠŸΡ€Π΅Π΄ΠΈΡΠ»ΠΎΠ²ΠΈΠ΅ .iv
Π’Π²Π΅Π΄Π΅Π½ΠΈΠ΅ .v
1 ΠžΠ±Π»Π°ΡΡ‚ΡŒ примСнСния .1
2 Π’Π΅Ρ€ΠΌΠΈΠ½Ρ‹ ΠΈ опрСдСлСния .1
3 ΠŸΡ€Π΅Π΄Π²Π°Ρ€ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅.5
4 ΠžΠ±Ρ‰ΠΈΠ΅ полоТСния .6
5 Π’Ρ‹Π±ΠΎΡ€ .7
5.1 ΠžΡ†Π΅Π½ΠΊΠ° риска ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности .8
5.2 IDS Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹ ΠΈ сСти.8
5.3 ΠžΠ±ΡΡƒΠΆΠ΄Π΅Π½ΠΈΠ΅ .9
5.4 Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ дополняСт IDS.15
5.5 Π Π°ΡΡˆΠΈΡ€ΡΠ΅ΠΌΠΎΡΡ‚ΡŒ.19
5.6 ВСхничСская ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΊΠ° .20
5.7 ΠžΠ±ΡƒΡ‡Π΅Π½ΠΈΠ΅ .20
6 Π’Π²ΠΎΠ΄ Π² дСйствиС .20
6.1 ΠœΠ½ΠΎΠ³ΠΎΡΡ‚Π°ΠΏΠ½Ρ‹ΠΉ Π²Π²ΠΎΠ΄ Π² дСйствиС .21
7 Эксплуатация.25
7.1 Настройка IDS.25
7.2 Уязвимости IDS .25
7.3 ΠžΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠ° ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ IDS.25
7.4 Π’Π°Ρ€ΠΈΠ°Π½Ρ‚Ρ‹ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹Ρ… дСйствий .28
7.5 БообраТСния ΠΏΡ€Π°Π²ΠΎΠ²ΠΎΠ³ΠΎ порядка .29
ΠŸΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅ A (ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠ²Π½ΠΎΠ΅) Π‘истСма обнаруТСния вторТСния (IDS): Π‘Ρ‚Ρ€ΡƒΠΊΡ‚ΡƒΡ€Π° ΠΈ
ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°Ρ‚ΡŒΡΡ .31
A.1 Π’Π²Π΅Π΄Π΅Π½ΠΈΠ΅ Π² ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠ΅ Π’Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ .31
A.2 Π’ΠΈΠΏΡ‹ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ ΠΈ Π°Ρ‚Π°ΠΊ.32
A.3 Групповая МодСль ΠŸΡ€ΠΎΡ†Π΅ΡΡΠ° ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡ ВторТСния.33
A.4 Π’ΠΈΠΏΡ‹ IDS.40
A.5 АрхитСктура .44
A.6 Π£ΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΠ΅ IDS .46
A.7 Вопросы Π Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ .48
A.8 Вопросы ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡ Π’Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ.51
Библиография.54

Β© ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ iii

ΠŸΡ€Π΅Π΄ΠΈΡΠ»ΠΎΠ²ΠΈΠ΅
ΠœΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Π°Ρ организация ΠΏΠΎ стандартизации (ISO) ΠΈ ΠœΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Π°Ρ элСктротСхничСская комиссия
(IEC) создали ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½ΡƒΡŽ систСму всСмирной стандартизации. ΠΠ°Ρ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½Ρ‹Π΅ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ,
ΡΠ²Π»ΡΡŽΡ‰ΠΈΠ΅ΡΡ ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Π°ΠΌΠΈ-Ρ‡Π»Π΅Π½Π°ΠΌΠΈ ISO ΠΈΠ»ΠΈ IEC, ΡƒΡ‡Π°ΡΡ‚Π²ΡƒΡŽΡ‚ Π² Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠ΅ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Ρ… стандартов
Ρ‡Π΅Ρ€Π΅Π· тСхничСскиС ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Ρ‹, ΡƒΡ‡Ρ€Π΅ΠΆΠ΄Π΅Π½Π½Ρ‹Π΅ ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰Π΅ΠΉ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠ΅ΠΉ для Ρ‚ΠΎΠ³ΠΎ, Ρ‡Ρ‚ΠΎΠ±Ρ‹
Π·Π°Π½ΠΈΠΌΠ°Ρ‚ΡŒΡΡ ΠΎΡ‚Π΄Π΅Π»ΡŒΠ½Ρ‹ΠΌΠΈ областями тСхничСской Π΄Π΅ΡΡ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ. ВСхничСскиС ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Ρ‹ ISO ΠΈ IEC
ΡΠΎΡ‚Ρ€ΡƒΠ΄Π½ΠΈΡ‡Π°ΡŽΡ‚ Π² областях, ΠΏΡ€Π΅Π΄ΡΡ‚Π°Π²Π»ΡΡŽΡ‰ΠΈΡ… Π²Π·Π°ΠΈΠΌΠ½Ρ‹ΠΉ интСрСс. Π”Ρ€ΡƒΠ³ΠΈΠ΅ ΠΏΡ€Π°Π²ΠΈΡ‚Π΅Π»ΡŒΡΡ‚Π²Π΅Π½Π½Ρ‹Π΅ ΠΈ
Π½Π΅ΠΏΡ€Π°Π²ΠΈΡ‚Π΅Π»ΡŒΡΡ‚Π²Π΅Π½Π½Ρ‹Π΅ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Π΅ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ, ΡΠΎΡ‚Ρ€ΡƒΠ΄Π½ΠΈΡ‡Π°ΡŽΡ‰ΠΈΠ΅ с ISO ΠΈ IEC, Ρ‚Π°ΠΊΠΆΠ΅ ΠΏΡ€ΠΈΠ½ΠΈΠΌΠ°ΡŽΡ‚
участиС Π² этой Ρ€Π°Π±ΠΎΡ‚Π΅. Π’ области ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ISO ΠΈ IEC ΡƒΡ‡Ρ€Π΅Π΄ΠΈΠ»ΠΈ БовмСстный
ВСхничСский ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚ ISO/IEC JTC1.
ΠŸΡ€ΠΎΠ΅ΠΊΡ‚Ρ‹ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Ρ… стандартов Ρ€Π°Π·Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°ΡŽΡ‚ΡΡ согласно ΠΏΡ€Π°Π²ΠΈΠ»Π°ΠΌ, ΠΏΡ€ΠΈΠ²Ρ‘Π΄Π΅Π½Π½Ρ‹ΠΌ Π² Π”ΠΈΡ€Π΅ΠΊΡ‚ΠΈΠ²Π°Ρ…
ISO/IEC, Π§Π°ΡΡ‚ΡŒ 2.
Основной Π·Π°Π΄Π°Ρ‡Π΅ΠΉ тСхничСских ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚ΠΎΠ² являСтся ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΠ° ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Ρ… стандартов. ΠŸΡ€ΠΎΠ΅ΠΊΡ‚Ρ‹
ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Ρ… стандартов, принятыС тСхничСскими ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Π°ΠΌΠΈ, Ρ€Π°ΡΡΡ‹Π»Π°ΡŽΡ‚ΡΡ ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚Π°ΠΌ-Ρ‡Π»Π΅Π½Π°ΠΌ Π½Π°
голосованиС. Для ΠΏΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΠΈ Π² качСствС ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠ³ΠΎ стандарта трСбуСтся ΠΎΠ΄ΠΎΠ±Ρ€Π΅Π½ΠΈΠ΅ Π½Π΅ ΠΌΠ΅Π½Π΅Π΅
75 % ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚ΠΎΠ²-Ρ‡Π»Π΅Π½ΠΎΠ², ΠΏΡ€ΠΈΠ½ΡΠ²ΡˆΠΈΡ… участиС Π² голосовании.
Π‘Π»Π΅Π΄ΡƒΠ΅Ρ‚ ΠΈΠΌΠ΅Ρ‚ΡŒ Π² Π²ΠΈΠ΄Ρƒ, Ρ‡Ρ‚ΠΎ, Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ, Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ элСмСнты настоящСго Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚Π° ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ
ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠΌ ΠΏΠ°Ρ‚Π΅Π½Ρ‚Π½Ρ‹Ρ… ΠΏΡ€Π°Π². ISO Π½Π΅ нСсСт ΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ Π·Π° ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… ΠΈΠ»ΠΈ всСх Ρ‚Π°ΠΊΠΈΡ…
ΠΏΠ°Ρ‚Π΅Π½Ρ‚Π½Ρ‹Ρ… ΠΏΡ€Π°Π².
ISO/IEC 18043 ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²Π»Π΅Π½ БовмСстным ВСхничСским ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚ΠΎΠΌ ISO/IEC JTC1, Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅
Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ, ΠŸΠΎΠ΄ΠΊΠΎΠΌΠΈΡ‚Π΅Ρ‚ΠΎΠΌ SC 27, ΠœΠ΅Ρ‚ΠΎΠ΄Ρ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ Π² Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… тСхнологиях.
ΠžΡ„ΠΈΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ΅ ΡƒΠ²Π΅Π΄ΠΎΠΌΠ»Π΅Π½ΠΈΠ΅
ΠΠ°Ρ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½Ρ‹ΠΉ Π˜Π½ΡΡ‚ΠΈΡ‚ΡƒΡ‚ Π‘Ρ‚Π°Π½Π΄Π°Ρ€Ρ‚ΠΎΠ² ΠΈ Π’Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ (NIST) настоящим прСдоставляСт ISO/IEC
Π½Π΅ΠΈΡΠΊΠ»ΡŽΡ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ Π»ΠΈΡ†Π΅Π½Π·ΠΈΡŽ Π½Π° использованиС Π‘ΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΏΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΠΈ NIST ΠΏΠΎ БистСмам
обнаруТСния вторТСния (SP800-31) ΠΏΡ€ΠΈ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠ΅ ΠœΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠ³ΠΎ стандарта ISO/IEC 18043. Однако
NIST сохраняСт ΠΏΡ€Π°Π²ΠΎ Π½Π° использованиС, ΠΊΠΎΠΏΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅, распространСниС ΠΈΠ»ΠΈ ΠΌΠΎΠ΄ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡŽ SP800-31,
ΠΊΠΎΠ³Π΄Π° ΠΎΠ½ посчитаСт это Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹ΠΌ.
iv Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

Π’Π²Π΅Π΄Π΅Π½ΠΈΠ΅
ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π½Π΅ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ Π·Π½Π°Ρ‚ΡŒ ΠΊΠΎΠ³Π΄Π°, Π³Π΄Π΅ ΠΈ ΠΊΠ°ΠΊ ΠΏΡ€ΠΎΠΈΠ·ΠΎΡˆΠ»ΠΎ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅ Π² ΠΈΡ… ΡΠ΅Ρ‚ΡŒ, систСму ΠΈΠ»ΠΈ
ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅, ΠΎΠ½ΠΈ Ρ‚Π°ΠΊΠΆΠ΅ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π·Π½Π°Ρ‚ΡŒ ΠΊΠ°ΠΊΠΎΠ΅ слабоС мСсто Π±Ρ‹Π»ΠΎ использовано ΠΈ ΠΊΠ°ΠΊΠΈΠ΅ ΠΌΠ΅Ρ€Ρ‹
бСзопасности ΠΈΠ»ΠΈ ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠ΅ ΠΎΠΏΡ†ΠΈΠΈ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ рисков (Ρ‚.Π΅. пСрСнос риска, приСмлСмая ΡΡ‚Π΅ΠΏΠ΅Π½ΡŒ
риска, ΠΈΡΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ риска) Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π±Ρ‹Ρ‚ΡŒ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½Ρ‹, Ρ‡Ρ‚ΠΎΠ±Ρ‹ ΠΏΡ€Π΅Π΄ΠΎΡ‚Π²Ρ€Π°Ρ‚ΠΈΡ‚ΡŒ ΠΏΠΎΠ΄ΠΎΠ±Π½ΠΎΠ΅ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅ Π²
Π±ΡƒΠ΄ΡƒΡ‰Π΅ΠΌ. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Ρ‚Π°ΠΊΠΆΠ΅ Ρ€Π°ΡΠΏΠΎΠ·Π½Π°Π²Π°Ρ‚ΡŒ ΠΈ ΠΎΡ‚Ρ€Π°ΠΆΠ°Ρ‚ΡŒ кибСрнСтичСскиС проникновСния. Π­Ρ‚ΠΎ
Ρ‚Ρ€Π΅Π±ΡƒΠ΅Ρ‚ Π°Π½Π°Π»ΠΈΠ·Π° хост ΠΈ сСтСвого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° ΠΈ/ΠΈΠ»ΠΈ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒΠ½ΠΎΠ³ΠΎ слСда для сигнатур Π°Ρ‚Π°ΠΊΠΈ ΠΈΠ»ΠΈ
спСцифичного шаблона, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ ΡƒΠΊΠ°Π·Ρ‹Π²Π°ΡŽΡ‚ Π·Π»ΠΎΠ½Π°ΠΌΠ΅Ρ€Π΅Π½Π½Ρ‹Π΅ ΠΈΠ»ΠΈ ΠΏΠΎΠ΄ΠΎΠ·Ρ€ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ намСрСния.
Π’ сСрСдинС 1990 Π³ΠΎΠ΄ΠΎΠ² ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π°Ρ‡Π°Π»ΠΈ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ БистСмы ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡ ВторТСния (IDS) для
осущСствлСния этих потрСбностСй. ΠžΠ±Ρ‰Π΅Π΅ ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ IDS ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ°Π΅Ρ‚ Ρ€Π°ΡΡˆΠΈΡ€ΡΡ‚ΡŒΡΡ с Π±ΠΎΠ»Π΅Π΅ ΡˆΠΈΡ€ΠΎΠΊΠΈΠΌ
Π½Π°Π±ΠΎΡ€ΠΎΠΌ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² IDS, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ стали доступны для удовлСтворСния Π²ΠΎΠ·Ρ€Π°ΡΡ‚Π°ΡŽΡ‰Π΅Π³ΠΎ уровня запросов
ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΉ Π² ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½Π½Ρ‹Ρ… возмоТностях обнаруТСния вторТСния.
Для ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π² порядкС Π²Π΅Ρ‰Π΅ΠΉ ΠΈΠ·Π²Π»Π΅ΠΊΠ°Ρ‚ΡŒ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹Π΅ Π²Ρ‹Π³ΠΎΠ΄Ρ‹ ΠΎΡ‚ IDS, поэтому процСсс Π²Ρ‹Π±ΠΎΡ€Π°
IDS, Π²Π²ΠΎΠ΄ Π² дСйствиС ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Ρ‚Ρ‰Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ ΠΏΠ»Π°Π½ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΈ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Ρ‹Π²Π°Ρ‚ΡŒΡΡ Π½Π°Π΄Π»Π΅ΠΆΠ°Ρ‰ΠΈΠΌ
ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²Π»Π΅Π½Π½Ρ‹ΠΌ ΠΈ ΠΎΠΏΡ‹Ρ‚Π½Ρ‹ΠΌ пСрсоналом. Π’ случаС, ΠΊΠΎΠ³Π΄Π° этот процСсс ΡƒΡΠΏΠ΅ΡˆΠ½ΠΎ выполняСтся,
ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ‹ IDS ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΠΎΠΌΠΎΡ‡ΡŒ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΏΠΎΠ»ΡƒΡ‡ΠΈΡ‚ΡŒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΎ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΈ ΠΈ ΠΌΠΎΠ³ΡƒΡ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ
ΠΊΠ°ΠΊ Π²Π°ΠΆΠ½ΠΎΠ΅ ΠΏΡ€Π΅Π΄ΠΎΡ…Ρ€Π°Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ΅ срСдство Π² ΠΎΠ±Ρ‰Π΅ΠΉ инфраструктурС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ ΠΈ
ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ (ICT).
Π”Π°Π½Π½Ρ‹ΠΉ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹ΠΉ стандарт обСспСчиваСт руководящиС ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ‹ для эффСктивного Π²Ρ‹Π±ΠΎΡ€Π°
IDS, Π²Π²ΠΎΠ΄Π° Π² дСйствиС ΠΈ ΡΠΊΡΠΏΠ»ΡƒΠ°Ρ‚Π°Ρ†ΠΈΡŽ, Π° Ρ‚Π°ΠΊΠΆΠ΅ основныС свСдСния ΠΎΠ± IDS. Он Ρ‚Π°ΠΊΠΆΠ΅ ΠΏΡ€ΠΈΠ³ΠΎΠ΄Π΅Π½ для Ρ‚Π΅Ρ…
ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°ΡŽΡ‚ ΠΏΡ€ΠΈΠ²Π»Π΅Ρ‡Π΅Π½ΠΈΠ΅ соисполнитСлСй для Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ возмоТностСй
обнаруТСния вторТСния. Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΏΠΎ соглашСниям Π½Π° ΡƒΡ€ΠΎΠ²Π½Π΅ услуг Π²Π½Π΅ΡˆΠ½ΠΈΡ… соисполнитСлСй
ΠΌΠΎΠΆΠ½ΠΎ Π½Π°ΠΉΡ‚ΠΈ Π² процСссах ΠœΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ‚Π° услуг Π² Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… тСхнологиях (ITSM) Π½Π° Π±Π°Π·Π΅
ISO/IEC 20000.
Β© ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ v

