The intrusion detection system detects scans to individual ports.
Through statistics gathering and auditing, the intrusion detection system determines whether the system has been the target of a global scan. When the TCP/IP stack detects an intrusion event is detected, the stack calls the intrusion detection function and generates statistics and audit records.
If an IDS scan policy does not exist in the IDS policy file, no action is taken. If an IDS scan policy exists, the intrusion detection system creates an audit record when it detects a scan event.
Scan Event | TCP/IP Connection State | Event Classification |
---|---|---|
Receive any packet | Unbound, not restricted | Possibly suspicious (possibly a failed application) |
Receive a packet with the reset (RST) bit set in the TCP header. (In this situation, the host immediately terminates the connection, which results in a denial of service until that connection is reestablished.) | Half-open connection | Possibly suspicious (peer covering tracks) |
Final timeout | Any connected state | Possibly suspicious (peer abandoned connection) |
Receive unexpected flags | Any | Highly suspicious |
Receive any packet from a restricted TCP/IP port | This TCP/IP port is RESERVED | Highly suspicious |
Final timeout | Half-open connection | Highly suspicious (peer abandoned handshake) |
If an IDS scan policy does not exist in the IDS policy file, no action is taken. If an IDS scan policy exists, the intrusion detection system creates an audit record when it detects a scan event.
Scan Event | TCP/IP Connection State | Event Classification |
---|---|---|
QoS policy rejects packet | Bound | Normal |
Receive any packet | Bound | Normal |
FW filtering rejects packet | Bound | Possibly suspicious |
Receive any packet | Unbound | Possibly suspicious (possibly failed application) |
Receive any packet | This TCP/IP port is restricted | Highly suspicious |
You can use ICMP requests to map network topology. Any request sent to a subnet base or broadcast address is treated as a highly suspicious event. Echo (ping) requests and timestamp requests are very common, so they are treated as normal events. The intrusion detection system audits ICMP redirect events.