An active intrusion-confronting system using fake session and honeypot

Size: px
Start display at page:

Download "An active intrusion-confronting system using fake session and honeypot"

Transcription

1 An active intrusion-confronting system using fake session and honeypot Myung-Sub Lee, Chang-Hyeon Park Department of Computer Engineering Yeungnam University, #214-1, Dae-dong, Kyungsan, Kyungbuk, , Korea Myung-Chun Ryoo, Joon-Ho Park Department of Computer Engineering Kyungwoon University, #55, Sandong-myeon, Gumi, Kyungbuk, , Korea Abstract In the coming age of information warfare, information security patterns need to be changed to use an active approach using offensive security mechanisms rather than the traditional passive approach in merely protecting against intrusions. In an active security environment, it is essential that, when detecting an intrusion, it is immediately confronted with methods such as analysing the intrusion situation in real-time, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, attacks like DoS(Denial of Service) and port scan can be intercepted. By monitoring a honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is activated, new intrusion rules are created and activated for confronting the next intrusions. Keywords :DoS, Honeypot, Fake session, Port Scan I. INTRODUCTION In today's infrastructure of information and communication consisting of closely connected unit structures, the problem of increasingly comprehensive network structure is intensified. In this environment, outflows of important information via intrusion and attacks to the information system itself become serious problems[1]. An information systems built-in security program has basically limited functions for protecting the system from a intruder, such as, access control, identification, authentication, authorization, and the collection of basic log information. Especially, since an information system has various vulnerabilities for security, it cannot provide a complete countermeasure to various attacks internal and external. To solve this problem, a variety of security technologies that confront the purpose of attack are necessary to be added into an information system. A representative security element for monitoring illegal behavior and preventing additional damage in an information system is the IDS(Intrusion Detection System)[2, 3,4]. IDS provides a monitoring function of a system and a network, based on the prescribed rules of detecting an intruder's attacks. However, it cannot stand against a variety of attacks and certain new attacks, which are not included in the prescribed rules, and its delayed counteraction is also a problem. In order to solve these problems, the conception of an honeypot appeared on the stage, by Professor David Clock at MIT University in the middle of 1990s. Honeypot consists of a disguised server to entice an intruder and a trace software[5, 6, 7, 8]. The disguised server stages virtual information that can attract intruders, and traces an intruder with an automatic trace software that operates upon intrusion. However, honeypot does not actively go into action, but just waits for an intruder to connect to the system. Because an independent system has such a problematic characteristic, it does not function smoothly, and reveals many problems still. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Fake Session sends an illegal user, a presumable intruder, to honeypot by force, and stands against DoS(Denial of Service) and scan attacks imposed upon innumerable hosts on the network. Honeypot monitors an intruder's behavior and generates a new rule against intrusion by deducing a counteraction rule from the Intrusion Rule Manager. In addition, it uses a rule-based detection model to detect a intruder efficiently. This paper converts a rule generated from IRM(Intrusion Rule Manager) into a module, so it has an advantage to be updated dynamically during the execution of a program. II. AN ACTIVE INTRUSION-CONFRONTING SYSTEM The system, which is going to be proposed in this paper, is an active intrusion confronting system, and consists of a network intrusion detection system, a host intrusion detection system, a honeypot server, and an Agent. All the systems are implemented based on Linux kernel version