ΠœΠ•Π–Π”Π£ΠΠΠ ΠžΠ”ΠΠ«Π™ БВАНДАРВ ISO/IEC 18043:2006(R))

Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ. ΠœΠ΅Ρ‚ΠΎΠ΄Ρ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹. Π’Ρ‹Π±ΠΎΡ€,
ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ систСм обнаруТСния вторТСния

1 ΠžΠ±Π»Π°ΡΡ‚ΡŒ примСнСния
Π’ Π΄Π°Π½Π½ΠΎΠΌ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠΌ стандартС ΠΏΡ€Π΅Π΄ΡƒΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°ΡŽΡ‚ΡΡ руководящиС ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ‹ для ΠΏΠΎΠΌΠΎΡ‰ΠΈ
организациям Π² использовании БистСмы ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡ ВторТСния (IDS). Π’ частности, Π² стандартС
обращаСтся Π²Π½ΠΈΠΌΠ°Π½ΠΈΠ΅ Π½Π° Π²Ρ‹Π±ΠΎΡ€, ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ IDS. Он Ρ‚Π°ΠΊΠΆΠ΅ содСрТит Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ
ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ, Π½Π° основании ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ эти руководящиС ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ‹ Π±Ρ‹Π»ΠΈ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½Ρ‹.
Π”Π°Π½Π½Ρ‹ΠΉ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹ΠΉ стандарт ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ ΠΏΠΎΠ»Π΅Π·Π΅Π½:
a) ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π² ΡƒΠ΄ΠΎΠ²Π»Π΅Ρ‚Π²ΠΎΡ€Π΅Π½ΠΈΠΈ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΡ… Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ISO/IEC 27001:
- ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Ρ‚ΡŒ ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Ρ‹ ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ ΡƒΠΏΡ€Π°Π²Π»ΡΡŽΡ‰ΠΈΠ΅ воздСйствия, способныС ΠΊ
быстрому ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡŽ ΠΈ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹ΠΌ дСйствиям ΠΏΡ€ΠΈ ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π°Ρ… Π·Π°Ρ‰ΠΈΡ‚Ρ‹.
- ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° Π²Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒ ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Ρ‹ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ ΡƒΠΏΡ€Π°Π²Π»ΡΡŽΡ‰ΠΈΠ΅
воздСйствия для Π½Π°Π΄Π»Π΅ΠΆΠ°Ρ‰Π΅Π³ΠΎ распознавания Π½Π΅ΡƒΠ΄Π°Π²ΡˆΠΈΡ…ΡΡ ΠΈ ΡƒΡΠΏΠ΅ΡˆΠ½Ρ‹Ρ… Π½Π°Ρ€ΡƒΡˆΠ΅Π½ΠΈΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈ
ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ΠΎΠ².
b) ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π² Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ срСдств управлСния, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΡƒΠ΄ΠΎΠ²Π»Π΅Ρ‚Π²ΠΎΡ€ΡΡŽΡ‚ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠΌ цСлям
Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ISO/IEC 17799.
– ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠΈΡ‚ΡŒ нСсанкционированныС дСйствия ΠΏΡ€ΠΈ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠ΅ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ.
– БистСмы Π΄ΠΎΠ»ΠΆΠ½Ρ‹ ΠΎΡ‚ΡΠ»Π΅ΠΆΠΈΠ²Π°Ρ‚ΡŒΡΡ, ΠΈ события ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности Π΄ΠΎΠ»ΠΆΠ½Ρ‹
Ρ€Π΅Π³ΠΈΡΡ‚Ρ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ. Π”ΠΎΠ»ΠΆΠ½Ρ‹ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ опСраторскиС ΠΆΡƒΡ€Π½Π°Π»Ρ‹ рСгистрации ΠΈ ΠΆΡƒΡ€Π½Π°Π»Ρ‹
рСгистрации нСисправностСй для ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы.
– ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΡΠΎΠ±Π»ΡŽΠ΄Π°Ρ‚ΡŒ всС ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠ΅ ΡŽΡ€ΠΈΠ΄ΠΈΡ‡Π΅ΡΠΊΠΈΠ΅ трСбования, ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΠΌΡ‹Π΅ ΠΊ
дСйствиям ΠΏΠΎ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Ρƒ ΠΈ рСгистрации.
– Π”ΠΎΠ»ΠΆΠ΅Π½ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³ систСмы для ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ эффСктивности принятых срСдств
управлСния ΠΈ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ соотвСтствия ΠΌΠΎΠ΄Π΅Π»ΠΈ стратСгии доступа.
ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΠΏΡ€ΠΈΠ·Π½Π°Ρ‚ΡŒ, Ρ‡Ρ‚ΠΎ использованиС IDS Π½Π΅ являСтся СдинствСнным ΠΈ/ΠΈΠ»ΠΈ
ΠΈΡΡ‡Π΅Ρ€ΠΏΡ‹Π²Π°ΡŽΡ‰ΠΈΠΌ Ρ€Π΅ΡˆΠ΅Π½ΠΈΠ΅ΠΌ для удовлСтворСния ΠΈ соотвСтствия Π²Ρ‹ΡˆΠ΅Π½Π°Π·Π²Π°Π½Π½Ρ‹ΠΌ трСбованиям. Π‘ΠΎΠ»Π΅Π΅
Ρ‚ΠΎΠ³ΠΎ, Π΄Π°Π½Π½Ρ‹ΠΉ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹ΠΉ стандарт Π½Π΅ ΠΏΡ€Π΅Π΄Π½Π°Π·Π½Π°Ρ‡Π΅Π½ Π±Ρ‹Ρ‚ΡŒ ΠΊΡ€ΠΈΡ‚Π΅Ρ€ΠΈΠ΅ΠΌ для ΠΎΡ†Π΅Π½ΠΎΠΊ соотвСтствия
любого Π²ΠΈΠ΄Π°, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, для сСртификации ΠΊΠ°ΠΊ БистСмы ΠœΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ‚Π° Π—Π°Ρ‰ΠΈΡ‚Ρ‹ Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ (ISMS),
сСртификации ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² ΠΈ услуг IDS.
2 Π’Π΅Ρ€ΠΌΠΈΠ½Ρ‹ ΠΈ опрСдСлСния
ΠŸΡ€ΠΈΠΌΠ΅Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ ΠΊ Π΄Π°Π½Π½ΠΎΠΌΡƒ Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚Ρƒ ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡŽΡ‚ΡΡ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ Ρ‚Π΅Ρ€ΠΌΠΈΠ½Ρ‹ ΠΈ опрСдСлСния.
2.1
Π°Ρ‚Π°ΠΊΠ°
attack
ΠΏΠΎΠΏΡ‹Ρ‚ΠΊΠΈ Ρ€Π°Π·Ρ€ΡƒΡˆΠΈΡ‚ΡŒ, ΠΏΠΎΠ΄Π²Π΅Ρ€Π³Π½ΡƒΡ‚ΡŒ Π²ΠΎΠ·Π΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ, ΠΈΠ·ΠΌΠ΅Π½ΠΈΡ‚ΡŒ ΠΈΠ»ΠΈ вывСсти ΠΈΠ· строя Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΡƒΡŽ
систСму ΠΈ/ΠΈΠ»ΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ Π² Π½Π΅ΠΉ ΠΈΠ»ΠΈ ΠΈΠ½Ρ‹Π΅ Π½Π°Ρ€ΡƒΡˆΠ΅Π½ΠΈΡ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ бСзопасности
Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 1

2.2
сигнатура Π°Ρ‚Π°ΠΊΠΈ
attack signature
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚ΡŒ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹Ρ… дСйствий ΠΈΠ»ΠΈ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ использовались ΠΏΡ€ΠΈ Π°Ρ‚Π°ΠΊΠ΅ ΠΈ
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ Ρ‚Π°ΠΊΠΆΠ΅ IDS для обнаруТСния Π°Ρ‚Π°ΠΊΠΈ ΠΈ часто ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΡΡŽΡ‚ΡΡ ΠΏΡƒΡ‚Π΅ΠΌ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ
сСтСвого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° ΠΈΠ»ΠΈ ΠΆΡƒΡ€Π½Π°Π»ΠΎΠ² хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• Она ΠΌΠΎΠΆΠ΅Ρ‚ Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°Ρ‚ΡŒΡΡ Ρ‚Π°ΠΊΠΆΠ΅ ΠΊΠ°ΠΊ шаблон Π°Ρ‚Π°ΠΊΠΈ.
2.3
удостовСрСниС
attestation
Π²Π°Ρ€ΠΈΠ°Π½Ρ‚ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹ΠΌ ΠΊΠ»ΡŽΡ‡ΠΎΠΌ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ позволяСт ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ°ΠΌ ΠΈ устройствам IDS
Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΈΡ… ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ‡Π½ΠΎΡΡ‚ΡŒ с ΡƒΠ΄Π°Π»Π΅Π½Π½Ρ‹ΠΌΠΈ ΡƒΡ‡Π°ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠΌΠΈ сторонами
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• Π‘ΠΌ. Π Π°Π·Π΄Π΅Π» 2.21, Π£Π΄Π°Π»Π΅Π½Π½ΠΎΠ΅ удостовСрСниС.
2.4
мост
bridge
сСтСвоС ΠΎΠ±ΠΎΡ€ΡƒΠ΄ΠΎΠ²Π°Π½ΠΈΠ΅, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ ΠΏΡ€ΠΎΠ·Ρ€Π°Ρ‡Π½ΠΎ соСдиняСт Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΡƒΡŽ ΡΠ΅Ρ‚ΡŒ (LAN) Π½Π° ΡƒΡ€ΠΎΠ²Π½Π΅ 2 OSI ΠΊ Π΄Ρ€ΡƒΠ³ΠΎΠΉ
локальной сСти, которая ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ Ρ‚ΠΎΡ‚ ΠΆΠ΅ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»
2.5
криптографичСскоС Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ Ρ…ΡΡˆ-Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ
cryptographic hash value
матСматичСскоС Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ присваиваСтся Ρ„Π°ΠΉΠ»Ρƒ ΠΈ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ для ΠΏΠΎΡΠ»Π΅Π΄ΡƒΡŽΡ‰Π΅Π³ΠΎ
β€œΡ‚Π΅ΡΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡβ€ этого Ρ„Π°ΠΉΠ»Π°, Ρ‡Ρ‚ΠΎΠ±Ρ‹ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΈΡ‚ΡŒ Π½Π΅ измСнились Π»ΠΈ ΠΏΡ€Π΅Π΄ΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΎ Π΄Π°Π½Π½Ρ‹Π΅,
содСрТащиСся Π² этом Ρ„Π°ΠΉΠ»Π΅
2.6
ΠΎΡ‚ΠΊΠ°Π· ΠΎΡ‚ обслуТивания ΠΏΡ€ΠΈ Π°Ρ‚Π°ΠΊΠ΅
DoS (Denial-of-Service) attack
ΠΏΡ€Π΅Π΄ΠΎΡ‚Π²Ρ€Π°Ρ‰Π΅Π½ΠΈΠ΅ санкционированного доступа ΠΊ рСсурсам систСмы ΠΈΠ»ΠΈ Π·Π°Π΄Π΅Ρ€ΠΆΠΊΠ° ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΉ ΠΈΠ»ΠΈ
Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ систСмы
[ISO/IEC 18028-1]
2.7
дСмилитаризованная Π·ΠΎΠ½Π°
Demilitarized Zone DMZ
логичСскоС ΠΈ физичСскоС сСтСвоС пространство ΠΌΠ΅ΠΆΠ΄Ρƒ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ‚ΠΎΡ€ΠΎΠΌ ΠΏΠ΅Ρ€ΠΈΠΌΠ΅Ρ‚Ρ€Π° ΠΈ внСшним
брандмауэром
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• 1 DMZ ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ ΠΌΠ΅ΠΆΠ΄Ρƒ сСтями ΠΈ ΠΏΠΎΠ΄Π²Π΅Ρ€Π³Π°Ρ‚ΡŒΡΡ Ρ‚Ρ‰Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΠΌΡƒ наблюдСнию, Π½ΠΎ Π½Π΅ Π±Ρ‹Ρ‚ΡŒ ΠΈΠΌ.
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• 2 Ими ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ ΡΠ²Π»ΡΡŽΡ‚ΡΡ Π½Π΅Π·Π°Ρ‰ΠΈΡ‰Π΅Π½Π½Ρ‹Π΅ области, содСрТащиС Π·Π°Ρ‰ΠΈΡ‰Π΅Π½Π½Ρ‹Π΅ хост-ΠΌΠ°ΡˆΠΈΠ½Ρ‹,
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΏΡ€Π΅Π΄ΠΎΡΡ‚Π°Π²Π»ΡΡŽΡ‚ услуги ΠΎΠ±Ρ‰Π΅Π³ΠΎ пользования.
2.8
ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ
exploit
ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½Ρ‹ΠΉ способ ΠΏΡ€ΠΎΡ€Π²Π°Ρ‚ΡŒ Π·Π°Ρ‰ΠΈΡ‚Ρƒ Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы Ρ‡Π΅Ρ€Π΅Π· слабоС мСсто
2.9
брандмауэр
firewall
Ρ‚ΠΈΠΏ Π·Π°Ρ‰ΠΈΡ‚Π½ΠΎΠ³ΠΎ шлюза ΠΈΠ»ΠΈ Π±Π°Ρ€ΡŒΠ΅Ρ€Π°, Ρ€Π°Π·ΠΌΠ΅Ρ‰Π΅Π½Π½ΠΎΠ³ΠΎ ΠΌΠ΅ΠΆΠ΄Ρƒ сСтСвыми срСдами – состоящий ΠΈΠ·
2 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

