Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/13/2011
11:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

First Commercial 'Suricata' IDS/IPS Product Debuts

nPulse's new multigigabit-speed appliance based on a DHS-backed open-source IDS/IPS project technology

SAN FRANCISCO, CA -- RSA Conference -- A U.S. Department of Homeland Security-funded open-source project to build a new IDS/IPS architecture has emerged from the labs and yielded its first-ever commercial offering, a 10-gigabit-per-second IDS/IPS product from nPulse Technologies.

The new ThreatMeter appliance, rolled out today at the RSA Conference, is based on the so-called Suricata open-source IDS/IPS platform developed by the Open Information Security Foundation (OISF) Consortium, of which nPulse is a member. Suricata, funded by the DHS, aims to create a next-generation, high-speed IDS/IPS platform via an open community, much like the original Snort model.

"We're not trying to compete with or replace Snort. The issue was that DHS wanted something new with Snort, but no one can collaborate with it anymore," says Matt Jonkman, an OISF board member.

At the top of the 10-year-old Snort's list of missing elements that DHS and others want in IDS/IPSes is multithreading, which basically divides up the IDS/IPS workload based on where the processing needs are, Jonkman says. Version 1 of Suricata, which nPulse's ThreatMeter uses, includes multithreading as well as automatic protocol recognition.

"We're not trying to influence the direction of the technology, but letting the community [address] the needs they wanted all along," says Jonkman, CEO and founder of Emerging Threats Pro, which provides the rulesets in Suricata. "IDS/IPS is at the point that it solved the needs for a while, but it hasn't moved forward. And there's not the commercial motivation for vendors to dump their [platforms] and rewrite them. That's why there has not been much advancement and innovation."

Peter Shaw, vice president and co-founder of nPulse, says multithreading is a key feature to higher-speed IDS/IPSes. "When we want high-speed with Snort, we have to use multicore processors with a full instance of Snort on each core," he says.

And when multiple versions of an IDS/IPS are running in this fashion, there's more potential for evasion, OISF's Jonkman says. "With Suricata, you don't lose that global state that's very important at high speeds," he says. "When you have 10 instances of Snort all seeing their own traffic, you're not seeing the big picture."

The automatic protocol recognition feature of Suricata and in nPulse's ThreatMeter lets the IDS/IPS recognize an HTTP data stream, for instance, and automatically apply any rules to it. ThreatMeter uses Napatech's 10-Gbps packet capture and acceleration cards.

Another problem many of today's IDS/IPS systems have is they typically generate false-positives. That's even more problematic when the system is running in-line in the network. Suricata's second phase, now in the planning and development process, will include IP and DNS reputation filtering, which could go a long way in eliminating false-ositives as well as false-negatives, Jonkman says. The OISF is holding a brainstorming session this week at RSA to discuss these and other possible features for the upcoming Suricata version 2.

Aside from nPulse, three other IDS/IPS vendors are adopting Suricata in their engines, says Jonkman, who was unable to name names just yet. "The way the consortium was built is so vendors can maintain and preserve their 'secret sauces' while plugging in Suricata," Jonkman says.

nPulse, meanwhile, is currently taking orders for a 4-Gbps version of ThreatMeter, and is working on the 10-Gbps model in its lab. The company plans to ship the new IDS/IPSes in the second quarter.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22879
PUBLISHED: 2021-04-14
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
CVE-2021-27989
PUBLISHED: 2021-04-14
Appspace 6.2.4 is vulnerable to stored cross-site scripting (XSS) in multiple parameters within /medianet/sgcontentset.aspx.
CVE-2021-25316
PUBLISHED: 2021-04-14
A Insecure Temporary File vulnerability in s390-tools of SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-SP2 allows local attackers to prevent VM live migrations This issue affects: SUSE Linux Enterprise Server 12-SP5 s390-tools versions prior to 2.1.0-18.29.1. SUSE Linux Enterp...
CVE-2021-28797
PUBLISHED: 2021-04-14
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (an...
CVE-2020-36323
PUBLISHED: 2021-04-14
In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.