2 Fig. 1 The procedural diagram of an active intrusion confronting system In fig. 1, the Host-IDS monitors the behavior of users who connect to Telnet, and then records it in files. With the recorded audit data and using user executed files, directories, and return values for users' access, it inquires whether it is an illegal behavior or not. If it detects an illegal behavior through inquiries, it reports it to Agent. Since Audit Daemon that collects the audit data of a system does not exist in Linux at the moment, its implementation is similar to the Audit package that is included in the BSM(Basic Security Module) of Solaris, Audit is divided into six classes, such as, the behavior related to process running (PC), the behavior related to reading and writing(fr, FW), the behavior related to the changes of file attribute(fm), the behavior related to IPC(Inter Process Communication) among processes(ip), and the behavior related to log-in and log-out(lilo). Their detailed events are in table 1. Class PC FR FW FM LILO IP Table 1 The event related to a class Event EXIT, CHDIR, KILL, CHROOT, SETPGRP, SETUID, SETGID, etc. OPEN, AE_READ_LINK, etc. CREAT, LINK, MKNOD, SYMLINK, RENAME, TRUCATE, etc. CHMOD, CHOWN, FCNTL, FCHOWN, FLOCK, etc. LOGIN, CRONTAB, LOGOUT, SU, PASSWD, TELNET, etc. MSGCTL, MSGGET, MSGSND, SHMGET, SHMCTL, SHMAT, etc. When Audit daemon is executed in the background process, and a user-generated process carries out System Call that is in the kernel, the function of Audit that is in the System Call records events in /proc/audit. Referring the /proc/audit, Audit Daemon leaves a log file in the end. If the data used in Host-IDS are registered in /etc/security/audit.conf file, Audit daemon leaves only the registered class event in a log file. Network-IDS analyses a packet header and detects a denial of service. If there is a modulation after analyzing a packet header, it reports to Agent. In addition, if the overall size of the SYN-flag-checked packet in TCP header and UDP packet is bigger than the standard value, or the number of packets coming in during a certain period of time is more than the standard value, it regards them as a service rejection attack. In a honeypot system, a new telnet session is made on the basis of intruder information transmitted from Host-IDS, and then it prepares to accept the packet coming in after being made Destination-NAT in Network-IDS. And it moves the job from Host-IDS to a honeypot system without being noticed by the intruder in order to get intruder information. In Agent, row data that have been collected by Audit daemon of Host-IDS are collected, and then the collected data are analyzed to extract necessary data. It transmits the extracted data to all the systems, and executes relevant commands to confronting the instruction based on the outcomes that come from a detection system. 2.1 Intrusion detection procedure This paper uses a rule-based analysis mechanism for an intrusion detection technique, and makes every rule a module in order to be able to update it dynamically during the execution of the program. The mechanism of rule configuration uses an 'if' statement. In Network-IDS, a packet header is analyzed and DoS attacks are detected. A denial of service attack is checked when the overall size of the SYN-flag-checked packet in the TCP header and UDP packet is bigger than the standard value. In the case that the number of packets coming in during a certain period of time is more than the standard value, it is regarded as a DoS attack. The port scan function checks whether or not the input packet is five within three seconds according to rules. In this paper, the number of ports is limited to such a one that is necessary to be scanned from at least the same source address(scan_count_threshold) in order to detect a scan and such an attack that happens within the time set as DELAY between ports(scan_delay_ THRESHOLD). Upon detecting an intrusion, the information of a intruder is sent to Agent using Audit data. Upon receiving messages about intrusion detection, Agent divided it into 0, 1, 2 steps according to the significance of the outcomes of intrusion, and then decides an intrusion confronting action. 2.2 Intrusion confrontation procedure In this paper, the intrusion confrontation procedure is divided into three-step scenarios (scenario-a, B, C) and Fake Session. 1)The procedure of scenario-a shows fig.2. When Network -IDS detects a port scan, it reports the information of the intruder to Agent. And it chooses one of the closed

