deep security intrusion detection and prevention

6
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison with a leading network IDS/IPS vendor. Version 1.3 March 2015 Trend Micro, Incorporated

Upload: hoangthien

Post on 07-Jan-2017

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Deep Security Intrusion Detection and Prevention

Deep Security Intrusion Detection & Prevention (IDS/IPS)

Coverage Statistics and Comparison

A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison with a leading network IDS/IPS vendor.

Version 1.3 March 2015

Version 1.2 Nov 27, 2013

Trend Micro, Incorporated

Page 2: Deep Security Intrusion Detection and Prevention

© Trend Micro 2015 2 Version 1.3 March, 2015

Deep Security Intrusion Detection & Prevention - IDS/IPS

Coverage Statistics and Comparison

1. Purpose of this note

Deep Security’s Intrusion Detection & Prevention (IDS/IPS) module is one of the key protection modules of the product. IDS/IPS uses Deep Packet Inspection to provide protection against the exploitation of network vulnerabilities. It protects critical servers and endpoints against known and unknown vulnerabilities. This document helps a decision maker understand the value provided by Deep Security and its coverage against vulnerabilities in the software platforms and applications that it protects. This document also helps in understanding and comparing Deep Security coverage against a standard network IDS/IPS product. This helps understand IDS/IPS products coverage in the industry, in general, and provides a fair comparison with Deep Security. This comparison has been done against a leading network IDS/IPS vendor in the market with a large market share. Please note that the discussions in this paper are relevant to Trend Micro Vulnerability Protection (formerly Intrusion Detection Firewall or IDF) when focused on endpoints.

2. Background Information.

Since Deep Security’s IDS/IPS module focuses on network vulnerabilities, the data represented in this paper is focused on network-based threats. Also, the comparison has been done against a network-based IDS/IPS product with respect to network vulnerabilities. The following points must be noted to understand the rationale behind the comparison: - Since it’s a comparison of network vulnerabilities, local vulnerabilities are not considered. - A network IPS can theoretically protect any platform so they cover a lot of software platforms

and applications which don’t apply to the product category that Deep Security belongs to e.g. Platforms like Apple, Netware

- This is a comparison in terms of coverage and not about product features.

Page 3: Deep Security Intrusion Detection and Prevention

© Trend Micro 2015 3 Version 1.3 March, 2015

Deep Security Intrusion Detection & Prevention - IDS/IPS

Coverage Statistics and Comparison

3. Deep Security Coverage Statistics

Deep Security Vulnerability Research Labs provides regular updates every 2 weeks scheduled on second and fourth Tuesdays of the month. Deep Security Rule updates are also shipped out-of-band for 0-days and any critical threats that need to be addressed sooner than the scheduled update. The updates address latest vulnerabilities targeting servers and end points. Here’s a high level view of protection provided by Deep Security in the years 2013 and 2014.

2013 2014

New Rules shipped 477 498

Updated Rules 449 520

Zero-days addressed 12 13

Rules for Server Applications/Platforms

180 292

Rules for Desktop applications

296 389

To date, Deep Security provides protection for about 900 specific vulnerabilities in Microsoft products. This includes out-of-support platforms like Windows XP as well as Windows Server 2000 and 2003. Windows Server 2003 goes End of Support in July 2015, making protection with IDS/IPS more important than ever as an organization plans a migration to a supported platform.

Page 4: Deep Security Intrusion Detection and Prevention

© Trend Micro 2015 4 Version 1.3 March, 2015

Deep Security Intrusion Detection & Prevention - IDS/IPS

Coverage Statistics and Comparison

4. A closer look at Microsoft coverage

In 2012 and 2013 Deep Security’s Intrusion Prevention module provided protection for 289 Microsoft product’s vulnerabilities. There were a total of 548 vulnerabilities published by Microsoft in that time. Although this overall coverage is approximately 50% the graph below outlines how many ‘critical’ Microsoft vulnerabilities were addressed by Deep Security over 2012 and 2013. The rating is based on Microsoft’s classification of its vulnerabilities as outlined in its advisories. These vulnerabilities almost always have information from Microsoft provided to Trend Micro as part of the Microsoft Active Protections Program (MAPP). Overall for the years 2012 and 2013, the cumulative coverage of critical vulnerabilities is 69%.