спСциализированного устройства ΠΈΠ»ΠΈ составной ΠΈΠ· Π½Π΅ΡΠΊΠΎΠ»ΡŒΠΊΠΈΡ… ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚ΠΎΠ² ΠΈ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² – Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ
проходят всС Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠΈ ΠΈΠ· ΠΎΠ΄Π½ΠΎΠΉ сСтСвой срСды Π² Π΄Ρ€ΡƒΠ³ΡƒΡŽ, ΠΈ Ρ€Π°Π·Ρ€Π΅ΡˆΠ°Π΅Ρ‚ΡΡ ΠΏΡ€ΠΎΠΏΡƒΡΠΊΠ°Ρ‚ΡŒ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ
санкционированный Ρ‚Ρ€Π°Ρ„ΠΈΠΊ
[ISO/IEC 18028-1]
2.10
ΠΎΡˆΠΈΠ±ΠΎΡ‡Π½Ρ‹ΠΉ допуск
false positive
ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠ΅ IDS, ΠΊΠΎΠ³Π΄Π° Π½Π΅Ρ‚ Π°Ρ‚Π°ΠΊΠΈ
2.11
ΠΎΡˆΠΈΠ±ΠΎΡ‡Π½Ρ‹ΠΉ ΠΎΡ‚ΠΊΠ°Π·
false negative
Π½Π΅Ρ‚ прСдупрСТдСния IDS, ΠΊΠΎΠ³Π΄Π° происходит Π°Ρ‚Π°ΠΊΠ°
2.12
хост
host
адрСсуСмая систСма ΠΈΠ»ΠΈ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€ Π² сСтях Π½Π° Π±Π°Π·Π΅ TCP/IP, Π°Π½Π°Π»ΠΎΠ³ΠΈΡ‡Π½Ρ‹Ρ… Π˜Π½Ρ‚Π΅Ρ€Π½Π΅Ρ‚Ρƒ
2.13
Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊ
intruder
ΡΡƒΠ±ΡŠΠ΅ΠΊΡ‚, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΡ€ΠΎΠ²ΠΎΠ΄ΠΈΡ‚ ΠΈΠ»ΠΈ ΠΏΡ€ΠΎΠ²Π΅Π» Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅ ΠΈΠ»ΠΈ Π°Ρ‚Π°ΠΊΡƒ Π½Π° хост, ΡΠ΅Ρ‚ΡŒ, сайт ΠΈΠ»ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡŽ
2.14
Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅
intrusion
нСсанкционированный доступ ΠΊ сСти ΠΈΠ»ΠΈ систСмС, подсоСдинСнной ΠΊ сСти, Ρ‚.Π΅. ΠΏΡ€Π΅Π΄ΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½Ρ‹ΠΉ ΠΈΠ»ΠΈ
случайный доступ нСсанкционированный доступ ΠΊ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмС для Π²ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ
Π·Π»ΠΎΠ½Π°ΠΌΠ΅Ρ€Π΅Π½Π½ΠΎΠ³ΠΎ дСйствия ΠΏΡ€ΠΎΡ‚ΠΈΠ² систСмы, ΠΈΠ»ΠΈ нСсанкционированноС использования рСсурсов Π²
ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмС
2.15
ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠ΅ вторТСния
intrusion detection
Ρ„ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½Ρ‹ΠΉ процСсс обнаруТСния Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ, ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ΠΈΠ·ΡƒΡŽΡ‰ΠΈΠΉΡΡ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½ΠΈΠ΅ΠΌ Π·Π½Π°Π½ΠΈΠΉ ΠΎ
Π½Π΅Π½ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½ΠΎΠΌ использовании шаблонов, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΊΠ°ΠΊΠΎΠ³ΠΎ Ρ€ΠΎΠ΄Π°, ΠΊΠ°ΠΊ ΠΈ ΠΊΠ°ΠΊΠΎΠ΅ слабоС мСсто Π±Ρ‹Π»ΠΎ
использовано, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ ΠΊΠ°ΠΊ ΠΈ ΠΊΠΎΠ³Π΄Π° это ΠΏΡ€ΠΎΠΈΠ·ΠΎΡˆΠ»ΠΎ
2.16
систСма обнаруТСния вторТСния
intrusion detection system
IDS
информационная систСма, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠ°Ρ для опрСдСлСния Ρ‚ΠΎΠ³ΠΎ, Π±Ρ‹Π»Π° Π»ΠΈ ΠΏΠΎΠΏΡ‹Ρ‚ΠΊΠ° вторТСния, ΠΎΠ½ΠΎ
происходит ΠΈΠ»ΠΈ ΠΏΡ€ΠΎΠΈΠ·ΠΎΡˆΠ»ΠΎ, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΎΡ‚Π²Π΅Ρ‚Π½ΠΎΠ³ΠΎ дСйствия Π² Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмС ΠΈ сСтях
2.17
систСма прСдотвращСния вторТСния
intrusion prevention system
IPS
Π²Π°Ρ€ΠΈΠ°Π½Ρ‚ систСм обнаруТСния вторТСния, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Π½ для обСспСчСния
возмоТности Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΎΡ‚Π²Π΅Ρ‚Π½ΠΎΠ³ΠΎ дСйствия
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 3

2.18
ΠΏΡ€ΠΈΠΌΠ°Π½ΠΊΠ°
honeypot
ΠΎΠ±ΠΎΠ±Ρ‰Π°ΡŽΡ‰ΠΈΠΉ Ρ‚Π΅Ρ€ΠΌΠΈΠ½ для Π»ΠΎΠΆΠ½ΠΎΠΉ систСмы, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠΎΠΉ для ΠΎΠ±ΠΌΠ°Π½Π°, отвлСчСния, ΠΎΡ‚Π²ΠΎΠ΄Π° ΠΈ
поощрСния Π½Π°Ρ€ΡƒΡˆΠΈΡ‚Π΅Π»Ρ Π·Π°Ρ‚Ρ€Π°Ρ‚ΠΈΡ‚ΡŒ врСмя Π½Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ, которая появляСтся ΠΊΠ°ΠΊ цСнная, Π½ΠΎ
фактичСски сфабрикована ΠΈ Π½Π΅ прСдставляСт интСрСса для Π·Π°ΠΊΠΎΠ½Π½ΠΎΠ³ΠΎ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Ρ
2.19
ΠΏΡ€ΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅
penetration
нСсанкционированный Π°ΠΊΡ‚ ΠΎΠ±Ρ…ΠΎΠ΄Π° ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠΎΠ² Π·Π°Ρ‰ΠΈΡ‚Ρ‹ Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы
2.20
инициализация
provisioning
процСсс ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠ³ΠΎ поиска Π½ΠΎΠ²Ρ‹Ρ… ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ с Π²Π΅Π±-сайта поставщика ΠΈ Π·Π°Π³Ρ€ΡƒΠ·ΠΊΠ°
ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ Π² установлСнном порядкС
2.21
ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠ΅ удостовСрСниС
remote attestation
процСссы использования Ρ†ΠΈΡ„Ρ€ΠΎΠ²Ρ‹Ρ… сСртификатов для обСспСчСния идСнтичности, Π° Ρ‚Π°ΠΊΠΆΠ΅
тСхничСской ΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠΉ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ IDS ΠΈ бСзопасной ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ этой ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π² Π΄ΠΎΠ²Π΅Ρ€Π΅Π½Π½Ρ‹ΠΉ
Ρ†Π΅Π½Ρ‚ слуТбы эксплуатации
2.22
ΠΎΡ‚Π²Π΅Ρ‚Π½ΠΎΠ΅ дСйствиС (ΠΎΡ‚Π²Π΅Ρ‚ Π½Π° событиС ΠΈΠ»ΠΈ ΠΎΡ‚Π²Π΅Ρ‚ Π½Π° Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅)
response (incident response or intrusion response)
дСйствия, ΠΏΡ€ΠΈΠ½ΠΈΠΌΠ°Π΅ΠΌΡ‹Π΅ для Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈ восстановлСния Π½ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½Ρ‹Ρ… Ρ€Π°Π±ΠΎΡ‡ΠΈΡ… условий Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ
БистСмы ΠΈ Ρ…Ρ€Π°Π½ΠΈΠΌΠΎΠΉ Π² Π½Π΅ΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ, ΠΊΠΎΠ³Π΄Π° происходит Π°Ρ‚Π°ΠΊΠ° ΠΈΠ»ΠΈ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅
2.23
ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ‚ΠΎΡ€
router
сСтСвоС устройство, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠΎΠ΅ для установлСния ΠΈ контроля ΠΏΠΎΡ‚ΠΎΠΊΠ° Π΄Π°Π½Π½Ρ‹Ρ… ΠΌΠ΅ΠΆΠ΄Ρƒ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹ΠΌΠΈ
сСтями, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ само ΠΌΠΎΠΆΠ΅Ρ‚ Π±Π°Π·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π½Π° Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… сСтСвых ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π°Ρ…, ΠΏΡƒΡ‚Π΅ΠΌ Π²Ρ‹Π±ΠΎΡ€Π° ΠΏΡƒΡ‚Π΅ΠΉ ΠΈΠ»ΠΈ
ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΎΠ² Π½Π° основС ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠΎΠ² ΠΈΠ»ΠΈ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ ΠΏΠΎ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ хранится Π² Ρ‚Π°Π±Π»ΠΈΡ†Π΅ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΎΠ².
[ISO/IEC 18028-1]
2.24
сСрвСр
server
ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Π°Ρ систСма ΠΈΠ»ΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ°, которая прСдоставляСт услуги Π΄Ρ€ΡƒΠ³ΠΈΠΌ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π°ΠΌ
2.25
соглашСниС ΠΎΠ± ΡƒΡ€ΠΎΠ²Π½Π΅ сСрвиса
Service Level Agreement
ΠΊΠΎΠ½Ρ‚Ρ€Π°ΠΊΡ‚, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ опрСдСляСт Ρ‚Π΅Ρ…Π½ΠΈΡ‡Π΅ΡΠΊΡƒΡŽ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΊΡƒ ΠΈΠ»ΠΈ Ρ‚Ρ€Π΅Π±ΡƒΠ΅ΠΌΡ‹Π΅ ΠΏΡ€ΠΎΡ„Π΅ΡΡΠΈΠΎΠ½Π°Π»ΡŒΠ½Ρ‹Π΅ Ρ€Π°Π±ΠΎΡ‡ΠΈΠ΅
характСристики, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΈ послСдствия ΠΏΡ€ΠΈ нСисправности, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€
ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΡ€Π΅Π΄ΠΎΡΡ‚Π°Π²ΠΈΡ‚ΡŒ своим ΠΊΠ»ΠΈΠ΅Π½Ρ‚Π°ΠΌ
4 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

2.26
сСнсор
sensor
ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚/Π°Π³Π΅Π½Ρ‚ IDS, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ собираСт Π΄Π°Π½Π½Ρ‹Π΅ ΠΎ событиях ΠΈΠ· Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ БистСмы ΠΈΠ»ΠΈ сСти,
находящСйся ΠΏΠΎΠ΄ наблюдСниСм
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• УказываСтся Ρ‚Π°ΠΊΠΆΠ΅ ΠΊΠ°ΠΊ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€.
2.27
ΠΏΠΎΠ΄ΡΠ΅Ρ‚ΡŒ
subnet
Ρ‡Π°ΡΡ‚ΡŒ сСти, Π² ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ совмСстно ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚ ΠΎΠ±Ρ‰ΠΈΡ… адрСсов
2.28
ΠΏΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π°Ρ‚Π΅Π»ΡŒ
switch
устройство, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ обСспСчиваСт Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ соСдинСния ΠΌΠ΅ΠΆΠ΄Ρƒ устройствами, ΠΎΠ±ΡŠΠ΅Π΄ΠΈΠ½Π΅Π½Π½Ρ‹ΠΌΠΈ Π²
ΡΠ΅Ρ‚ΡŒ, с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½ΠΈΡ… ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠΎΠ² ΠΏΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ
ΠŸΠ Π˜ΠœΠ•Π§ΠΠΠ˜Π• ΠŸΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π°Ρ‚Π΅Π»ΠΈ ΠΎΡ‚Π»ΠΈΡ‡Π°ΡŽΡ‚ΡΡ ΠΎΡ‚ Π΄Ρ€ΡƒΠ³ΠΈΡ… устройств ΠΌΠ΅ΠΆΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚Π½ΠΎΠ³ΠΎ соСдинСния Π² локальной
сСти (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, ΠΎΡ‚ ΠΊΠΎΠ½Ρ†Π΅Π½Ρ‚Ρ€Π°Ρ‚ΠΎΡ€Π°), ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ тСхнология, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠ°Ρ Π² ΠΏΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π°Ρ‚Π΅Π»ΡΡ…, устанавливаСт
соСдинСния Π½Π° Π΄Π²ΡƒΡ…Ρ‚ΠΎΡ‡Π΅Ρ‡Π½ΠΎΠΉ основС. Π­Ρ‚ΠΎ Π³Π°Ρ€Π°Π½Ρ‚ΠΈΡ€ΡƒΠ΅Ρ‚, Ρ‡Ρ‚ΠΎ сСтСвой Ρ‚Ρ€Π°Ρ„ΠΈΠΊ рассматриваСтся Ρ‚ΠΎΠ»ΡŒΠΊΠΎ адрСсуСмыми
сСтСвыми устройствами ΠΈ Π΄Π°Π΅Ρ‚ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ ΠΏΡ€ΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈΠΌΠ΅Ρ‚ΡŒ нСсколько соСдинСний ΠΎΠ΄Π½ΠΎΠ²Ρ€Π΅ΠΌΠ΅Π½Π½ΠΎ.
[ISO/IEC 18028-1]
2.29
ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒΠ½Ρ‹Π΅ Ρ‚ΠΎΡ‡ΠΊΠΈ доступа
Test Access Points
TAP
ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ пассивныС устройства, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Π½Π΅ ΡƒΡΡ‚Π°Π½Π°Π²Π»ΠΈΠ²Π°ΡŽΡ‚ слуТСбныС Π΄Π°Π½Π½Ρ‹Π΅ Π½Π° ΠΏΠ°ΠΊΠ΅Ρ‚Π΅, ΠΎΠ½ΠΈ Ρ‚Π°ΠΊΠΆΠ΅
ΠΏΠΎΠ²Ρ‹ΡˆΠ°ΡŽΡ‚ ΡƒΡ€ΠΎΠ²Π΅Π½ΡŒ Π·Π°Ρ‰ΠΈΡ‚Ρ‹, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΎΠ½ΠΈ Π΄Π΅Π»Π°ΡŽΡ‚ интСрфСйс сбора Π΄Π°Π½Π½Ρ‹Ρ… Π½Π΅Π²ΠΈΠ΄ΠΈΠΌΡ‹ΠΌ Π² сСти, ΠΊΠΎΠ³Π΄Π°
ΠΏΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π°Ρ‚Π΅Π»ΡŒ ΠΌΠΎΠΆΠ΅Ρ‚ Π΅Ρ‰Π΅ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Ρ‚ΡŒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ уровня 2 ΠΎ ΠΏΠΎΡ€Ρ‚Π΅. TAP прСдоставляСт Ρ‚Π°ΠΊΠΆΠ΅
Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½Ρ‹Π΅ возмоТности для ΠΌΠ½ΠΎΠ³ΠΈΡ… ΠΏΠΎΡ€Ρ‚ΠΎΠ², поэтому ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹ сСти ΠΌΠΎΠ³ΡƒΡ‚ ΠΎΡ‚Π»Π°ΠΆΠΈΠ²Π°Ρ‚ΡŒΡΡ Π±Π΅Π·
ΠΏΠΎΡ‚Π΅Ρ€ΠΈ возмоТностСй IDS
2.30
троянский конь
trojan horse
Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½Π°Ρ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ°, которая Π²Ρ‹Π΄Π°Π΅Ρ‚ сСбя Π·Π° благоприятноС ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅
3 ΠŸΡ€Π΅Π΄Π²Π°Ρ€ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅
НазначСниС БистСмы ΠžΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡ ВторТСния (IDS) состоит Π² пассивном ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π΅, ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠΈ ΠΈ
рСгистрации Π½Π΅ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ…, Π½Π΅ΠΏΡ€Π°Π²ΠΈΠ»ΡŒΠ½Ρ‹Ρ…, ΠΏΠΎΠ΄ΠΎΠ·Ρ€ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… ΠΈΠ»ΠΈ Π½Π΅Π½ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½Ρ‹Ρ… дСйствий,
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΡ€Π΅Π΄ΡΡ‚Π°Π²Π»ΡΡ‚ΡŒ собой Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠ΅, ΠΈ обСспСчСнии прСдупрСТдСния, ΠΊΠΎΠ³Π΄Π° Ρ‚Π°ΠΊΠΈΠ΅ дСйствия
ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ²Π°ΡŽΡ‚ΡΡ. На пСрсоналС ΠžΠ±Π΅ΡΠΏΠ΅Ρ‡Π΅Π½ΠΈΡ бСзопасности Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ БистСмы Π»Π΅ΠΆΠΈΡ‚
ΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ Π·Π° Π°ΠΊΡ‚ΠΈΠ²Π½Ρ‹ΠΉ просмотр ΠΆΡƒΡ€Π½Π°Π»ΠΎΠ² рСгистрации IDS ΠΈ принятиС Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ ΠΏΠΎ
ΠΏΠΎΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠΌ дСйствиям ΠΏΡ€ΠΈ любой ΠΏΠΎΠΏΡ‹Ρ‚ΠΊΠ΅ Π½Π΅ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰Π΅Π³ΠΎ доступа.
Когда ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ быстро ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ²Π°Ρ‚ΡŒ вторТСния Π² Π΅Π΅ Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΡƒΡŽ систСму ΠΈ
быстро Ρ€Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π½Π° Π½ΠΈΡ…, организация Π΄ΠΎΠ»ΠΆΠ½Π° Ρ€Π°ΡΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ IDS. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ ΠΌΠΎΠΆΠ΅Ρ‚
Ρ€Π°Π·Π²Π΅Ρ€Π½ΡƒΡ‚ΡŒ IDS ΠΏΡƒΡ‚Π΅ΠΌ приобрСтСния ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ³ΠΎ обСспСчСния ΠΈ/ΠΈΠ»ΠΈ Π°ΠΏΠΏΠ°Ρ€Π°Ρ‚Π½Ρ‹Ρ… ΠΈΠ·Π΄Π΅Π»ΠΈΠΉ ΠΈΠ»ΠΈ ΠΏΡƒΡ‚Π΅ΠΌ
привлСчСния Π²Π½Π΅ΡˆΠ½ΠΈΡ… возмоТностСй IDS Ρƒ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π° услуг IDS.
БущСствуСт ΠΌΠ½ΠΎΠ³ΠΎ коммСрчСски доступных ΠΈΠ»ΠΈ ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Ρ… ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² ΠΈ услуг IDS, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ основаны Π½Π°
Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… тСхнологиях ΠΈ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Π°Ρ…. ΠšΡ€ΠΎΠΌΠ΅ Ρ‚ΠΎΠ³ΠΎ, IDS Π½Π΅ являСтся Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠ΅ΠΉ β€œΠ²ΠΊΠ»ΡŽΡ‡Π°ΠΉ ΠΈ работай”.
ΠŸΠΎΡΡ‚ΠΎΠΌΡƒ ΠΊΠΎΠ³Π΄Π° организация готовится ΠΊ использованию IDS, ΠΎΠ½Π° Π΄ΠΎΠ»ΠΆΠ½Π° Π±Ρ‹Ρ‚ΡŒ, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ,
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 5