3 random ports and induces session to the honeypot server using an address translator. After randomly assigning the 5000th port in this paper and detecting a port scan, the session for the incoming packet is induced to the honeypot server. At the time of the port scan, it blocks the packet that a kernel sends out in reaction, and instead it makes a randomly made packet sent out. By setting the flag bit of the out going packet as SYN/ACK, it disguises the port as open, when it is closed in reality. sent to the honeypot daemon to prepare for receiving the intruder. Upon completing preparation, honeypot daemon executes the Iptables command of Network-IDS, and this command is implemented to be able to change the path of a real-time data packet. After the Audit daemon of Host-IDS detected a intruder, the process of its collection of information of a intruder and sending the information to honeypot is shown in fig. 5. Fig. 2 The procedure of scenario-a 2) The scenario-b monitors the behavior of a telnet server connecting the user in Host-IDS. If a user is detected as an intruder, Audit Daemon reports it to Agent. And then scenario B or C is selected according to the managers' policy. If scenario B is chosen, a packet discard command against an intruder is sent to Network-IDS. The process of a user, who is connected to the telnet server, is terminated. If the intruder requests re-connection to the telnet server, it is connected to the honeypot server. Fig. 3 shows the procedure of scenario B. Fig. 4 The procedure of scenario-c In fig. 5, Host-IDS' Audit Daemon executes a process(catchuserinfo) to get the information of a connector, and sends a intruder's IP and port, UID, and PID information to the honeypot server. In Host-IDS, UserInfo structure is delivered to iwishtorcv daemon which is for monitoring the connector of the honeypot server. The iwishtorcv daemon synchronizes the PID of an intruder's telnet process and shell process, which are going to be made newly, based on the information of UserInfo structure, transmitted by the catchuserinfo of Host-IDS. And after becoming Destination-NAT, to make the packet of an intruder sent to the honeypot server, it executes the Iptables command of Network-IDS. Besides, upon executing the makesession process, it synchronizes the information of an intruder with the information of Host-IDS. Fig. 3 The procedure of scenario-b 3) The scenario-c is the most crucial one in this paper, and has the mechanism in which a intruder is moved unawares to the honeypot server. Fig. 4 shows that the transfer of a telnet server connecting the intruder to the honeypot is executed while retaining the connection. If an illegal user is detected, the detected information of the user is Fig. 5 The move procedure of session

4 4) The Fake Session monitors the port scan of an intruder, and gives incorrect answering for the packet that is sent at the time of port scan, making the port scanning action of the intruder useless. As for the packet that comes to a designated port of Network-IDS from the port scan, among the packets sent by the kernel, of which flag bit is RST and ACK go into the discard. And instead, the packet made by a packet generator goes out. Although the flag bit of outgoing packets is set as SYN/ACK and a closed port, it is disguised as open. And connecting a certain port to honeypot server, it provides an intrusion confronting mechanism that is equivalent to scenario A. Table 2 shows the structure of Fake TCP header in Network-IDS. Table 2 The Fake TCP header TCP-RST TCP-SYN source=htons(sport) source=htons(sport) dest=htons(dport) dest=htons(dport) seq=htonl(seq) seq=htonl(seq) ask_seq=htonl(ask) ask_seq=htonl(ask) res1=0 rea1=0 doff=5 doff=th_offset window=htons(0) window=htons(tcp_window_size) fin=0 fin=0 syn=0 syn=1 ask=1 ask=1 rst=1 rst=0 III. EXPERIMENT In order to test the performance of Fake Session and the three scenarios (scenario A, B, C) proposed as a mechanism of active intrusion confronting in this paper, a simulation was executed. Scenario-A is a confronting mechanism against a scan attack and a DoS attack in Network-IDS. This clause presents the outcome of simulation against a DoS attack. The outcome of simulation against a scan attack will be presented. that after the SYN flooding attack is detected, the SYN packet, which comes from an intruder's IP, is discarded. Fig. 7 The screen of discarded SYN packet Scenario B, when a user, who is connecting to the telnet server, is detected as an intruder, Audit daemon sends the information of the intruder to Agent. If the intruder is not an internal user, scenario B is executed. Upon choosing scenario B, the packet discard command is sent to Network-IDS. In addition, the process of the user, who is connecting to the telnet server, is terminated. If the intruder requests re-connection to the telnet server, it is connected to the honeypot server. Fig. 8 is the executing screen of Audit daemon. Fig. 6 The screen of SYN flooding attack Fig. 6 shows that the SYN flooding attack packet in Network-IDS is captured using TcpDump[9]. Fig. 7 shows Fig. 8 The executing screen of Audit daemon Scenario C is a mechanism to migrate an intruder to the honeypot server unawares, when a user of the internal server of telnet is detected as an intruder. If an intruder, who is connecting to the telnet server, is detected as an illegal user,