To understand how the comparable network IDS/IPS did protecting these vulnerabilities, here’s a comparison of the vendor with Trend Micro Deep Security. This comparison is for ‘Critical’ Microsoft Product Vulnerabilities.

0

10

20

30

40

Jan

-12

Feb

-12

Ma

r-1

2

Ap

r-1

2

Ma

y-1

2

Jun

-12

Jul-

12

Au

g-1

2

Sep

-12

Oct

-12

No

v-1

2

De

c-1

2

Jan

-13

Feb

-13

Ma

r-1

3

Ap

r-1

3

Ma

y-1

3

Jun

-13

Jul-

13

Au

g-1

3

Sep

-13

Oct

-13

No

v-1

3

De

c-1

3

Jan

-14

Feb

-14

Ma

r-1

4

'Critical' Microsoft Product Vulnerabilities Coverarge by Deep Security

CVEs published by Microsoft Vulnerabilities Covered By Deep Security/IDF

0

10

20

30

Jan

-12

Feb

-12

Ma

r-1

2

Ap

r-1

2

Ma

y-1

2

Jun

-12

Jul-

12

Au

g-1

2

Sep

-12

Oct

-12

No

v-1

2

De

c-1

2

Jan

-13

Feb

-13

Ma

r-1

3

Ap

r-1

3

Ma

y-1

3

Jun

-13

Jul-

13

Au

g-1

3

Sep

-13

Oct

-13

No

v-1

3

De

c-1

3

Jan

-14

Feb

-14

Ma

r-1

4

Deep Security Coverage Comparison with a leading network IDS/IPS vendor

Deep Security Coverage Leading network IDS/IPS vendor

Page 5: Deep Security Intrusion Detection and Prevention

© Trend Micro 2015 5 Version 1.3 March, 2015

Deep Security Intrusion Detection & Prevention - IDS/IPS

Coverage Statistics and Comparison

5. Non-Microsoft Products Here’s another example of coverage provided by Deep Security for an open source application platform – Apache Struts. Web Applications are the most Internet facing software applications and they can be highly vulnerable. Media talks about specific application vulnerabilities e.g. Adobe, Java etc. when they are used in attacks. However, the attacks on Web Applications still top the chart. SQL Injection, Cross Site Scripting, Web Shell, Command Injections still rule the list as they are the ones which have resulted in the largest data thefts. The top Common web servers and applications that were exploited in 2013 were Apache Struts, PHP, Wordpress, Joomla etc. From March 2005 through to May 2014, Deep Security’s vulnerability coverage for Apache Struts is shown below.

The following is a comparison of how Deep Security’s coverage compares against the network IDS/IPS vendor for Apache Struts. As you can see, Deep Security’s coverage meets or exceeds a leading Network IDS/IPS vendor during this time period for Apache Struts.

Deep Security vulnerability coverage for Apache Struts

Total Apache Struts Vulnerabilities Deep Security Coverage

Coverage Comparison with a leading network IDS/IPS vendor for Apache Struts

Deep Security Leading network IDS/IPS vendor

Page 6: Deep Security Intrusion Detection and Prevention

© Trend Micro 2015 6 Version 1.3 March, 2015

Deep Security Intrusion Detection & Prevention - IDS/IPS

Coverage Statistics and Comparison

6. Summary

The data presented in this paper clearly demonstrates that Deep Security provides effective protection against network vulnerabilities to protect your critical infrastructure including both - servers and desktops. Also, given the fact that technologically, Deep Security works in a similar way to a network IDS/IPS product, the protection coverage for vulnerabilities is similar to a leading network IDS/IPS vendor. There are minor differences because of vulnerability information sourcing, research results etc. The data clearly shows that Deep Security protects a server with IDS/IPS protection capabilities comparable to a network IDS/IPS. As noted at the beginning of this paper, Trend Micro Vulnerability Protection (formerly Intrusion Detection Firewall—IDF) provides similar protection for desktop end points.