TMS zl Management and Configuration Guide ST.1.1.100430
6-16
Intrusion Detection and Prevention
Threat Detection and Prevention
Protocol Anomaly Detection
Protocol anomaly detection involves looking for irregularities in protocol
payloads when they go through the network. Protocol anomalies target an
application, so the attack indicators are hidden in the packet payload. It
requires buffering the packets, decoding the protocol, and maintaining some
basic state about a given flow, such as open, authenticated, and so on.
Protocol anomaly detection has powerful capabilities because it does not
require a prior signature to detect certain classes of attacks; it can detect some
zero-day attacks even before the signatures are published. This capability
eliminates the window of vulnerability that often exists during the first hours
or days after an attack is launched. It is also powerful because it checks the
packet payload, so it detects attacks that would have otherwise made it
through a packet-filtering firewall.
Another useful feature of protocol anomaly detection is its resistance to
polymorphism and other evasion techniques. Because it does not rely on
matching an explicit pattern, the IDS still detects variations in the attack.
Protocol anomaly detection does not require constant signature updates,
thereby reducing administrative overhead.
The TMS zl Module detects anomalies in the following protocols by default:
■ HTTP
• Check for URL decoding in the URL request
• Check for directory traversal beyond the root directory
• Check for NULL method
• Check for evasion techniques
• Check for the length of the URL request (user-configurable)
• Check for a number of lines per header that exceeds the maximum
limit (user-configurable)
• Check for the MIME header size (user-configurable)
• Check for the number of MIME headers (user-configurable)
• Check for the MIME header line length (user-configurable)
■ SMTP
• Ensure that the command line does not exceed 512 bytes
• Check the recursive boundary depth in SMTP data
• Check for a header length that exceeds the maximum limit (user-
configurable)
■ FTP
• Ensure that the command line does not exceed 512 bytes