5 the user information of the intruder is sent to the daemon of the honeypot server, in order for the honeypot server to prepare to receive the intruder. Fig. 9 shows the flow of packets at the time of executing scenario C. It shows that a new session is made by the makesession process of honeypot, and that the packet of which path is reset from telnet server to honeypot server by the tofirewall process. Fig. 9 The flow of packet at the time of executing the scenario-c The Fake Session makes the port scan of an intruder useless. For simulation, this paper used Nmap, a port scan tool[10]. Fig. 10 shows the outcome of port scan without Fake Session policy, while fig. 11 shows the outcome of port scan with the application of Fake Session policy. Fig. 10 The outcome of port scan without Fake Session policy Fig. 11 The outcome of port scan with Fake Session policy IV. CONCLUSION This paper implemented a honeypot system, an intrusion confronting system. The inducing mechanism of an intruder is as follows; First, when an intruder's request of connecting to telnet is detected in Network-IDS, it connects the intruder to the honeypot server, instead of the telnet server. Second, it disconnects an illegal user's connection, which is detected in Host-IDS, and connects the illegal user directly to the honeypot server, when re-connection is requested. Third, in the same situation as the second, it does not disconnect the illegal user' connection, only connects the illegal user to the honeypot server, while maintaining the initial connection. In addition, this paper implemented Fake Session, with which the scan attack that imposes upon numerous hosts on the network, for the present, can be made useless. There are some advantages in this system: First, realizing the forcible transfer of users, it can get sufficient knowledge on the intrusion contents of a intruder, and protects the information of a server safely. Second, by monitoring the behavior of an intruder, who is transferred to a honeypot server, it can detect new patterns of attacks and add new rules easily. Third, the vulnerability of a host is not easily exposed by this. REFERENCES [1] Crosbie M, Spafford E, "Applying Genetic Programming to Intrusion Detection", Technical Report, Purdue University, Department of Computer Science, [2] Stephen Northcutt, "Network Intrusion Detection-Third Edition", New Riders, September [3] William R. Cheswick, Steven M. Bellovin, "Firewalls and Internet Security", ISBN: , [4] W. Lee and S. J. Stolfo, "Data mining approaches for intrusion detection.", In Processing of the 7th USENIX Security Symposium, San Antonio, TX, January [5] Lance Spitzner, "Honeypots-Tracking Hackers", Addison-Wesley, October [6] Honeynet Project Members, "Know Your Enemy : Honeynets", September [7] Crosbie M, Spafford E, "Applying Genetic Programming to Intrusion Detection", Technical Report, Purdue University, Department of Computer Science, [8] CISCO, "NetRanger Intrusion Detection System", Technical Information, April, [9] TcpDump, [10] Nmap,

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Module 19 : Threats in Network What makes a Network Vulnerable?

Module 19 : Threats in Network What makes a Network Vulnerable? Module 19 : Threats in Network What makes a Network Vulnerable? Sharing Unknown path Many points of attack What makes a network vulnerable? Unknown perimeter Anonymity Complexity of system Categories of

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Stateless Firewall Implementation

Stateless Firewall Implementation Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this

More information

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall

More information

Analysis of TCP Segment Header Based Attack Using Proposed Model

Analysis of TCP Segment Header Based Attack Using Proposed Model Chapter 4 Analysis of TCP Segment Header Based Attack Using Proposed Model 4.0 Introduction Though TCP has been extensively used for the wired network but is being used for mobile Adhoc network in the

More information

A Distributed Intrusion Alert System

A Distributed Intrusion Alert System A Distributed Intrusion Alert System Chih-Yao Lin, Hsiang-Ren Shih, and Yomin Hou Taiwan National Computer Emergency Response Team {chinyao, shr, yominhou}@twncert.org.tw Abstract In this paper, a distributed

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 1 AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 2 Introduction (1/2) TCP provides a full duplex reliable stream connection between two end points A connection is uniquely defined by the quadruple

