Intrusion Detection
by Rebecca Bace
Macmillan Technical Publishing,  2000.
339 pages,  index, 4 appendices including glossary, bibliography, and resources check list.  Hardcover. ISBN 1-57870-185-6.    $50.00

Reviewed by  Robert Bruen   April 13, 2001

 

Ms. Bace has approached Intrusion Detection in a methodical manner, more notes and bibliographical references than most other related books.  She appears to have done her research over many years so that she is able to present a meaningful, coherent history of ID.  This history includes analyses of older software and older cases (eg Mitnik) that have important lessons for our work today.  The book reads like a long, clear definition of ID looking down at it from 30,000 feet.  Covering almost all aspects from the general to selected specifics, such as Anderson's Threat Matrix, this book is a great reference source.

Whenever a discipline is under construction, it must pass through stages such as identification, early models, practical and technical approaches and some work that pulls it all together to define the discipline.  It shows that the field is maturing.  The first report seems to be one by James Anderson in 1980 followed by the next important paper in 1986 by Dorothy Denning.  Since then there have been various papers and software that have appeared, but only a few good books, several of them just recently.  Bace has gathered all of this to provide the next step in placing the field on secure footing.

When reading books that draw on history to explain current events, it is almost always disheartening to realize that we do not learn from history, which causes no end of grief. The RISOS project from the 1970s is described as a study of operating systems to understand the roots of security problems.  The list of problems was looked at during a 1993 meeting where is was discovered that they all still exist as sources of exploits. Moreover, they are still with us today, about 25 years later, with no expectation of vendors fixing the problems. For example, buffer overflows, stack smashing, authentication/authorization inadequacies and race conditions were all there in the original report.  Moreover, vendors still send out products with poor configurations that are exploitable upon installation.

It is a bit hard to understand why only now "secure" operating systems are beginning to appear, unless one takes into account that we have passed from time where computer people did computing for computing's sake to a time where it is done only if there is commercial demand.  Let us hope that the bazaar will be more successful than the cathedral. Security needs to be built in from the beginning.  The beginning was a while ago.

This a recommended book that gives the reader a insightful, comprehensive picture of ID form the beginning to today.  It shares a space on my shelf with the other good books on intrusion detection because it is different enough in its approach and is good source of information.