Holger, 
Thank you very much for good explanation!
But in my case situation is not so simple: I have TCP_Port_Scan form A
(in Inet) to B (in LAN) and no other events from A except
TCP_Port_Scans, no events to A, and the same situation with B: no events
from B and the only events to B are described TCP_Port_Scans. 
Unfortunately I don't know what to do, here my imagination stops :-(

May be someone has ideas? Logevidence? ISS doesn't allow to switch
logevidence for desired hosts and if I will log logevidence for all
scans on sensor (it's gigabit) there will be no ability to find right
packets :-(

Thanks

---
Best regards, Sergey V. Soldatov.
Information security department.
tel/fax +7 495 745 89 50 
tel +7 495 777 77 07 (1613) 

> -----Original Message-----
> From: Holger Reichert [mailto:[EMAIL PROTECTED] 
> Sent: Wednesday, January 18, 2006 10:37 PM
> To: [email protected]
> Cc: Soldatov, Sergey V.
> Subject: Re: [ISSForum] TCP_Port_Scan
> 
> Dear Sergey,
> 
> normally TCP_Port_Scan Events are only triggered when the 
> source IP-Adress tries to open a multitude of different ports 
> on one of your destination IP's.
> This is mostly not triggered by valid Webtraffic.
> 
> To analyse what's going on you should filter your event in 
> the following
> matter:
> 
> First take a source IP which triggered the TCP_Port_Scan 
> event and look what other events are triggered by this IP.
> Probably you are now able to identify what's going on.
> Are there multiple TCP_Port_Scans to other destination IP's?
> Or only to one?
> What destination Ports are scanned?
> 
> 
> Second take one of your destination IP's which is attacked
> (TCP_Port_scanned) and look wheter there are other events 
> from you  to the outside.
> 
> What I've seen so far are the following two false positives 
> which triggered TCP_Port_Scan events a lot:
> 
> 1: Some user tries to upload via ftp multiple files to his 
> private webserver.
>    Mostly they use tools to fasten the upload, by opening one 
> connection per file transmitted.
>    The back channel of ftp then opens for every file a new 
> connection to your uploading ip.
>    This triggers TCP_Port_Scan Events.
>    The IP outside your network seems to be the source, but it isn't
> 
> 2: Some user have skype installed and used at home. The 
> return back with their laptop in your company and are booting.
>    Skype starts automatically and tries to connect to the 
> last known good peers.
>    Mostly the destination port is 80 and a whide port range 
> between 20000 and 5xxxx.
>    This also triggers TCP_Port_Scan events, and the IP in 
> your network is definitly the source.
> 
> I tried to get ISS to help me customizing the TCP_Port_Scan 
> trashhold, but what they advised me to do didn't help.
> 
> Well by knowing that TCP_Port_Scans might indicate a 
> forthcomming attack i didn't want to ignore these events. So 
> we decided to customize this treshhold by ourselves.
> 
> And finally here is what we did:
> We configured SP to send out emails for the TCP_Port_Scan 
> event to a local email server with a special e-mail account.
> Then we coded in perl a little script which reads the e-mail 
> queue for TCP_Port_Scan Events and let it count for every 
> source IP until 20. Then by reaching this treshhold a new 
> mail was generated to inform the incident handlers (me and 
> others) that there is a serious TCP_Port_Scan event.
> 
> How high your treshhold is, or should be, must be decided by 
> you. I analyzed all events on my sensor and saw that this is 
> a good count to get rid of all the false positives and to 
> detect the real threads.
> 
> In 2004 I suggested ISS to correct or add a treshold handling 
> for this TCP_Port_Scan event, but well apparently they didn't.
> 
> I hope I was able to help you.
> 
> With kind regards
> 
> Holger Reichert
> Owner Manager
> Holysword GbR
> IT-Security Consulting
> Germany
> 
> 


_______________________________________________
ISSForum mailing list
[email protected]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo/issforum

To contact the ISSForum Moderator, send email to [EMAIL PROTECTED]

The ISSForum mailing list is hosted and managed by Internet Security Systems, 
6303 Barfield Road, Atlanta, Georgia, USA 30328.

Reply via email to