ΠΎΠ·Π½Π°ΠΊΠΎΠΌΠ»Π΅Π½Π° с руководящими ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠ°ΠΌΠΈ ΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠ΅ΠΉ, ΠΏΡ€ΠΈΠ²ΠΎΠ΄ΠΈΠΌΠΎΠΉ Π² Π΄Π°Π½Π½ΠΎΠΌ стандартС.
ΠžΡΠ½ΠΎΠ²Π½Ρ‹Π΅ свСдСния ΠΎ IDS прСдставлСны, Π³Π»Π°Π²Π½Ρ‹ΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ, Π² ΠŸΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΈ A. Π’ этом ΠŸΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΈ
ΠΏΠΎΡΡΠ½ΡΡŽΡ‚ΡΡ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ характСристики Π΄Π²ΡƒΡ… основных Ρ‚ΠΈΠΏΠΎΠ² IDS: IDS Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹ (HIDS) ΠΈ
IDS Π½Π° Π±Π°Π·Π΅ сСти (NIDS), Π° Ρ‚Π°ΠΊΠΆΠ΅ Π΄Π²ΡƒΡ… основных ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ΠΎΠ² ΠΏΡ€ΠΈ Π°Π½Π°Π»ΠΈΠ·Π΅ Π²ΠΎ врСмя обнаруТСния, Ρ‚.Π΅.
ΠŸΠΎΠ΄Ρ…ΠΎΠ΄ Π½Π° основС злоупотрСблСния ΠΈ ΠŸΠΎΠ΄Ρ…ΠΎΠ΄ Π½Π° основС Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΈ.
Для HIDS источником ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ для обнаруТСния являСтся ΠΎΠ΄Π½Π° хост- машина, Π² Ρ‚ΠΎ врСмя ΠΊΠ°ΠΊ NIDS
ΠΈΠ·Π²Π»Π΅ΠΊΠ°Π΅Ρ‚ Π΅Π΅ ΠΈΠ· Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° Π½Π° сСгмСнтС сСти. Π’ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Π΅ Π½Π° Π±Π°Π·Π΅ злоупотрСблСния Π°Ρ‚Π°ΠΊΠΈ Π½Π°
Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ систСмы ΠΌΠΎΠ΄Π΅Π»ΠΈΡ€ΡƒΡŽΡ‚ΡΡ ΠΊΠ°ΠΊ Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€Π½Ρ‹Π΅ сигнатуры Π°Ρ‚Π°ΠΊΠΈ, систСма систСматичСски
сканируСтся Π½Π° появлСниС этих сигнатур Π°Ρ‚Π°ΠΊΠΈ. ΠŸΡ€ΠΎΡ†Π΅ΡΡ Π²ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ΅ ΠΊΠΎΠ΄ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅
ΠΏΡ€Π΅Π΄ΡˆΠ΅ΡΡ‚Π²ΡƒΡŽΡ‰Π΅Π³ΠΎ повСдСния ΠΈ дСйствий, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΡΡ‡ΠΈΡ‚Π°Π»ΠΈΡΡŒ вторТСниями ΠΈΠ»ΠΈ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½Ρ‹ΠΌΠΈ.
ΠŸΠΎΠ΄Ρ…ΠΎΠ΄ Π½Π° Π±Π°Π·Π΅ Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ пытаСтся ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΡ‚ΡŒ вторТСния ΠΏΡƒΡ‚Π΅ΠΌ фиксации Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… ΠΎΡ‚ΠΊΠ»ΠΎΠ½Π΅Π½ΠΈΠΉ
ΠΎΡ‚ Π½ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ повСдСния. Он Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½ΠΈΡ€ΡƒΠ΅Ρ‚ Π² ΠΏΡ€Π΅Π΄ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½ΠΈΠΈ, Ρ‡Ρ‚ΠΎ Π°Ρ‚Π°ΠΊΠΈ ΠΎΡ‚Π»ΠΈΡ‡Π°ΡŽΡ‚ΡΡ ΠΎΡ‚
Π½ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½ΠΎΠΉ/Π·Π°ΠΊΠΎΠ½Π½ΠΎΠΉ Ρ€Π°Π±ΠΎΡ‚Ρ‹ ΠΈ, ΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ, ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½Ρ‹ систСмами, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅
ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΡ†ΠΈΡ€ΡƒΡŽΡ‚ эти различия.
ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΠΏΠΎΠ½ΠΈΠΌΠ°Ρ‚ΡŒ, Ρ‡Ρ‚ΠΎ источник ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΈ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Ρ‹ ΠΊ Π°Π½Π°Π»ΠΈΠ·Ρƒ ΠΈΠΌΠ΅ΡŽΡ‚ ΠΊΠ°ΠΊ
достоинства, Ρ‚Π°ΠΊ ΠΈ нСдостатки ΠΈΠ»ΠΈ ограничСния, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΠΎΠ²Π»ΠΈΡΡ‚ΡŒ Π½Π° ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΈΠ»ΠΈ
Π½Π΅ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΡ‚ΡŒ Π°Ρ‚Π°ΠΊΠΈ ΠΈ Π½Π° ΡΡ‚Π΅ΠΏΠ΅Π½ΡŒ слоТности, связанный с установкой ΠΈ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠ°Π½ΠΈΠ΅ΠΌ
IDS.
4 ΠžΠ±Ρ‰ΠΈΠ΅ полоТСния
Π€ΡƒΠ½ΠΊΡ†ΠΈΠΈ ΠΈ ограничСния IDS, прСдставлСнныС Π° ΠŸΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΈ A, ΡƒΠΊΠ°Π·Ρ‹Π²Π°ΡŽΡ‚ Π½Π° Ρ‚ΠΎ, Ρ‡Ρ‚ΠΎ организация Π΄ΠΎΠ»ΠΆΠ½Π°
ΠΊΠΎΠΌΠ±ΠΈΠ½ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Ρ‹ Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹ (Π²ΠΊΠ»ΡŽΡ‡Π°Ρ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³ ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ) ΠΈ Π½Π° Π±Π°Π·Π΅ сСти для
достиТСния достаточно ΠΏΠΎΠ»Π½ΠΎΠ³ΠΎ ΠΎΡ…Π²Π°Ρ‚Π° Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Ρ… Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ. ΠšΠ°ΠΆΠ΄Ρ‹ΠΉ Ρ‚ΠΈΠΏ IDS ΠΈΠΌΠ΅Π΅Ρ‚ свою силу ΠΈ
ограничСния; вмСстС ΠΎΠ½ΠΈ ΠΌΠΎΠ³ΡƒΡ‚ Π»ΡƒΡ‡ΡˆΠ΅ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ ΠΎΡ…Π²Π°Ρ‚ событий Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈ Π°Π½Π°Π»ΠΈΠ· Ρ‚Ρ€Π΅Π²ΠΎΠΆΠ½Ρ‹Ρ… сигналов.
ОбъСдинСниС Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ IDS зависит ΠΎΡ‚ наличия ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠ° взаимосвязи Π² систСмС управлСния
прСдупрСТдСниями. Π ΡƒΡ‡Π½ΠΎΠ΅ соСдинСниС ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ HIDS ΠΈ NIDS ΠΌΠΎΠΆΠ΅Ρ‚ привСсти ΠΊ ΠΏΠ΅Ρ€Π΅Π³Ρ€ΡƒΠ·ΠΊΠ΅
ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° IDS Π±Π΅Π· ΠΊΠ°ΠΊΠΎΠΉ-Π»ΠΈΠ±ΠΎ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΉ ΠΏΠΎΠ»ΡŒΠ·Ρ‹, ΠΈ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ Ρ…ΡƒΠΆΠ΅, Ρ‡Π΅ΠΌ ΠΏΡ€ΠΈ Π²Ρ‹Π±ΠΎΡ€Π΅
Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ подходящих Π²Ρ‹Ρ…ΠΎΠ΄Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… IDS ΠΎΠ΄Π½ΠΎΠ³ΠΎ Ρ‚ΠΈΠΏΠ°.
ΠŸΡ€ΠΎΡ†Π΅ΡΡ Π²Ρ‹Π±ΠΎΡ€Π°, примСнСния ΠΈ эксплуатации IDS Π² Ρ€Π°ΠΌΠΊΠ°Ρ… ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΏΠΎΠΊΠ°Π·Π°Π½ Π½Π° РисункС 1 вмСстС с
ΡƒΠΊΠ°Π·Π°Π½ΠΈΠ΅ΠΌ Ρ€Π°Π·Π΄Π΅Π»Π°, Π² ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ ΠΎΠΏΠΈΡΡ‹Π²Π°ΡŽΡ‚ΡΡ основныС шаги Π² этом процСссС.
6 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

Рисунок 1 - Π’Ρ‹Π±ΠΎΡ€, Π²Π²ΠΎΠ΄ Π² дСйствиС ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ IDS
5 Π’Ρ‹Π±ΠΎΡ€
БущСствуСт ΠΌΠ½ΠΎΠ³ΠΎ доступных ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² IDS ΠΈ сСмСйств этих ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ². Они ΠΊΠΎΠ»Π΅Π±Π»ΡŽΡ‚ΡΡ ΠΎΡ‚ Ρ€Ρ‹Π½ΠΎΡ‡Π½Ρ‹Ρ…
ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΠΉ свободно распространяСмого ПО, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡ‚ΡŒΡΡ Π½Π° Π½Π΅Π΄ΠΎΡ€ΠΎΠ³ΠΈΡ… хост –
ΠΌΠ°ΡˆΠΈΠ½Π°Ρ…, Π΄ΠΎ ΠΎΡ‡Π΅Π½ΡŒ дорогостоящих коммСрчСских систСм, Ρ‚Ρ€Π΅Π±ΡƒΡŽΡ‰ΠΈΡ… наличия самых послСдних
тСхничСских срСдств. ΠŸΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΏΡ€ΠΈ Π²Ρ‹Π±ΠΎΡ€Π΅ сущСствуСт ΠΌΠ½ΠΎΠ³ΠΎ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² IDS, процСсс
Π²Ρ‹Π±ΠΎΡ€Π° IDS, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ Π½Π°ΠΈΠ»ΡƒΡ‡ΡˆΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ΠΈΠ» Π±Ρ‹ ΠΊ потрСбностям ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ, достаточно
Ρ‚Ρ€ΡƒΠ΄Π½Ρ‹ΠΉ. Π‘ΠΎΠ»Π΅Π΅ Ρ‚ΠΎΠ³ΠΎ, ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ ограничСнная ΡΠΎΠ²ΠΌΠ΅ΡΡ‚ΠΈΠΌΠΎΡΡ‚ΡŒ ΠΌΠ΅ΠΆΠ΄Ρƒ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹ΠΌΠΈ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π°ΠΌΠΈ IDS,
ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΡ‹ΠΌΠΈ Π½Π° Ρ€Ρ‹Π½ΠΊΠ΅. ΠšΡ€ΠΎΠΌΠ΅ Ρ‚ΠΎΠ³ΠΎ, ΠΏΡ€ΠΈ слияниях ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΠΌ ΡˆΠΈΡ€ΠΎΠΊΠΎΠΌ гСографичСском
распространСнии ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ, эти ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ Π²Ρ‹Π½ΡƒΠΆΠ΄Π΅Π½Ρ‹ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ IDS, ΠΈ
ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΠΎΡ‚Ρ€Π΅Π±ΠΎΠ²Π°Ρ‚ΡŒΡΡ объСдинСниС этих Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… IDS.
Π’ Π±Ρ€ΠΎΡˆΡŽΡ€Π΅ поставщика ΠΌΠΎΠΆΠ΅Ρ‚ Π½Π΅ ΠΎΠΏΠΈΡΡ‹Π²Π°Ρ‚ΡŒΡΡ, ΠΊΠ°ΠΊ Ρ…ΠΎΡ€ΠΎΡˆΠΎ IDS ΠΌΠΎΠΆΠ΅Ρ‚ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ²Π°Ρ‚ΡŒ вторТСния ΠΈ ΠΊΠ°ΠΊ
слоТно Π²Π²ΠΎΠ΄ΠΈΡ‚ΡŒ ΠΈΡ… Π² дСйствиС, ΡΠΊΡΠΏΠ»ΡƒΠ°Ρ‚ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΈ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Ρ‚ΡŒ Π² Ρ€Π°Π±ΠΎΡ‡Π΅ΠΉ сСти со Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌ
объСмом Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°. ΠŸΠΎΡΡ‚Π°Π²Ρ‰ΠΈΠΊΠΈ ΠΌΠΎΠ³ΡƒΡ‚ ΡƒΠΊΠ°Π·Π°Ρ‚ΡŒ, ΠΊΠ°ΠΊΠΈΠ΅ Π°Ρ‚Π°ΠΊΠΈ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½Ρ‹, Π½ΠΎ Π±Π΅Π· доступа ΠΊ
сСтСвому Ρ‚Ρ€Π°Ρ„ΠΈΠΊΡƒ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΎΡ‡Π΅Π½ΡŒ Ρ‚Ρ€ΡƒΠ΄Π½ΠΎ ΠΎΠΏΠΈΡΠ°Ρ‚ΡŒ, ΠΊΠ°ΠΊ Ρ…ΠΎΡ€ΠΎΡˆΠΎ IDS Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ, ΠΈ ΠΈΡΠΊΠ»ΡŽΡ‡Π°Ρ‚ΡŒ
ΠΎΡˆΠΈΠ±ΠΎΡ‡Π½Ρ‹Π΅ ΠΎΡ‚ΠΊΠ°Π·Ρ‹ Π² доступС ΠΈ ΠΎΡˆΠΈΠ±ΠΎΡ‡Π½Ρ‹Π΅ допуски. Π‘Π»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ, ΠΏΠΎΠ»Π°Π³Π°Ρ‚ΡŒΡΡ Π½Π° ΠΏΡ€Π΅Π΄ΠΎΡΡ‚Π°Π²Π»ΡΠ΅ΠΌΡƒΡŽ
поставщиком ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΎ возмоТностях IDS Π½Π΅ достаточно ΠΈ Π½Π΅ рСкомСндуСтся.
Для ΠΎΡ†Π΅Π½ΠΊΠΈ IDS ΠΌΠΎΠΆΠ΅Ρ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ стандарт ISO/IEC 15408 (всС части). Π’ этом случаС Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ с
Π½Π°Π·Π²Π°Π½ΠΈΠ΅ΠΌ β€œSecurity Target (Π¦Π΅Π»Π΅Π²ΠΎΠΉ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ Π·Π°Ρ‰ΠΈΡ‚Ρ‹)” ΠΌΠΎΠΆΠ΅Ρ‚ ΡΠΎΠ΄Π΅Ρ€ΠΆΠ°Ρ‚ΡŒ Π±ΠΎΠ»Π΅Π΅ Ρ‚ΠΎΡ‡Π½ΠΎΠ΅ ΠΈ Π½Π°Π΄Π΅ΠΆΠ½ΠΎΠ΅
описаниС характСристик IDS, Ρ‡Π΅ΠΌ Π±Ρ€ΠΎΡˆΡŽΡ€Ρ‹ поставщика. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ этот
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 7

Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ Π² процСссС Π²Ρ‹Π±ΠΎΡ€Π°.
Π’ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΡ… ΠΏΡƒΠ½ΠΊΡ‚Π°Ρ… ΠΎΠΏΠΈΡΡ‹Π²Π°ΡŽΡ‚ΡΡ основныС Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ слСдуСт ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Ρ‚ΡŒ Π² процСссС Π²Ρ‹Π±ΠΎΡ€Π°
IDS.
5.1 ΠžΡ†Π΅Π½ΠΊΠ° риска ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности
ΠŸΠ΅Ρ€Π΅Π΄ Π²Ρ‹Π±ΠΎΡ€ΠΎΠΌ IDS организация Π΄ΠΎΠ»ΠΆΠ½Π° Π²Ρ‹ΠΏΠΎΠ»Π½ΠΈΡ‚ΡŒ ΠΎΡ†Π΅Π½ΠΊΡƒ риска ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности с
Ρ†Π΅Π»ΡŒΡŽ опрСдСлСния Π°Ρ‚Π°ΠΊ ΠΈ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ (ΡƒΠ³Ρ€ΠΎΠ·), ΠΏΡ€ΠΈ ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… конкрСтная Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Π°Ρ систСма
ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ уязвима с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ Ρ‚Π°ΠΊΠΈΡ… Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΎΠ² ΠΊΠ°ΠΊ Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π²
систСмС ΠΈ ΠΊΠ°ΠΊ Π΅Π΅ Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ Π·Π°Ρ‰ΠΈΡ‰Π°Ρ‚ΡŒ, Ρ‚ΠΈΠΏΠΎΠ² ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Ρ… систСм связи ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΡ… Ρ€Π°Π±ΠΎΡ‡ΠΈΡ… Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΎΠ²
ΠΈ Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΎΠ² окруТСния. ΠŸΡ€ΠΈ рассмотрСнии этих ΠΏΠΎΡ‚Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½Ρ‹Ρ… ΡƒΠ³Ρ€ΠΎΠ· Π² контСкстС ΠΈΡ… ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹Ρ… Ρ†Π΅Π»Π΅ΠΉ
ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности организация ΠΌΠΎΠΆΠ΅Ρ‚ ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ элСмСнты управлСния, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅
обСспСчат экономичСски цСлСсообразноС ΡƒΠΌΠ΅Π½ΡŒΡˆΠ΅Π½ΠΈΠ΅ рисков. ΠžΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½Ρ‹Π΅ элСмСнты управлСния
обСспСчили Π±Ρ‹ основу Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΊ функциям, прСдусмотрСнным Π² IDS.
ΠŸΡ€ΠΈΠΌΠ΅Ρ‡Π°Π½ΠΈΠ΅ Π£ΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΠ΅ рисками ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΡ€Π΅Π΄ΠΌΠ΅Ρ‚ΠΎΠΌ Π±ΡƒΠ΄ΡƒΡ‰Π΅Π³ΠΎ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠ³ΠΎ
стандарта (ISO/IEC 13335-2).
ПослС установки IDS слСдуСт ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΎΠ²Π°Ρ‚ΡŒ дСйствСнноС Ρ‚Π΅ΠΊΡƒΡ‰Π΅Π΅ ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΠ΅ рисками, Ρ‡Ρ‚ΠΎΠ±Ρ‹
пСриодичСски ΠΎΡ†Π΅Π½ΠΈΠ²Π°Ρ‚ΡŒ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ элСмСнтов управлСния ΠΏΡ€ΠΈ измСнСниях ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΉ систСмы ΠΈ
фактичСских ΡƒΠ³Ρ€ΠΎΠ·.
5.2 IDS Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹ ΠΈ сСти
ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ IDS Π΄ΠΎΠ»ΠΆΠ½ΠΎ ΠΎΡΠ½ΠΎΠ²Ρ‹Π²Π°Ρ‚ΡŒΡΡ Π½Π° ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ ΠžΡ†Π΅Π½ΠΊΠ΅ Риска ΠΈ ΠΏΡ€ΠΈΠΎΡ€ΠΈΡ‚Π΅Ρ‚Π°Ρ… Π·Π°Ρ‰ΠΈΡ‚Ρ‹
рСсурсов. ΠŸΡ€ΠΈ Π²Ρ‹Π±ΠΎΡ€Π΅ IDS Π΄ΠΎΠ»ΠΆΠ΅Π½ Π±Ρ‹Ρ‚ΡŒ ΠΈΠ·ΡƒΡ‡Π΅Π½ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ эффСктивный ΠΌΠ΅Ρ‚ΠΎΠ΄ контроля событий. IDS
Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹ (HIDS) ΠΈ Π½Π° Π±Π°Π·Π΅ сСти (NIDS) ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡ‚ΡŒΡΡ Π² Ρ‚Π°Π½Π΄Π΅ΠΌΠ΅. Если Π²Ρ‹Π±Ρ€Π°Π½ Ρ‚Π°ΠΊΠΎΠΉ
ΠΌΠ΅Ρ‚ΠΎΠ΄ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° IDS, организация Π΄ΠΎΠ»ΠΆΠ½Π° Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π΅Π³ΠΎ поэтапно, начиная с NIDS, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΎΠ½ΠΈ
ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ Π±ΠΎΠ»Π΅Π΅ простыС Π² установкС ΠΈ обслуТивании, Π·Π°Ρ‚Π΅ΠΌ слСдуСт ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ HIDS Π½Π°
отвСтствСнных сСрвСрах.
ΠšΠ°ΠΆΠ΄Ρ‹ΠΉ Π²Π°Ρ€ΠΈΠ°Π½Ρ‚ ΠΈΠΌΠ΅Π΅Ρ‚ свои достоинства ΠΈ нСдостатки. НапримСр, Π² случаС, ΠΊΠΎΠ³Π΄Π° IDS примСняСтся Π·Π°
ΠΏΡ€Π΅Π΄Π΅Π»Π°ΠΌΠΈ внСшнСго брандмауэра, IDS ΠΌΠΎΠΆΠ΅Ρ‚ Π³Π΅Π½Π΅Ρ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ большоС число Ρ‚Ρ€Π΅Π²ΠΎΠΆΠ½Ρ‹Ρ… сигналов,
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Π½Π΅ Ρ‚Ρ€Π΅Π±ΡƒΡŽΡ‚ Ρ‚Ρ‰Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π°, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΏΡ€ΠΈ сканировании ΠΌΠΎΠΆΠ΅Ρ‚ ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΡΡ‚ΡŒΡΡ большоС
число событий с прСдупрСТдСниями, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ эффСктивно ΠΏΡ€Π΅Π΄ΠΎΡ‚Π²Ρ€Π°Ρ‰Π°ΡŽΡ‚ΡΡ внСшним брандмауэром.
5.2.1 IDS Π½Π° Π±Π°Π·Π΅ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹
Π’Ρ‹Π±ΠΎΡ€ HIDS Ρ‚Ρ€Π΅Π±ΡƒΠ΅Ρ‚ ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ Ρ†Π΅Π»Π΅Π²Ρ‹Ρ… хост- машин. ΠŸΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΏΠΎΠ»Π½ΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ΅ ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅
HIDS Π½Π° ΠΊΠ°ΠΆΠ΄ΠΎΠΉ хост- машинС достаточно дорогостоящСС, Π² ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΎΠ±Ρ‹Ρ‡Π½ΠΎ HIDS ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ
Ρ‚ΠΎΠ»ΡŒΠΊΠΎ Π½Π° отвСтствСнных хост- ΠΌΠ°ΡˆΠΈΠ½Π°Ρ…. ΠŸΠΎΡΡ‚ΠΎΠΌΡƒ ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ HIDS Π΄ΠΎΠ»ΠΆΠ½ΠΎ ΠΈΠΌΠ΅Ρ‚ΡŒ ΠΏΡ€ΠΈΠΎΡ€ΠΈΡ‚Π΅Ρ‚Ρ‹ Π²
соотвСтствии с Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Π°ΠΌΠΈ Π°Π½Π°Π»ΠΈΠ·Π° риска ΠΈ ΡƒΡ‡Π΅Ρ‚Π° Π·Π°Ρ‚Ρ€Π°Ρ‚ – Π²Ρ‹Π³ΠΎΠ΄. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡ‚ΡŒ
IDS, способныС ΠΊ Ρ†Π΅Π½Ρ‚Ρ€Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½Π½ΠΎΠΌΡƒ ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΡŽ с функциями рСгистрации, Ссли HIDS ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ
Π½Π° всСх ΠΈΠ»ΠΈ Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΌ числС хост -машин.
5.2.2 IDS Π½Π° Π±Π°Π·Π΅ сСти
ΠŸΡ€ΠΈ использовании NIDS основной вопрос состоит Π² Ρ‚ΠΎΠΌ, Π³Π΄Π΅ Ρ€Π°Π·ΠΌΠ΅ΡΡ‚ΠΈΡ‚ΡŒ сСнсоры систСмы.
Π’Π°Ρ€ΠΈΠ°Π½Ρ‚Π°ΠΌΠΈ ΡΠ²Π»ΡΡŽΡ‚ΡΡ:
β€’ Π’Π½ΡƒΡ‚Ρ€ΠΈ внСшнСго брандмауэра;
β€’ Π—Π° ΠΏΡ€Π΅Π΄Π΅Π»Π°ΠΌΠΈ внСшнСго брандмауэра;
β€’ На Π³Π»Π°Π²Π½ΠΎΠΉ сСтСвой магистрали;
β€’ Π’ отвСтствСнных подсСтях.
8 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

