Feeds

Battle joined for future of open source IPS

Snort bares teeth at DHS-backed project

High performance access to file storage

Analysis The battle to develop the next generation of open source intrusion prevention systems (IPS) technology is intensifying between incumbent Snort and a US government-backed project, the Open Information Security Foundation (OISF).

Disagreements over technical issues such as the relative importance of developing IPS systems that support multi-threading have lately been accompanied by increasingly acrimonious exchanges that have taken a political dimension, with the Snort camp accusing the OISF of having nothing to show for $1m in public funding. Au contraire, OISF members argue.

The OISF project is in an advanced stage of development (see the project status report here) and is only needed in the first place because the Snort camp sat on its laurels and failed to innovate.

Network bouncers

IPS systems act as high-tech network bouncers - monitoring systems for malicious activities, such as malware or intrusion by hackers, and attempting to block these cyberassaults. The technology also carries out logging functions.

IPS systems are used by enterprises alongside firewalls and anti-virus as components of a defence in depth designed to safeguard against hacking attacks. Snort is a free and open source network intrusion prevention system (NIPS) created by Martin Roesch, and has enjoyed great success over the last ten years.

Roesch went on to establish Sourcefire, which markets a commercial version of Snort. Sourcefire maintains close ties with the Snort community.

Snort was until recently seen as one of the great success stories of the open source movement, and with good reason. The technology, which has been downloaded nearly four million times, boasts nearly 300,000 registered users. Almost 100 vendors integrate Snort's ruleset into UTM (universal threat management) and other network security devices. Snort's IPS rule set boasts more than double the number of vulnerability-based rules as its next closest competitor, according to Sourcefire.

Falling out

The reliance of federal government agencies on Snort led to US government opposition against a planned takeover of Sourcefire by Israeli firewall pioneer Check Point in 2006.

Fast forward four years however and the formerly close and protective relationship between the US federal government and Sourcefire/Snort has soured to the point that the Department of Homeland Security is funding an alternative through the OISF foundation. The Navy's Space and Naval Warfare Systems Command  (SPAWAR) and commercial partners are also contributing to the development of Suricata, OISF's open source IPS.

Apache security expert Ivan Ristic is working as a programmer on the project and Jose Nazario, senior security researcher with Arbor Networks, sits on its board. Other firms involved include Breach Security and IOActive.

Matthew Jonkman, president of OISF, a former Army air traffic control RADAR and communications technician, explained that the DHS is funding the project to "spur a round of innovation in the industry". He outlined some of the gripes the DHS holds against Snort.

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.