platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
First slide label
Some representative placeholder content for the first slide.
Second slide label
Some representative placeholder content for the second slide.
Third slide label
Some representative placeholder content for the third slide.
What Are Normal Users Supposed to Do with IDS Alerts from Network Gear?
published on 2024-10-11 17:37:00 UTC by Richard Bejtlich Content:
Probably once a week, I see posts like this in the r/Ubiquiti subreddit. Ubiquiti makes network gear that includes an "IDS/IPS" feature. I own some older Ubiquiti gear so I am familiar with the product.
When you enable this feature, you get alerts like this one, posted by a Redditor:
This is everything you get from Ubiquiti.
The Redditor is concerned that their system may be trying to compromise someone on the Internet.
Now, you have to guess how likely it might be there you could have ANY UDP traffic from your home network to anywhere, on any ports, that contain this string
24 7b
followed by this string
24 7b 3a 3a
within the next 100 bytes?
I'm guessing there's a decent chance that could happen in random, normal traffic.
Therefore, without any other evidence, I think you can ignore this alert.
If you want to have a better chance at understanding this in the future, please feel free to check out anything I've written about network security monitoring. Good luck!
==
This problem is why I have promoted network security monitoring since 1998 and subtitled my first book "Beyond Intrusion Detection." Network intrusion detection, by itself, with no supporting data and without even rule explanations, is almost worthless.
Thankfully in this case the vendor is at least using an open rule set, enabling this feeble exploration.