<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New IPS deployment. What do these alerts mean in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442419#M66951</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This signatures are related with Anomaly detection. Which is a very nice feature is you are able to create a perfect KB during the learning mode.&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/dmAD.html#wp1049627"&gt;http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/dmAD.html#wp1049627&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco States.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;We assume that during this phase no attack is being carried out. Anomaly detection creates an initial baseline, known as a knowledge base (KB), of the network traffic.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you are able to create a KB during a time that you know that there are no attacks at all go ahead if not you will be receiving a lot false positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Jul 2010 16:58:39 GMT</pubDate>
    <dc:creator>Diego Armando Cambronero Arias</dc:creator>
    <dc:date>2010-07-27T16:58:39Z</dc:date>
    <item>
      <title>New IPS deployment. What do these alerts mean</title>
      <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442417#M66949</link>
      <description>&lt;P&gt;I am getting several of these from diffrent PC's on the network. This is a brand new deployment of an IPS in our core 6500. I need to know where to start tracking down what this is and if its a flase positive.&amp;nbsp; I changed the attaker IP for this post but they are coming from internal IP's on our network. I am also getting several from the same PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Event ID&lt;/TD&gt;&lt;TD&gt;1278964938060722812&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Severity&lt;/TD&gt;&lt;TD&gt;high&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Host ID&lt;/TD&gt;&lt;TD&gt;isdm6500&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Application Name&lt;/TD&gt;&lt;TD&gt;sensorApp&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Event Time&lt;/TD&gt;&lt;TD&gt;07/14/2010 08:23:37&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Sensor Local Time&lt;/TD&gt;&lt;TD&gt;07/14/2010 13:23:37&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Signature ID&lt;/TD&gt;&lt;TD&gt;13003&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Signature Sub-ID&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Signature Name&lt;/TD&gt;&lt;TD&gt;AD - External TCP Scanner&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Signature Version&lt;/TD&gt;&lt;TD&gt;S262&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Signature Details&lt;/TD&gt;&lt;TD&gt;Worm Attack&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Interface Group&lt;/TD&gt;&lt;TD&gt;vs0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;VLAN ID&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Interface&lt;/TD&gt;&lt;TD&gt;ge0_7&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Attacker IP&lt;/TD&gt;&lt;TD&gt;1.1.1.1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Protocol&lt;/TD&gt;&lt;TD&gt;tcp&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Attacker Port&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Attacker Locality&lt;/TD&gt;&lt;TD&gt;OUT&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Target IP&lt;/TD&gt;&lt;TD&gt;0.0.0.0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Target Port&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Target Locality&lt;/TD&gt;&lt;TD&gt;Unknown&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Target OS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Actions&lt;/TD&gt;&lt;TD&gt;denyPacketRequestedNotPerformed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Risk Rating&lt;/TD&gt;&lt;TD&gt;TVR=medium&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Risk Rating Value&lt;/TD&gt;&lt;TD&gt;100&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Threat Rating&lt;/TD&gt;&lt;TD&gt;100&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Reputation&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Context Data&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Packet Data&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Event Summary&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Initial Alert&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Summary Type&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Final Alert&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Event Status&lt;/TD&gt;&lt;TD&gt;New&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Event Notes&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442417#M66949</guid>
      <dc:creator>Bill19795_2</dc:creator>
      <dc:date>2019-03-10T12:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: New IPS deployment. What do these alerts mean</title>
      <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442418#M66950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; The best place to begin research for Cisco IPS signatures is our IntelliShield site:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/security"&gt;http://www.cisco.com/security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; You can look up any signature by ID by performing an Advanced Search.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; For the signature you presented, the results can be found here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewAlert.x?alertId=91"&gt;http://tools.cisco.com/security/center/viewAlert.x?alertId=91&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; This signature fires for a host that crosses a threshold for n&lt;SPAN class="data2"&gt;on-established TCP connections or unacknowledged SYN&amp;nbsp; packets sent to multiple addresses on an identical&amp;nbsp; TCP port and may indicate worm-like scanning.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; It would be beneficial to investigate the host listed as the attacker and determine if this is expected behavior or if the host is compromised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 19:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442418#M66950</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-07-14T19:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: New IPS deployment. What do these alerts mean</title>
      <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442419#M66951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This signatures are related with Anomaly detection. Which is a very nice feature is you are able to create a perfect KB during the learning mode.&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/dmAD.html#wp1049627"&gt;http://www.cisco.com/en/US/docs/security/ips/6.0/configuration/guide/idm/dmAD.html#wp1049627&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco States.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;We assume that during this phase no attack is being carried out. Anomaly detection creates an initial baseline, known as a knowledge base (KB), of the network traffic.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you are able to create a KB during a time that you know that there are no attacks at all go ahead if not you will be receiving a lot false positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jul 2010 16:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442419#M66951</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-07-27T16:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: New IPS deployment. What do these alerts mean</title>
      <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442420#M66952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not that you will be receiving false positives, but false&lt;/P&gt;&lt;P&gt;negatives.  During the learning phase if an attack is active, the higher&lt;/P&gt;&lt;P&gt;traffic rate will be learned as the baseline.  When traffic is tracked&lt;/P&gt;&lt;P&gt;by the AD engine, it will be compared to this baseline, and in turn not&lt;/P&gt;&lt;P&gt;fire a signature event since it potentially will not cross the learned&lt;/P&gt;&lt;P&gt;threshold.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is concern that the baseline was learned during an active&lt;/P&gt;&lt;P&gt;attack, it may be beneficial to remove the current KBs (initial cannot&lt;/P&gt;&lt;P&gt;be removed) and force the AD engine to learn during a period you feel is&lt;/P&gt;&lt;P&gt;more representative of normal traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jul 2010 17:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442420#M66952</guid>
      <dc:creator>Scott Fringer</dc:creator>
      <dc:date>2010-07-27T17:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: New IPS deployment. What do these alerts mean</title>
      <link>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442421#M66953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you are right it's false negatives not positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jul 2010 17:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-ips-deployment-what-do-these-alerts-mean/m-p/1442421#M66953</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-07-27T17:26:25Z</dc:date>
    </item>
  </channel>
</rss>