More information

Denial Of Service Attacks

Denial Of Service Attacks FISTConference October 2004 Denial Of Service Attacks Gabriel Verdejo Alvarez (gaby@tau.uab.es) Barcelona INDEX Speaker s introduction. Denial Of Service attacks (DOS). Examples. Distributed Denial of

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

Optimization of Firewall Rules

Optimization of Firewall Rules Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Linux System Administration, level 2

Linux System Administration, level 2 Linux System Administration, level 2 IP Tables: the Linux firewall 2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To

More information

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack Attacks on TCP Outline What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack TCP Protocol Transmission Control Protocol (TCP) is a core protocol

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Common Network Attacks

Common Network Attacks Common Network Attacks David J. Marchette dmarchette@gmail.com Common Network Attacks p.1/96 Outline Some Common Attacks SHADOW EMERALD ADAM Utilities Common Network Attacks p.2/96 Terminology Active.

More information

THE "TRIBE FLOOD NETWORK 2000" DISTRIBUTED DENIAL OF SERVICE ATTACK TOOL

THE TRIBE FLOOD NETWORK 2000 DISTRIBUTED DENIAL OF SERVICE ATTACK TOOL TFN2K - An Analysis Jason Barlow and Woody Thrower AXENT Security Team February 10, 2000 (Updated March 7, 2000) Revision: 1.3 Abstract This document is a technical analysis of the Tribe Flood Network

More information

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter Computer Network Lab 2017 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter 1 Security Security means, protect information (during

More information

Building an IPS solution for inline usage during Red Teaming

Building an IPS solution for inline usage during Red Teaming Building an IPS solution for inline usage during Red Teaming Repurposing defensive technologies for offensive Red Team operations K. Mladenov A. Zismer {kmladenov,azismer}@os3.nl Master Students in System

More information

TCP TCP/IP: TCP. TCP segment. TCP segment. TCP encapsulation. TCP encapsulation 1/25/2012. Network Security Lecture 6

TCP TCP/IP: TCP. TCP segment. TCP segment. TCP encapsulation. TCP encapsulation 1/25/2012. Network Security Lecture 6 TCP TCP/IP: TCP Network Security Lecture 6 Based on IP Provides connection-oriented, reliable stream delivery service (handles loss, duplication, transmission errors, reordering) Provides port abstraction

More information

Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies

Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies In order to establish a TCP connection, the TCP three-way handshake must be completed. You can use different accept policies

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

Firewall Identification: Banner Grabbing

Firewall Identification: Banner Grabbing Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

8/19/2010. Computer Forensics Network forensics. Data sources. Monitoring

8/19/2010. Computer Forensics Network forensics. Data sources. Monitoring Computer Forensics Network forensics Thomas Mundt thm@informatik.uni-rostock.de Data sources Assessment Monitoring Monitoring Software Logs and Log Analysis Incident Analysis External Assessment Hackers

More information

Overview. Over the next four weeks, we will look at these topics: Building Blocks. Advanced Authentication Issues.

Overview. Over the next four weeks, we will look at these topics: Building Blocks. Advanced Authentication Issues. Overview Over the next four weeks, we will look at these topics: Building Blocks Advanced Authentication Issues Security Overview Storage and its abstraction Virtualization and appliances Data Replication

More information

Linux Networking: tcp. TCP context and interfaces

Linux Networking: tcp. TCP context and interfaces Linux Networking: tcp David Morgan TCP context and interfaces Computer A Computer B application process application process data data data data TCP process TCP process a network 1 TCP purposes and features

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work? Lab1 Definition of Sniffing: A program or device that captures vital information from the network traffic specific to a particular network. Passive Sniffing: It is called passive because it is difficult

More information

Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack. Ji-Ho CHO, Han LEE, Jeong-Min KIM and Geuk LEE *

Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack. Ji-Ho CHO, Han LEE, Jeong-Min KIM and Geuk LEE * 2016 International Conference on Applied Mathematics and Mechanics (ICAMM 2016) ISBN: 978-1-60595-399-1 Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack Ji-Ho CHO, Han LEE, Jeong-Min

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Detection, Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner

Detection, Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner Detection, Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner Kohei OHTA Glenn MANSFIELD Cyber Solutions Inc. Japan Yohsuke TAKEI

More information

To get a feel for how to use the FIREWALL > Live page in NextGen Admin, watch the following video:

To get a feel for how to use the FIREWALL > Live page in NextGen Admin, watch the following video: Under the Live tab, you can view and filter real-time information for the traffic that passes through the Barracuda NextGen Firewall F-Series. You can also manage the traffic sessions. To access the Live

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon

More information

SE 4C03 Winter 2005 Network Firewalls

SE 4C03 Winter 2005 Network Firewalls SE 4C03 Winter 2005 Network Firewalls Mohammed Bashir Khan - 0150805 Last revised 2005-04-04 1.0 Introduction Firewalls are literally walls which are embedded in the external and internal network interface

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

IP Named Access Control Lists

IP Named Access Control Lists Access control lists (ACLs) perform packet filtering to control the movement of packets through a network. Packet filtering provides security by limiting the access of traffic into a network, restricting

More information

IP Access List Overview

IP Access List Overview Access control lists (ACLs) perform packet filtering to control which packets move through a network and to where. The packet filtering provides security by helping to limit the network traffic, restrict

More information

network security s642 computer security adam everspaugh

network security s642 computer security adam everspaugh network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures not always up to date 0-days get through Someone brings in an infected

More information

Table of Contents 1 TCP Proxy Configuration 1-1

Table of Contents 1 TCP Proxy Configuration 1-1 Table of Contents 1 TCP Proxy Configuration 1-1 Overview 1-1 Introduction to SYN Flood Attack 1-1 Introduction to TCP Proxy 1-1 How TCP Proxy Works 1-2 Configuring TCP Proxy 1-3 Configuration Task List

More information

SCP SC Network Defense and Countermeasures (NDC) Exam.

SCP SC Network Defense and Countermeasures (NDC) Exam. SCP SC0-402 Network Defense and Countermeasures (NDC) Exam TYPE: DEMO http://www.examskey.com/sc0-402.html Examskey SCP SC0-402 exam demo product is here for you to test the quality of the product. This

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last revised 10-4-17 KonBoot Get into any account without the password Works on Windows and Linux No longer free Link Ch 5r From the

More information

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last revised 1-11-17 KonBoot Get into any account without the password Works on Windows and Linux No longer free Link Ch 5r From the

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Intrusion Detection CIT 480: Securing Computer Systems Slide #1 Topics 1. Definitions and Goals 2. Models of Intrusion Detection 3. False Positives 4. Architecture of

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures

More information

CE Advanced Network Security

CE Advanced Network Security CE 817 - Advanced Network Security Lecture 3 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Port Mirroring in CounterACT. CounterACT Technical Note

Port Mirroring in CounterACT. CounterACT Technical Note Table of Contents About Port Mirroring and the Packet Engine... 3 Information Based on Specific Protocols... 4 ARP... 4 DHCP... 5 HTTP... 6 NetBIOS... 7 TCP/UDP... 7 Endpoint Lifecycle... 8 Active Endpoint

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Category: Informational May 1996

Category: Informational May 1996 Network Working Group S. Bellovin Request for Comments: 1948 AT&T Research Category: Informational May 1996 Status of This Memo Defending Against Sequence Number Attacks This memo provides information

More information

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi INF5290 Ethical Hacking Lecture 3: Network reconnaissance, port scanning Universitetet i Oslo Laszlo Erdödi Lecture Overview Identifying hosts in a network Identifying services on a host What are the typical

More information

Studying the Security in VoIP Networks

Studying the Security in VoIP Networks Abstract Studying the Security in VoIP Networks A.Alseqyani, I.Mkwawa and L.Sun Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK e-mail: info@cscan.org Voice