5.3 ΠžΠ±ΡΡƒΠΆΠ΄Π΅Π½ΠΈΠ΅
5.3.1 ΠžΠΊΡ€ΡƒΠΆΠ΅Π½ΠΈΠ΅ систСмы
ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π½Π° основС ΠΎΡ†Π΅Π½ΠΊΠΈ риска бСзопасности Π΄ΠΎΠ»ΠΆΠ½Π° сначала ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ, Π² порядкС
ΠΏΡ€ΠΈΠΎΡ€ΠΈΡ‚Π΅Ρ‚ΠΎΠ², ΠΊΠ°ΠΊΠΈΠ΅ рСсурсы Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π·Π°Ρ‰ΠΈΡ‰Π°Ρ‚ΡŒΡΡ ΠΈ послС этого ΠΏΡ€ΠΈΡΠΏΠΎΡΠΎΠ±ΠΈΡ‚ΡŒ IDS ΠΊ этому ΠΎΠΊΡ€ΡƒΠΆΠ΅Π½ΠΈΡŽ.
Как ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, ΡΠ»Π΅Π΄ΡƒΡŽΡ‰Π°Ρ информация ΠΎ систСмном ΠΎΠΊΡ€ΡƒΠΆΠ΅Π½ΠΈΠΈ Π΄ΠΎΠ»ΠΆΠ½Π° ΡΠΎΠ±ΠΈΡ€Π°Ρ‚ΡŒΡΡ для достиТСния
этой Ρ†Π΅Π»ΠΈ:
β€’ Π‘Π΅Ρ‚Π΅Π²Ρ‹Π΅ Π³Ρ€Π°Ρ„ΠΈΠΊΠΈ ΠΈ ΠΊΠ°Ρ€Ρ‚Ρ‹, ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΡΡŽΡ‰ΠΈΠ΅ число ΠΈ располоТСниС хост- машин, Ρ‚ΠΎΡ‡ΠΊΠΈ Π²Ρ…ΠΎΠ΄Π° Π²
сСти ΠΈ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ ΠΊ внСшним сСтям;
β€’ ОписаниС систСмы управлСния сСтями прСдприятия;
β€’ ΠžΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ систСмы ΠΊΠ°ΠΆΠ΄ΠΎΠΉ хост- ΠΌΠ°ΡˆΠΈΠ½Ρ‹;
β€’ Число ΠΈ Ρ‚ΠΈΠΏΡ‹ сСтСвых устройств, Ρ‚Π°ΠΊΠΈΡ… ΠΊΠ°ΠΊ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ‚ΠΎΡ€Ρ‹, мосты ΠΈ ΠΏΠ΅Ρ€Π΅ΠΊΠ»ΡŽΡ‡Π°Ρ‚Π΅Π»ΠΈ;
β€’ Число ΠΈ Ρ‚ΠΈΠΏΡ‹ сСрвСров ΠΈ ΠΊΠΎΠΌΠΌΡƒΡ‚ΠΈΡ€ΡƒΠ΅ΠΌΡ‹Ρ… соСдинСний ΠΏΠΎ Ρ‚Π΅Π»Π΅Ρ„ΠΎΠ½Π½ΠΎΠΉ Π»ΠΈΠ½ΠΈΠΈ;
β€’ ДСскрипторы Π»ΡŽΠ±Ρ‹Ρ… сСтСвых сСрвСров, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ Ρ‚ΠΈΠΏΡ‹, ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ, ΠΏΡ€ΠΈΠΊΠ»Π°Π΄Π½ΠΎΠ΅ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ΅
обСспСчСниС ΠΈ вСрсии Ρ€Π΅ΠΆΠΈΠΌΠ° Π½Π° ΠΊΠ°ΠΆΠ΄ΠΎΠΌ;
β€’ ПодсоСдинСниС ΠΊ внСшним сСтям, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ Π½ΠΎΠΌΠΈΠ½Π°Π»ΡŒΠ½ΡƒΡŽ ΠΏΡ€ΠΎΠΏΡƒΡΠΊΠ½ΡƒΡŽ ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΈ
ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Π΅ΠΌΡ‹Π΅ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹;
β€’ ΠŸΡƒΡ‚ΠΈ Π²ΠΎΠ·Π²Ρ€Π°Ρ‚Π° Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΎΠ², ΠΎΡ‚Π»ΠΈΡ‡Π½Ρ‹Π΅ ΠΎΡ‚ входящСго ΡΠΎΠ΅Π΄ΠΈΠ½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ³ΠΎ ΠΏΡƒΡ‚ΠΈ, Ρ‚.Π΅. ассимСтричный
ΠΏΠΎΡ‚ΠΎΠΊ Π΄Π°Π½Π½Ρ‹Ρ….
5.3.2 ΠžΠ±Π΅ΡΠΏΠ΅Ρ‡Π΅Π½ΠΈΠ΅ бСзопасности
ПослС докумСнтирования тСхничСских характСристик окруТСния систСмы Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π±Ρ‹Ρ‚ΡŒ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Ρ‹
установлСнныС Π² настоящСС врСмя ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΡ‹ обСспСчСния сСкрСтности. НСобходима, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ,
ΡΠ»Π΅Π΄ΡƒΡŽΡ‰Π°Ρ информация:
β€’ ДСмилитаризованная Π—ΠΎΠ½Π° (DMZ)
β€’ Число, Ρ‚ΠΈΠΏΡ‹ ΠΈ Ρ€Π°Π·ΠΌΠ΅Ρ‰Π΅Π½ΠΈΠ΅ брандмауэров ΠΈ Ρ„ΠΈΠ»ΡŒΡ‚Ρ€ΡƒΡŽΡ‰ΠΈΡ… ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ‚ΠΎΡ€ΠΎΠ²;
β€’ Π˜Π΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ сСрвСров Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ;
β€’ ΠšΠΎΠ΄ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ Π΄Π°Π½Π½Ρ‹Ρ… ΠΈ связСй;
β€’ ΠŸΠ°ΠΊΠ΅Ρ‚Ρ‹ MALWARE/Антивирус;
β€’ БрСдства управлСния доступом;
β€’ Π‘ΠΏΠ΅Ρ†ΠΈΠ°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ тСхничСскиС срСдства Π·Π°Ρ‰ΠΈΡ‚Ρ‹, Ρ‚Π°ΠΊΠΈΠ΅ ΠΊΠ°ΠΊ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π»ΡŒΠ½ΠΎΠ΅ ΠΎΠ±ΠΎΡ€ΡƒΠ΄ΠΎΠ²Π°Π½ΠΈΠ΅;
β€’ Π’ΠΈΡ€Ρ‚ΡƒΠ°Π»ΡŒΠ½Ρ‹Π΅ частныС сСти;
β€’ Π›ΡŽΠ±Ρ‹Π΅ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ установлСнныС ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΡ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹.
5.3.3 ΠŸΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ° бСзопасности IDS
ПослС ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ систСмных ΠΈ ΠΎΠ±Ρ‰ΠΈΡ… условий бСзопасности Π΄ΠΎΠ»ΠΆΠ½Π° Π±Ρ‹Ρ‚ΡŒ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π° для IDS
ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ° бСзопасности. Для опрСдСлСния ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, трСбуСтся ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅
основныС вопросы:
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 9

β€’ КакиС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ рСсурсы Π΄ΠΎΠ»ΠΆΠ½Ρ‹ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ?
β€’ Какой Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌ Ρ‚ΠΈΠΏ IDS?
β€’ Π“Π΄Π΅ Π΄ΠΎΠ»ΠΆΠ½Π° Π±Ρ‹Ρ‚ΡŒ располоТСна IDS?
β€’ КакиС Ρ‚ΠΈΠΏΡ‹ Π°Ρ‚Π°ΠΊ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π²Ρ‹ΡΠ²Π»ΡΡ‚ΡŒΡΡ?
β€’ Какой Ρ‚ΠΈΠΏ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π΄ΠΎΠ»ΠΆΠ΅Π½ Ρ€Π΅Π³ΠΈΡΡ‚Ρ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ?
β€’ Какой Ρ‚ΠΈΠΏ рСагирования ΠΈΠ»ΠΈ прСдупрСТдСния ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΡ€Π΅Π΄ΡƒΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°Ρ‚ΡŒΡΡ ΠΏΡ€ΠΈ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠΈ
Π°Ρ‚Π°ΠΊΠΈ?
ΠŸΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ° бСзопасности IDS прСдставляСт собой Ρ†Π΅Π»ΠΈ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ организация ставит ΠΏΡ€ΠΈ
инвСстировании Π² IDS. Π­Ρ‚ΠΎ – ΠΏΠ΅Ρ€Π²ΠΎΠ½Π°Ρ‡Π°Π»ΡŒΠ½Ρ‹ΠΉ шаг Π² ΠΏΠΎΠΏΡ‹Ρ‚ΠΊΠ΅ ΠΏΠΎΠ»ΡƒΡ‡ΠΈΡ‚ΡŒ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½ΡƒΡŽ Π²Ρ‹Π³ΠΎΠ΄Ρƒ ΠΎΡ‚
примСнСния IDS.
Для опрСдСлСния Ρ‚Ρ€Π΅Π±ΡƒΠ΅ΠΌΡ‹Ρ… ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»Π΅ΠΉ ΠΈ Ρ†Π΅Π»Π΅ΠΉ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ бСзопасности IDS организация Π΄ΠΎΠ»ΠΆΠ½Π°
сначала ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ риски ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈΠ· Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½ΠΈΡ… ΠΈ Π²Π½Π΅ΡˆΠ½ΠΈΡ… источников. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π°
ΠΏΠΎΠ½ΠΈΠΌΠ°Ρ‚ΡŒ, Ρ‡Ρ‚ΠΎ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ поставщики IDS ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΡΡŽΡ‚ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΡƒ бСзопасности IDS ΠΊΠ°ΠΊ Π½Π°Π±ΠΎΡ€ ΠΏΡ€Π°Π²ΠΈΠ»,
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ IDS ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ для Π²Ρ‹Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ.
Анализ ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‰Π΅ΠΉ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ бСзопасности Π΄ΠΎΠ»ΠΆΠ΅Π½ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ шаблон, ΠΏΠΎ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌΡƒ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ
ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Ρ‹ ΠΈ установлСны трСбования ΠΊ IDS Π² Π²ΠΈΠ΄Π΅ стандартных Ρ†Π΅Π»Π΅ΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΊΠΎΠ½Ρ„ΠΈΠ΄Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ,
цСлостности, доступности ΠΈ нСвозмоТности ΠΎΡ‚ΠΊΠ°Π·Π° ΠΎΡ‚ авторства, Π° Ρ‚Π°ΠΊΠΆΠ΅ Π±ΠΎΠ»Π΅Π΅ ΠΎΠ±Ρ‰ΠΈΠ΅ Ρ†Π΅Π»ΠΈ
управлСния, Ρ‚Π°ΠΊΠΈΠ΅ ΠΊΠ°ΠΊ ΡΠ΅ΠΊΡ€Π΅Ρ‚Π½ΠΎΡΡ‚ΡŒ, Π·Π°Ρ‰ΠΈΡ‚Π° ΠΎΡ‚ Π²Π½Π΅ΡˆΠ½ΠΈΡ… ΠΏΠΎΠΌΠ΅Ρ…, ΡƒΠΏΡ€Π°Π²Π»ΡΠ΅ΠΌΠΎΡΡ‚ΡŒ.
ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ, ΠΊΠ°ΠΊ Π΅ΠΉ Ρ€Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ, ΠΊΠΎΠ³Π΄Π° IDS ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΡ‚, Ρ‡Ρ‚ΠΎ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ° бСзопасности
Π±Ρ‹Π»Π° Π½Π°Ρ€ΡƒΡˆΠ΅Π½Π°. ОсобСнно Π² случаС, ΠΊΠΎΠ³Π΄Π° организация Ρ…ΠΎΡ‡Π΅Ρ‚ Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎ Ρ€Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π½Π° ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½Ρ‹Π΅
ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΠΈ Π½Π°Ρ€ΡƒΡˆΠ΅Π½ΠΈΠΉ, IDS Π΄ΠΎΠ»ΠΆΠ½Π° Π±Ρ‹Ρ‚ΡŒ сконфигурирована для выполнСния этого, Π° Ρ€Π°Π±ΠΎΡ‡ΠΈΠΉ пСрсонал
Π΄ΠΎΠ»ΠΆΠ΅Π½ Π±Ρ‹Ρ‚ΡŒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ ΠΎ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ΅ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹Ρ… дСйствий ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ с Ρ‚Π΅ΠΌ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ ΠΎΠ½ ΠΌΠΎΠ³
ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ с прСдупрСТдСниями. НапримСр, ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΠΎΡ‚Ρ€Π΅Π±ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΏΡ€Π°Π²ΠΎΠ²ΠΎΠ΅
расслСдованиС для содСйствия Π² эффСктивном Ρ€Π°Π·Ρ€Π΅ΡˆΠ΅Π½ΠΈΠΈ ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π° ΠΏΡ€ΠΈ обСспСчСнии бСзопасности.
ΠœΠΎΠΆΠ΅Ρ‚ ΠΏΠΎΡ‚Ρ€Π΅Π±ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰Π°Ρ информация, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ ΠΆΡƒΡ€Π½Π°Π»Ρ‹ рСгистрации IDS, для
ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ Π² ΠΏΡ€Π°Π²ΠΎΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡŽΡ‰ΠΈΠΉ ΠΎΡ€Π³Π°Π½ для Ρ†Π΅Π»Π΅ΠΉ Π΄ΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²Π°.
Π”ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΏΠΎ ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΡŽ ΠΏΡ€ΠΈ ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π°Ρ… бСзопасности ΠΌΠΎΠΆΠ½ΠΎ Π½Π°ΠΉΡ‚ΠΈ Π²
ISO/IEC TR 18044.
5.3.4 Π­Ρ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ
Π­Ρ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ – это Π΄Ρ€ΡƒΠ³ΠΎΠΉ рассматриваСмый Ρ„Π°ΠΊΡ‚ΠΎΡ€ ΠΏΡ€ΠΈ Π²Ρ‹Π±ΠΎΡ€Π΅ IDS. Как ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ
ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы:
β€’ Какая пропускная ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ трСбуСтся IDS?
β€’ Каков ΡƒΡ€ΠΎΠ²Π΅Π½ΡŒ сигналов Π»ΠΎΠΆΠ½ΠΎΠΉ Ρ‚Ρ€Π΅Π²ΠΎΠ³ΠΈ ΠΌΠΎΠΆΠ΅Ρ‚ Π΄ΠΎΠΏΡƒΡΠΊΠ°Ρ‚ΡŒΡΡ ΠΏΡ€ΠΈ Ρ€Π°Π±ΠΎΡ‚Π΅ с этой пропускной
ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒΡŽ?
β€’ ΠœΠΎΠΆΠ΅Ρ‚ Π»ΠΈ Π±Ρ‹Ρ‚ΡŒ ΠΎΠΏΡ€Π°Π²Π΄Π°Π½Π° Π±Ρ‹ΡΡ‚Ρ€ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΡƒΡŽΡ‰Π°Ρ IDS ΠΈΠ»ΠΈ ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ ΠΎΠΏΡ€Π°Π²Π΄Π°Π½Π° умСрСнная ΠΈΠ»ΠΈ
мСдлСнная IDS?
β€’ ΠšΠ°ΠΊΠΎΠ²Ρ‹ послСдствия пропуска ΠΏΠΎΡ‚Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ вторТСния ΠΈΠ·-Π·Π° ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½ΠΈΠΉ пропускной
способности?
Устойчивая ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π° ΠΊΠ°ΠΊ ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ²Π°Ρ‚ΡŒ
Π°Ρ‚Π°ΠΊΠΈ Π² Ρ€Π°ΠΌΠΊΠ°Ρ… использования Π·Π°Π΄Π°Π½Π½ΠΎΠΉ пропускной способности. Π’ Π±ΠΎΠ»ΡŒΡˆΠΈΠ½ΡΡ‚Π²Π΅ срСдах сущСствуСт
нСбольшой допуск для пропускаСмых ΠΈΠ»ΠΈ отбрасываСмых IDS ΠΏΠ°ΠΊΠ΅Ρ‚ΠΎΠ² Π² Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ΅, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ
Ρ‡Π°ΡΡ‚ΡŒΡŽ Π°Ρ‚Π°ΠΊΠΈ. Π’ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ Ρ‚ΠΎΡ‡ΠΊΠ΅ ΠΏΡ€ΠΈ возрастании пропускной способности ΠΈ/ΠΈΠ»ΠΈ Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° ΠΌΠ½ΠΎΠ³ΠΈΠ΅ IDS
10 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