More information

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Question No: 2 Which identifier is used to describe the application or process that submitted a log message? Volume: 65 Questions Question No: 1 Which definition of a fork in Linux is true? A. daemon to execute scheduled commands B. parent directory name of a file pathname C. macros for manipulating CPU sets

More information

Implementing Firewall Technologies

Implementing Firewall Technologies Implementing Firewall Technologies Network firewalls separate protected from non-protected areas preventing unauthorized users from accessing protected network resources. Technologies used: ACLs Standard,

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Honeynet Weekly Report Canadian Institute for Cybersecurity (CIC)

Honeynet Weekly Report Canadian Institute for Cybersecurity (CIC) Report (11) Captured from 04-05-2018 to 18-05-2018 1-Introduction The first honeypot studies released by Clifford Stoll in 1990, and from April 2008 the Canadian Honeynet chapter was founded at the University

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

tcp-map through type echo Commands

tcp-map through type echo Commands CHAPTER 31 31-1 tcp-map Chapter 31 tcp-map To define a set of TCP normalization actions, use the tcp-map command in global configuration mode. The TCP normalization feature lets you specify criteria that

More information

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 Table of Contents 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 i 1 Intrusion Detection Statistics Overview Intrusion detection is an important network

More information

Lab 8: Introduction to Pen Testing (HPING)

Lab 8: Introduction to Pen Testing (HPING) Lab 8: Introduction to Pen Testing (HPING) Aim: To provide a foundation in understanding of email with a focus on hping to provide security assessments and in understanding the trails of evidence produced.

More information

Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX

Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Configuring IP Session Filtering (Reflexive Access Lists)

Configuring IP Session Filtering (Reflexive Access Lists) Configuring IP Session Filtering (Reflexive Access Lists) This chapter describes how to configure reflexive access lists on your router. Reflexive access lists provide the ability to filter network traffic

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam.

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam. About Anti-Spam NOTE: Anti-Spam is a separate, licensed feature that provides a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing firewall.

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

Intruders (and How to Keep Them Out)

Intruders (and How to Keep Them Out) Intruders (and How to Keep Them Out) Overview More on intrusions Detecting intruders Dealing with intruders once you ve found them Firewalls Computer immunology Intruders 2 1 Why detect intruders? Catch

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Developing the Sensor Capability in Cyber Security

Developing the Sensor Capability in Cyber Security Developing the Sensor Capability in Cyber Security Tero Kokkonen, Ph.D. +358504385317 tero.kokkonen@jamk.fi JYVSECTEC JYVSECTEC - Jyväskylä Security Technology - is the cyber security research, development

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Race Conditions Secure Software Programming 2 Overview Parallel execution

More information

TCP IP Header Attack Vectors and Countermeasures

TCP IP Header Attack Vectors and Countermeasures American Journal of Science, Engineering and Technology 2017; 2(1): 39-49 http://www.sciencepublishinggroup.com/j/ajset doi: 10.11648/j.ajset.20170201.17 TCP IP Header Attack Vectors and Countermeasures

More information

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling. SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling http://killexams.com/exam-detail/sec504 QUESTION: 315 Which of the following techniques can be used to map 'open' or 'pass through'

More information

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks N S ABOUZAKHAR, A GANI, E SANCHEZ, G MANSON The Centre for Mobile Communications

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Nmap & Metasploit. Chun-Jen (James) Chung. Arizona State University

Nmap & Metasploit. Chun-Jen (James) Chung. Arizona State University Nmap & Metasploit Chun-Jen (James) Chung Nmap recap Nmap uses raw IP packets in novel ways to determine what hosts are available on the network What services (application name and version) those hosts

More information

ISA 674 Understanding Firewalls & NATs

ISA 674 Understanding Firewalls & NATs ISA 674 Understanding & NATs Angelos Stavrou September 12, 2012 Types of Types of Schematic of a Firewall Conceptual Pieces Packet UDP Packet Dynamic Packet Application Gateways Circuit Relays Personal

More information