Π½Π΅ ΠΌΠΎΠ³ΡƒΡ‚ большС эффСктивно ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ²Π°Ρ‚ΡŒ вторТСния.
Π‘ΠΎΡ‡Π΅Ρ‚Π°Π½ΠΈΠ΅ балансировки Π½Π°Π³Ρ€ΡƒΠ·ΠΊΠΈ ΠΈ настройки ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΠΎΠ²Ρ‹ΡΠΈΡ‚ΡŒ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΈ Ρ€Π°Π±ΠΎΡ‡ΠΈΠ΅
характСристики. НапримСр:
β€’ НСобходимы знания ΠΎ сСти ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ Π΅Π΅ слабых мСстах: КаТдая ΡΠ΅Ρ‚ΡŒ Π½Π΅ ΠΏΠΎΡ…ΠΎΠΆΠ° Π½Π° Π΄Ρ€ΡƒΠ³ΡƒΡŽ;
организация Π΄ΠΎΠ»ΠΆΠ½Π° ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ, ΠΊΠ°ΠΊΠΈΠ΅ рСсурсы сСти Ρ‚Ρ€Π΅Π±ΡƒΡŽΡ‚ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈ какая настройка
сигнатуры Π°Ρ‚Π°ΠΊΠΈ соотвСтствуСт этим рСсурсам. Π’ ΠΎΠ±Ρ‰Π΅ΠΌ случаС это выполняСтся с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ
процСсса ΠΎΡ†Π΅Π½ΠΊΠΈ риска.
β€’ Π Π°Π±ΠΎΡ‡ΠΈΠ΅ характСристики Π±ΠΎΠ»ΡŒΡˆΠΈΠ½ΡΡ‚Π²Π° IDS ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΡƒΠ»ΡƒΡ‡ΡˆΠ΅Π½Ρ‹ Π² случаС, ΠΊΠΎΠ³Π΄Π° ΠΎΠ½ΠΈ
ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€ΠΈΡ€ΡƒΡŽΡ‚ΡΡ для ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½Π½ΠΎΠ³ΠΎ Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° ΠΈ услуг сСти. НапримСр, ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ,
которая ΠΌΠ½ΠΎΠ³ΠΎ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ ΡΠ»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΡƒΡŽ ΠΊΠΎΠΌΠΌΠ΅Ρ€Ρ†ΠΈΡŽ, ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΠΎΡ‚Ρ€Π΅Π±ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ вСсь
Ρ‚Ρ€Π°Ρ„ΠΈΠΊ с ΠŸΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΎΠΌ ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ гипСртСкстовых Ρ„Π°ΠΉΠ»ΠΎΠ² (HTTP) ΠΈ Π½Π°ΡΡ‚Ρ€Π°ΠΈΠ²Π°Ρ‚ΡŒ ΠΎΠ΄Π½Ρƒ ΠΈΠ»ΠΈ
нСсколько IDS для просмотра сигнатур Π°Ρ‚Π°ΠΊ, связанных с Π²Π΅Π±- Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠΎΠΌ.
β€’ НадлСТащая конфигурация с балансировкой Π½Π°Π³Ρ€ΡƒΠ·ΠΊΠΈ ΠΌΠΎΠΆΠ΅Ρ‚ Π΄Π°Ρ‚ΡŒ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ сигнатурС Π½Π°
Π±Π°Π·Π΅ IDS Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ Π³ΠΎΡ€Π°Π·Π΄ΠΎ быстрСС ΠΈ Π±ΠΎΠ»Π΅Π΅ ΠΎΡΠ½ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ сигнатура Π½Π° Π±Π°Π·Π΅ IDS
Ρ‚Ρ€Π΅Π±ΡƒΠ΅Ρ‚ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ Π½Π° ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠΉ нСбольшой Π±Π°Π·Π΅ Π΄Π°Π½Π½Ρ‹Ρ… сигнатур Π°Ρ‚Π°ΠΊΠΈ, Π° Π½Π΅ Π½Π°
Π±Π°Π·Π΅ Π΄Π°Π½Π½Ρ‹Ρ… всСх Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Ρ… сигнатур.
Балансировка Π·Π°Π³Ρ€ΡƒΠ·ΠΊΠΈ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ для раздСлСния доступной пропускной способности ΠΏΡ€ΠΈ
использовании IDS. Однако ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½ΠΈΠ΅ пропускной способности ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ связано с трудностями,
Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€: Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌΠΈ Π·Π°Ρ‚Ρ€Π°Ρ‚Π°ΠΌΠΈ, расходами Π½Π° ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΠ΅, дСсинхронизациСй Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°,
Π΄ΡƒΠ±Π»ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ ΠΈ ΠΎΡˆΠΈΠ±ΠΎΡ‡Π½Ρ‹ΠΌ ΠΎΡ‚ΠΊΠ°Π·ΠΎΠΌ Π² доступС. Π‘ΠΎΠ»Π΅Π΅ Ρ‚ΠΎΠ³ΠΎ, тСкущая тСхнология IDS
ΠΈΠΌΠ΅Π΅Ρ‚ Π³ΠΈΠ³Π°Π±Π°ΠΉΡ‚Π½Ρ‹Π΅ скорости, Π² Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Π΅ Π²Ρ‹Π³ΠΎΠ΄Ρ‹ ΠΏΠΎ ΡΡ€Π°Π²Π½Π΅Π½ΠΈΡŽ с Π·Π°Ρ‚Ρ€Π°Ρ‚Π°ΠΌΠΈ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ
ΠΌΠΈΠ½ΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹ΠΌΠΈ.
5.3.5 ΠŸΡ€ΠΎΠ²Π΅Ρ€ΠΊΠ° возмоТностСй
Π”ΠΎΠ²Π΅Ρ€ΠΈΠ΅ ΠΊ прСдоставляСмой поставщиком ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΏΠΎ возмоТностям IDS, ΠΊΠ°ΠΊ ΠΏΡ€Π°Π²ΠΈΠ»ΠΎ, Π½Π΅
достаточноС. ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Π΄ΠΎΠ»ΠΆΠ½Π° Π·Π°Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Ρ‚ΡŒ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΈ, Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ,
Π΄Π΅ΠΌΠΎΠ½ΡΡ‚Ρ€Π°Ρ†ΠΈΡŽ пригодности ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½ΠΎΠΉ IDS ΠΊ срСдС ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ цСлям бСзопасности. Π‘ΠΎΠ»ΡŒΡˆΠΈΠ½ΡΡ‚Π²ΠΎ
поставщиков ΠΈΠΌΠ΅ΡŽΡ‚ ΠΎΠΏΡ‹Ρ‚ Π² Π°Π΄Π°ΠΏΡ‚Π°Ρ†ΠΈΠΈ ΠΈΡ… ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² IDS, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ Ρ†Π΅Π»Π΅Π²Ρ‹Π΅ сСти Π²ΠΎΠ·Ρ€Π°ΡΡ‚Π°ΡŽΡ‚, Π°
Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΡΠ²ΡΠ·Ρ‹Π²Π°ΡŽΡ‚ сСбя ΠΎΠ±ΡΠ·Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²ΠΎΠΌ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Ρ‚ΡŒ Π½ΠΎΠ²Ρ‹Π΅ стандарты ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΎΠ², Ρ‚ΠΈΠΏΡ‹
ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌ ΠΈ измСнСния Π² срСдС ΡƒΠ³Ρ€ΠΎΠ·. Как ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, организация Π΄ΠΎΠ»ΠΆΠ½Π° Π²Ρ‹ΡΡΠ½ΠΈΡ‚ΡŒ Ρƒ поставщика IDS
ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы:
β€’ КакиС прСдполоТСния сдСланы ΠΎΡ‚Π½ΠΎΡΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ примСнимости IDS ΠΊ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹ΠΌ окруТСниям?
β€’ ΠšΠ°ΠΊΠΎΠ²Ρ‹ Π΄Π΅Ρ‚Π°Π»ΡŒΠ½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅ тСстов, ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ‹Ρ… для ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ ΡƒΡ‚Π²Π΅Ρ€ΠΆΠ΄Π΅Π½ΠΈΠΉ ΠΎ возмоТностях
IDS?
β€’ КакиС прСдполоТСния сдСланы ΠΏΠΎ ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π°ΠΌ IDS?
β€’ КакиС прСдусмотрСны интСрфСйсы IDS (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, физичСскиС интСрфСйсы, ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅
ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹, Ρ„ΠΎΡ€ΠΌΠ°Ρ‚Ρ‹ сообщСний ΠΏΡ€ΠΈ взаимодСйствии с подсоСдинСнными устройствами
ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°ΡŽΡ‚ΡΡ для всСх Ρ‚ΠΈΠΏΠΎΠ² Π²Π°ΠΆΠ½Ρ‹Ρ… интСрфСйсов)?
β€’ ΠšΠ°ΠΊΠΎΠ²Ρ‹ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΡ‹ экспорта ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ ΠΈΠ»ΠΈ сообщСний ΠΈΠ»ΠΈ Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ Π»ΠΈ ΠΎΠ½ΠΈ
Π½Π°Π΄Π»Π΅ΠΆΠ°Ρ‰ΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, сообщСния ΠΎ Ρ„ΠΎΡ€ΠΌΠ°Ρ‚Π°Ρ… ΠΈΠ»ΠΈ сообщСния для систСмного
ΠΆΡƒΡ€Π½Π°Π»Π°, ΠΈΠ»ΠΈ MIB для сообщСний SNMP)?
β€’ ΠœΠΎΠΆΠ΅Ρ‚ Π»ΠΈ интСрфСйс IDS ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ быстрых клавиш, настраиваСмых
Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ сигнализации ΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΡΠΊΠΈΡ… сигнатур Π°Ρ‚Π°ΠΊΠΈ Π² процСссС Ρ€Π°Π±ΠΎΡ‚Ρ‹?
β€’ Π’ случаС, ΠΊΠΎΠ³Π΄Π° IDS ΠΌΠΎΠΆΠ΅Ρ‚ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π² процСссС Ρ€Π°Π±ΠΎΡ‚Ρ‹, ΠΊΠ°ΠΊ Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ ΠΈ
ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°ΡŽΡ‚ΡΡ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΠ²Π°ΡŽΡ‚ эту Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ?
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 11

β€’ ΠœΠΎΠΆΠ΅Ρ‚ Π»ΠΈ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ Π°Π΄Π°ΠΏΡ‚ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΊ Ρ€Π°ΡΡˆΠΈΡ€Π΅Π½ΠΈΡŽ ΠΈ измСнСнию инфраструктуры систСм
ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ?
β€’ ΠœΠΎΠΆΠ΅Ρ‚ Π»ΠΈ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ IDS Π°Π΄Π°ΠΏΡ‚ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ ΠΊ Ρ€Π°ΡΡˆΠΈΡ€ΡΡŽΡ‰Π΅ΠΉΡΡ ΠΈ всС Π±ΠΎΠ»Π΅Π΅ Ρ€Π°Π·Π½ΠΎΡ‚ΠΈΠΏΠ½ΠΎΠΉ сСти?
β€’ ΠžΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΠ²Π°Π΅Ρ‚ Π»ΠΈ IDS возмоТности отказобСзопасности ΠΈ восстановлСния послС ΠΎΡ‚ΠΊΠ°Π·Π° ΠΈ ΠΊΠ°ΠΊ эти
возмоТности ΠΎΠ±ΡŠΠ΅Π΄ΠΈΠ½ΡΡŽΡ‚ΡΡ с Ρ‚Π°ΠΊΠΈΠΌΠΈ ΠΆΠ΅ возмоТностями Π½Π° канальном ΡƒΡ€ΠΎΠ²Π½Π΅ сСти?
β€’ Π˜ΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ Π»ΠΈ IDS Π²Ρ‹Π΄Π΅Π»Π΅Π½Π½ΡƒΡŽ ΡΠ΅Ρ‚ΡŒ для Ρ‚Ρ€Π΅Π²ΠΎΠΆΠ½Ρ‹Ρ… ΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΠΈΠ»ΠΈ ΠΎΠ½ΠΈ ΠΏΠ΅Ρ€Π΅Π΄Π°ΡŽΡ‚ΡΡ ΠΏΠΎ Ρ‚ΠΎΠΉ ΠΆΠ΅
сСти, которая контролируСтся?
β€’ Какова рСпутация поставщика ΠΈ Π΄Π°Π½Π½Ρ‹Π΅ ΠΎΠ± эффСктивности ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π°?
5.3.6 Π‘Ρ‚ΠΎΠΈΠΌΠΎΡΡ‚ΡŒ
ΠŸΡ€ΠΈΠΎΠ±Ρ€Π΅Ρ‚Π΅Π½ΠΈΠ΅ IDS Π½Π΅ составляСт Π΄Π΅ΠΉΡΡ‚Π²ΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ Π΅Π΅ ΡΡ‚ΠΎΠΈΠΌΠΎΡΡ‚ΡŒ. Π”ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‚:
ΠΏΡ€ΠΈΠΎΠ±Ρ€Π΅Ρ‚Π΅Π½ΠΈΠ΅ систСмы для запуска ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ³ΠΎ обСспСчСния IDS, ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½ΡƒΡŽ ΠΏΠΎΠΌΠΎΡ‰ΡŒ Π²
инсталляции ΠΈ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠΈ IDS, ΠΎΠ±ΡƒΡ‡Π΅Π½ΠΈΠ΅ пСрсонала ΠΈ Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π½Π° обслуТиваниС. ΠŸΠ΅Ρ€ΡΠΎΠ½Π°Π» для
управлСния ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ΠΎΠ² стоит ΠΎΡ‡Π΅Π½ΡŒ Π΄ΠΎΡ€ΠΎΠ³ΠΎ. ΠŸΠΎΠ»Π΅Π·Π½Ρ‹ΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ для измСрСния стоимости IDS
состоит Π² Ρ€Π΅Π½Ρ‚Π°Π±Π΅Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ инвСстиций (ROI) ΠΈΠ»ΠΈ Π² стоимости Π² зависимости ΠΎΡ‚ Π°Π½Π°Π»ΠΈΠ·Π° ΠΏΡ€ΠΈΠ±Ρ‹Π»ΠΈ. Π’
этом случаС ROI вычисляСтся Π½Π° основС сбСрСТСний, Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½Π½Ρ‹Ρ… ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠ΅ΠΉ ΠΏΡ€ΠΈ
администрировании Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ. Π—Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π½Π° ΠΏΡ€ΠΈΠΎΠ±Ρ€Π΅Ρ‚Π΅Π½ΠΈΠ΅ IDS ΠΈ потрСбности для эксплуатации
Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π±Ρ‹Ρ‚ΡŒ сбалансированы с Π·Π°Ρ‚Ρ€Π°Ρ‚Π°ΠΌΠΈ Π½Π° пСрсонал, Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹ΠΉ для ΠΏΠΎΠΌΠΎΡ‰ΠΈ Π² Ρ€Π°Π·Ρ€Π΅ΡˆΠ΅Π½ΠΈΠΈ
ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ, ΠΈ Π½Π΅ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌΠΈ Π·Π°Ρ‚Ρ€Π°Ρ‚Π°ΠΌΠΈ, Π²Ρ‹Π·Π²Π°Π½Π½Ρ‹ΠΌΠΈ Π»ΠΎΠΆΠ½Ρ‹ΠΌΠΈ прСдупрСТдСниями ΠΈ
Π½Π΅ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠΌΠΈ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹ΠΌΠΈ дСйствиями, Ρ‚Π°ΠΊΠΈΠΌΠΈ ΠΊΠ°ΠΊ пСрСустановка Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы ΠΈΠ·-
Π·Π° нСвозмоТности ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ, Ρ‡Ρ‚ΠΎ Π±Ρ‹Π»ΠΎ скомпромСтировано.
ЭксплуатационныС Π²Ρ‹Π³ΠΎΠ΄Ρ‹ IDS Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‚:
β€’ Π˜Π΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡŽ Π΄Π΅Ρ„Π΅ΠΊΡ‚Π½ΠΎΠ³ΠΎ ΠΈΠ»ΠΈ Π½Π΅ΠΏΡ€Π°Π²ΠΈΠ»ΡŒΠ½ΠΎ сконфигурированного оборудования;
β€’ ΠŸΡ€ΠΎΠ²Π΅Ρ€ΠΊΡƒ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΉ Π² процСссС Ρ€Π°Π±ΠΎΡ‚Ρ‹;
β€’ ΠžΠ±Π΅ΡΠΏΠ΅Ρ‡Π΅Π½ΠΈΠ΅ своСврСмСнной статистики использования систСмы.
Для принятия финансовых Ρ€Π΅ΡˆΠ΅Π½ΠΈΠΉ ΠΏΠΎ IDS Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° вопросы ΠΎΠ± ΠΎΠ±Ρ‰Π΅ΠΉ стоимости IDS.
Для этого Π΄ΠΎΠ»ΠΆΠ½Ρ‹ Π±Ρ‹Ρ‚ΡŒ ΠΏΡ€ΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ IDS Π²ΠΎ всСй ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ. Как
ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, для Π°Π½Π°Π»ΠΈΠ·Π° стоимости IDS Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы:
β€’ Каков Π±ΡŽΠ΄ΠΆΠ΅Ρ‚ для Π½Π°Ρ‡Π°Π»ΡŒΠ½Ρ‹Ρ… ΠΊΠ°ΠΏΠΈΡ‚Π°Π»ΡŒΠ½Ρ‹Ρ… Π·Π°Ρ‚Ρ€Π°Ρ‚ Π½Π° ΠΏΠΎΠΊΡƒΠΏΠΊΡƒ IDS?
β€’ Каков Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹ΠΉ Π²Ρ€Π΅ΠΌΠ΅Π½Π½ΠΎΠΉ ΠΏΠ΅Ρ€ΠΈΠΎΠ΄ для эксплуатации IDS, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, 24/7 ΠΈΠ»ΠΈ мСньшС?
β€’ Какая трСбуСтся инфраструктура для ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ, Π°Π½Π°Π»ΠΈΠ·Π° ΠΈ рСгистрации Π²Ρ‹Ρ…ΠΎΠ΄Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… IDS ΠΈ
ΠΊΠ°ΠΊΠΎΠ²Π° Π΅Π΅ ΡΡ‚ΠΎΠΈΠΌΠΎΡΡ‚ΡŒ?
β€’ Π˜ΠΌΠ΅Π΅Ρ‚ Π»ΠΈ организация людскиС ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ рСсурсы, Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹Π΅ для конфигурирования IDS Π²
соотвСтствии с ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΎΠΉ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ для эксплуатации, поддСрТания, обновлСния, ΠΊΠΎΠ½Ρ‚роля
Π²Ρ‹Ρ…ΠΎΠ΄Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… IDS ΠΈ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹Ρ… дСйствий Π½Π° прСдупрСТдСния? Если Π½Π΅Ρ‚, Ρ‚ΠΎ ΠΊΠ°ΠΊ эти Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ
Π±ΡƒΠ΄ΡƒΡ‚ Π²Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒΡΡ?
β€’ Π˜ΠΌΠ΅ΡŽΡ‚ΡΡ Π»ΠΈ финансовыС срСдства Π½Π° ΠΏΡ€ΠΎΡ„Π΅ΡΡΠΈΠΎΠ½Π°Π»ΡŒΠ½ΡƒΡŽ ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΡƒ для IDS?
β€’ Каков ΠΌΠ°ΡΡˆΡ‚Π°Π± примСнСния ΠΈ, Ссли ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ HIDS, ΠΊΠ°ΠΊ ΠΌΠ½ΠΎΠ³ΠΎ хост- машин Π±ΡƒΠ΄Π΅Ρ‚
Π·Π°Ρ‰ΠΈΡ‰Π°Ρ‚ΡŒΡΡ?
Π—Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π² ΠΎΡ‚Π΄Π΅Π»ΡŒΠ½ΠΎΠΉ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΡƒΠΌΠ΅Π½ΡŒΡˆΠ΅Π½Ρ‹ ΠΏΡƒΡ‚Π΅ΠΌ совмСстного использования
Π½Π°ΠΊΠ»Π°Π΄Π½Ρ‹Ρ… расходов Ρ‡Π΅Ρ€Π΅Π· использованиС Π²Π½Π΅ΡˆΠ½ΠΈΡ… рСсурсов для Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° ΠΈ
обслуТивания IDS Ρƒ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π° услуг ΠΏΡ€ΠΈ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎ управляСмом ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠΈ Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ.
12 Β© ISO/IEC 2006 – ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ

НаиболСС дорогостоящСй Ρ‡Π°ΡΡ‚ΡŒΡŽ примСнСния IDS ΡΠ²Π»ΡΡŽΡ‚ΡΡ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹Π΅ дСйствия. Если ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π°
отвСтная рСакция, дальнСйшиС Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Π΄ΠΎΠ»ΠΆΠ½Ρ‹ ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Ρ‚ΡŒΡΡ, Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‚
созданиС ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΈΠ²Π½ΠΎΠΉ Π³Ρ€ΡƒΠΏΠΏΡ‹, Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΡƒ ΠΈ Π²Π²ΠΎΠ΄ Π² дСйствиС ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΎΡ‚Π²Π΅Ρ‚Π½Ρ‹Ρ… дСйствий, ΠΎΠ±ΡƒΡ‡Π΅Π½ΠΈΠ΅ ΠΈ
Ρ‚Ρ€Π΅Π½ΠΈΡ€ΠΎΠ²ΠΊΡƒ пСрсонала.
5.3.7 ОбновлСния
Π‘ΠΎΠ»ΡŒΡˆΠΈΠ½ΡΡ‚Π²ΠΎ IDS основаны Π½Π° сигнатурС Π°Ρ‚Π°ΠΊ, ΠΈ Ρ†Π΅Π½Π½ΠΎΡΡ‚ΡŒ IDS зависит ΠΎΡ‚ Π±Π°Π·Ρ‹ Π΄Π°Π½Π½Ρ‹Ρ… сигнатур Π°Ρ‚Π°ΠΊ,
Π½Π° Π±Π°Π·Π΅ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΡƒΡŽΡ‚ΡΡ события. Часто Π²Ρ‹ΡΠ²Π»ΡΡŽΡ‚ΡΡ Π½ΠΎΠ²Ρ‹Π΅ слабыС мСста ΠΈ Π°Ρ‚Π°ΠΊΠΈ.
Π‘Π»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ, Π±Π°Π·Π° Π΄Π°Π½Π½Ρ‹Ρ… сигнатур Π°Ρ‚Π°ΠΊ Π΄ΠΎΠ»ΠΆΠ½Π° часто ΠΎΠ±Π½ΠΎΠ²Π»ΡΡ‚ΡŒΡΡ. ΠŸΠΎΡΡ‚ΠΎΠΌΡƒ, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ,
организация Π΄ΠΎΠ»ΠΆΠ½Π° Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°Ρ‚ΡŒ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹:
β€’ Π‘Π²ΠΎΠ΅Π²Ρ€Π΅ΠΌΠ΅Π½Π½ΠΎΡΡ‚ΡŒ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ;
β€’ Π­Ρ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½Π΅Π³ΠΎ распространСния;
β€’ РСализация;
β€’ ВлияниС Π½Π° систСму.
5.3.7.1 Π‘Π²ΠΎΠ΅Π²Ρ€Π΅ΠΌΠ΅Π½Π½ΠΎΡΡ‚ΡŒ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ для IDS, основанных Π½Π° сигнатурах
ΠŸΠΎΠ΄Π΄Π΅Ρ€ΠΆΠ°Π½ΠΈΠ΅ Ρ‚Π΅ΠΊΡƒΡ‰ΠΈΡ… сигнатур Π°Ρ‚Π°ΠΊ Π²Π°ΠΆΠ½ΠΎ для обнаруТСния извСстных Π°Ρ‚Π°ΠΊ. Для обСспСчСния
своСврСмСнных ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ сигнатур Π°Ρ‚Π°ΠΊ, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ Ρ€Π°ΡΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅
вопросы:
β€’ Как быстро поставщик IDS выпускаСт обновлСния сигнатур ΠΏΡ€ΠΈ эксплуатации ΠΈΠ»ΠΈ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠΈ
ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹Ρ… слабых мСст?
β€’ НадСТСн Π»ΠΈ процСсс увСдомлСния?
β€’ ГарантируСтся Π»ΠΈ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ‡Π½ΠΎΡΡ‚ΡŒ ΠΈ Ρ†Π΅Π»ΠΎΡΡ‚Π½ΠΎΡΡ‚ΡŒ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ сигнатуры Π°Ρ‚Π°ΠΊΠΈ?
β€’ Достаточна Π»ΠΈ квалификация Π² случаС, ΠΊΠΎΠ³Π΄Π° сигнатуры Π°Ρ‚Π°ΠΊ Π½Π°ΡΡ‚Ρ€Π°ΠΈΠ²Π°ΡŽΡ‚ΡΡ Π² Ρ€Π°ΠΌΠΊΠ°Ρ…
ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ?
β€’ МоТно Π»ΠΈ Π·Π°ΠΏΠΈΡΠ°Ρ‚ΡŒ ΠΈΠ»ΠΈ ΠΏΠΎΠ»ΡƒΡ‡ΠΈΡ‚ΡŒ Π·Π°ΠΊΠ°Π·Π½Ρ‹Π΅ сигнатуры Π°Ρ‚Π°ΠΊ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ Π½Π΅ΠΌΠ΅Π΄Π»Π΅Π½Π½ΠΎ ΠΎΡ‚Ρ€Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π½Π°
опасныС уязвимости ΠΈΠ»ΠΈ Π½Π° ΠΏΡ€ΠΎΠΈΡΡ…ΠΎΠ΄ΡΡ‰ΡƒΡŽ Π² настоящСС врСмя Π°Ρ‚Π°ΠΊΡƒ?
5.3.7.2 Π­Ρ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½Π΅Π³ΠΎ распространСния ΠΈ рСализация
Бпособна Π»ΠΈ организация быстро Ρ€Π°ΡΠΏΡ€Π΅Π΄Π΅Π»ΠΈΡ‚ΡŒ ΠΈ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Ρ‚ΡŒ зависящиС ΠΎΡ‚ мСстных условий
обновлСния Π·Π° Π²Ρ‹Π΄Π΅Π»Π΅Π½Π½Ρ‹ΠΉ ΠΏΠ΅Ρ€ΠΈΠΎΠ΄ Π²Ρ€Π΅ΠΌΠ΅Π½ΠΈ Π²ΠΎ всСх Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹Ρ… систСмах? Π’ΠΎ ΠΌΠ½ΠΎΠ³ΠΈΡ… случаях
ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠ΅ сигнатур Π°Ρ‚Π°ΠΊ Π΄ΠΎΠ»ΠΆΠ½ΠΎ ΠΌΠΎΠ΄ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ с Π²ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ΠΌ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹Ρ… IP - адрСсов, ΠΏΠΎΡ€Ρ‚ΠΎΠ² ΠΈ
Π΄Ρ€. Π‘ΠΎΠ»Π΅Π΅ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½ΠΎ, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы
β€’ Π’ случаС, ΠΊΠΎΠ³Π΄Π° Π½Π° мСстС Π²Ρ‹ΠΏΠΎΠ»Π½ΡΡŽΡ‚ΡΡ Ρ€ΡƒΡ‡Π½Ρ‹Π΅ процСссы распространСния, Ρ€Π΅Π°Π»ΠΈΠ·ΡƒΠ΅Ρ‚ Π»ΠΈ
администратор ΠΈΠ»ΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒ сигнатуру Π°Ρ‚Π°ΠΊΠΈ Π·Π° ΠΏΡ€ΠΈΠ΅ΠΌΠ»Π΅ΠΌΡ‹ΠΉ ΠΈΠ½Ρ‚Π΅Ρ€Π²Π°Π» Π²Ρ€Π΅ΠΌΠ΅Π½ΠΈ?
β€’ ΠœΠΎΠΆΠ΅Ρ‚ Π»ΠΈ ΠΈΠ·ΠΌΠ΅Ρ€ΡΡ‚ΡŒΡΡ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ процСссов автоматичСского распространСния ΠΈ
инсталляции?
β€’ БущСствуСт Π»ΠΈ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌ для эффСктивного отслСТивания ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠΉ ΠΏΡ€ΠΈ обновлСниях
сигнатур Π°Ρ‚Π°ΠΊ?
5.3.7.3 ВлияниС Π½Π° систСму
Для ΠΌΠΈΠ½ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΠΈ влияния ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠΉ сигнатур Π°Ρ‚Π°ΠΊ Π½Π° характСристики систСмы, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, слСдуСт
ΠΎΡ‚Π²Π΅Ρ‚ΠΈΡ‚ΡŒ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы:
Β©
ISO/IEC 2006– ВсС ΠΏΡ€Π°Π²Π° ΡΠΎΡ…Ρ€Π°Π½ΡΡŽΡ‚ΡΡ 13

β€’ ВлияСт Π»ΠΈ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠ΅ сигнатур Π°Ρ‚Π°ΠΊ Π½Π° Π²Ρ‹ΠΏΠΎΠ»Π½Π΅Π½ΠΈΠ΅ Π²Π°ΠΆΠ½Ρ‹Ρ… Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ ΠΈΠ»ΠΈ ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ?
β€’ МоТно Π»ΠΈ Π²Ρ‹Π±ΠΈΡ€Π°Ρ‚ΡŒ обновлСния сигнатур Π°Ρ‚Π°ΠΊ? Π­Ρ‚ΠΎ ΠΌΠΎΠΆΠ΅Ρ‚ ΡΡ‚Π°Ρ‚ΡŒ Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹ΠΌ, Ρ‡Ρ‚ΠΎΠ±Ρ‹
ΠΈΠ·Π±Π΅ΠΆΠ°Ρ‚ΡŒ ΠΊΠΎΠ½Ρ„Π»ΠΈΠΊΡ‚ΠΎΠ² ΠΈΠ»ΠΈ влияний Π½Π° Π²Ρ‹ΠΏΠΎΠ»Π½Π΅Π½ΠΈΠ΅ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ ΠΈΠ»ΠΈ ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ.
5.3.8 Π‘Ρ‚Ρ€Π°Ρ‚Π΅Π³ΠΈΠΈ ΠŸΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ
ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ ΠΈ Ρ€Π°Π±ΠΎΡ‚Π° IDS Π΄ΠΎΠ»ΠΆΠ½Π° Π±Π°Π·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π½Π° ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠ΅ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ. Как
ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ, организация Π΄ΠΎΠ»ΠΆΠ½Π° ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡ΠΈΡ‚ΡŒ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ IDS ΠΌΠΎΠ³Π»Π° ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Ρ‚ΡŒ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹Π΅ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹
ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Π΅ Π² ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‰Π΅ΠΉ инфраструктурС ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ. Π€ΡƒΠ½ΠΊΡ†ΠΈΠΈ
ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π΅Π½ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Ρ‚ΡŒΡΡ, Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‚ ΡΠ»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΡƒΡŽ ΠΏΠΎΡ‡Ρ‚Ρƒ, Π·Π°ΠΌΠ΅Ρ‰Π΅Π½ΠΈΠ΅
страниц, БистСму ΠšΠΎΡ€ΠΎΡ‚ΠΊΠΈΡ… Π‘ΠΎΠΎΠ±Ρ‰Π΅Π½ΠΈΠΉ (SMS), событиС ΠΏΠΎ ΠŸΡ€ΠΎΡΡ‚ΠΎΠΌΡƒ ΠŸΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρƒ Π‘Π΅Ρ‚Π΅Π²ΠΎΠ³ΠΎ
УправлСния (SNMP) ΠΈ Π΄Π°ΠΆΠ΅ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΡ‡Π΅ΡΠΊΡƒΡŽ Π±Π»ΠΎΠΊΠΈΡ€ΠΎΠ²ΠΊΡƒ источников Π°Ρ‚Π°ΠΊΠΈ.
Π’ случаС, ΠΊΠΎΠ³Π΄Π° Π΄Π°Π½Π½Ρ‹Π΅ IDS ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ для судСбных Ρ†Π΅Π»Π΅ΠΉ, Π²ΠΊΠ»ΡŽΡ‡Π°Ρ ΠΏΡ€Π΅Π΄ΡŠΡΠ²Π»Π΅Π½ΠΈΠ΅ иска ΠΈ
Π΄ΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²Π° для Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½Π΅Π³ΠΎ дисциплинарного взыскания, Π΄Π°Π½Π½Ρ‹Π΅ IDS Π΄ΠΎΠ»ΠΆΠ½Ρ‹, ΠΊΠ°ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌ,
ΠΎΠ±Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°Ρ‚ΡŒΡΡ ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΎΠ²Ρ‹Π²Π°Ρ‚ΡŒΡΡ Π² соотвСтствии с допустимыми ΠΈ Π·Π°ΠΊΠΎΠ½Π½Ρ‹ΠΌΠΈ трСбованиями
мСстной ΡŽΡ€ΠΈΡΠ΄ΠΈΠΊΡ†ΠΈΠΈ, Π² ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ ΠΎΠ½ΠΈ ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡŽΡ‚ΡΡ ΠΈ ΠΏΡ€Π΅Π΄ΡΡ‚Π°Π²Π»ΡΡŽΡ‚ΡΡ
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...