UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640

Size: px
Start display at page:

Download "UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640"

Transcription

1 Contents Topic 1: Analogy... 2 Analogy: Deterring Jewel Thieves at a Museum... 2 Topic 2: Module Introduction... 4 Topic 3: Host-Based Intrusion Detection... 5 How Host-Based IDSs Work... 5 Topic 4: IDS vs. IPS... 8 IDS vs. IPS: Characteristics... 8 Topic 5: Intrusion Detection System Taxonomy Types of Intrusion Detection Systems Types of Knowledge-Based IDSs Topic 6: Behavior-Based Intrusion Detection Introduction to Behavior-Based Intrusion Detection Topic 7: Network-Based Intrusion Detection How Network-Based IDSs Work Topic 8: Signature-Based NIDSs Components of Snort Snort Rules Snort General Syntax for Rules Snort Rule Options Snort Activity Snort Activity What Is Bro? Topic 9: Summary Glossary UMUC 2012 Page 1 of 36

2 Topic 1: Analogy Analogy: Deterring Jewel Thieves at a Museum Intrusion Detection and Prevention Systems Module 7 Analogy: Deterring Jewel Thieves at a Museum Imagine the case of a notorious thief who intends to break into a heavily guarded museum. The thief uses various strategies and tools to enter the museum without being apprehended. The museum security personnel, on the other hand, have employed various measures to protect the valuables in the museum. The task of the museum security personnel is similar to that of cybersecurity experts who work to thwart the malicious intent of hackers. Layer 1 Surveillance The thief always cases the premises he is going to rob. Before robbing the museum, the thief tries to find out useful information such as the security measures installed at the museum and the layout of the building. The security team keeps an eye out for anyone probing the security systems or loitering near the premises. Perimeter Monitoring Similarly, a hacker usually performs a reconnaissance of the system that he wants to control. A hacker uses tools such as password attacks, OS and software application exploits, buffer overflow, and structured query language (SQL) injection attacks. Security personnel within an organization keep track of the latest tools used to identify vulnerabilities in their systems and to launch malicious attacks. Layer 2 Break-In Detection The head of museum security uses various types and combinations of measures to thwart thieves. Some of these measures, such as security cameras, are installed at possible entry points, outside the premises and at the periphery of the building. UMUC 2012 Page 2 of 36

3 Other measures such as infrared detection and display cases fitted with antisnatch alarms are deployed to protect specific artifacts inside the museum. Intrusion Detection To prevent cybersecurity attacks, security personnel can install an intrusion detection systems (IDS) at each host in the system or outside the network, or they can use a hybrid approach. Layer 3 Theft Prevention The head of museum security has an ace up his sleeve. He has attached radio frequency identification (RFID) tags to the most precious artifacts. The RFID tags constantly monitor the location of the artifacts. Any deviation in patterns, such as unusual activity around an object or unauthorized movement of an object, generates real-time alerts to security personnel, which can help prevent a theft. Intrusion Prevention Similarly, cybersecurity experts also use a type of IDS that keeps records of normal behavior and flags any deviation from this behavior. Cybersecurity experts use intrusion prevention systems (IPSs) to prevent malicious attacks by stopping harmful traffic from reaching the company s network instead of passively detecting and recording attacks. UMUC 2012 Page 3 of 36

4 Topic 2: Module Introduction An intrusion detection system (IDS) is a software application that monitors network traffic to detect intrusion attacks. An IDS is a warning system that notifies users about anomalies in incoming traffic, but it does not take any action to correct the anomalies. On the other hand, an intrusion prevention system (IPS) is a reactive system that not only detects suspicious incoming traffic but also automatically takes action to block it. This module covers IPSs, host-based IDSs, types of knowledge-based IDSs, and behavior-based IDSs. The module also discusses network-based IDSs and signaturebased IDSs such as Snort. UMUC 2012 Page 4 of 36

5 Topic 3: Host-Based Intrusion Detection How Host-Based IDSs Work Introduction Host-based intrusion detection systems (HIDSs) are installed as agents on a host. An HIDS analyzes internal systems to detect malicious activity or cyber attacks. An HIDS can be passive or reactive. A reactive HIDS informs the user of suspicious activity after it has happened, while a proactive HIDS sniffs the incoming traffic and alerts the user in real time. How an HIDS Works Every operating system, device, and application on a network generates logs or events that can help a user detect any intruder activity. Security log analysis, also known as logbased intrusion detection (LID), uses logs as the main source of information to detect attacks on systems, networks, or applications. LID is also capable of detecting software misuse, policy violations, and a host of other forms of inappropriate activities. Examples of logs include firewall logs, Web server logs, system logs, IDS event logs, and Windows event logs. An HIDS looks into any system or application log files to detect hostile or suspicious intrusion. Reference: Cid, D. (n.d.). What is an HIDS (host-based intrusion detection system)? Retrieved from Step 1 External network traffic flows into the OS. Step 2 Network traffic moves to the Web server. Step 3 UMUC 2012 Page 5 of 36

6 The Web server has correlated log files. Step 4 Log files are read by the HIDS. Step 5 HIDS generates alert messages and sends them to the user through the OS. Open Source Security HIDS The Open Source Security (OSSEC) HIDS is a platform used to monitor and control network systems. The OSSEC performs the following functions. Log Analysis and Monitoring Each operating system, application, and device on your network generates logs to record events and activities on the network as they occur. The OSSEC collects, analyzes, and correlates these logs. The OSSEC generates alerts if there is an indication of any attack, misuse, or error on the network. Integrity Checking An attack on networks and computers changes the system s integrity in some way. File integrity checking or file integrity monitoring (FIM) detects these changes and alerts the user when it happens. FIM detects changes in the system s integrity. This type of integrity checking is an essential part of intrusion detection. Windows Registry Monitoring Changes to the integrity of a system are not always attacks. They may even be a typo by an administrator or executive in a file, a directory, or the registry, or they may be caused by an employee s misuse. The OSSEC monitors Windows registry changes to applications. The changes generate an alert to the user immediately. Rootkit Detection In addition to the log analysis and integrity checking, the OSSEC HIDS performs rootkit detection on Linux-based systems. Rootkits are malicious and covert programs that change the behavior of the operating systems in which they are installed. The main purpose of a rootkit is to hide files, network ports, running processes, and services from the operating system and antivirus software. For example, to detect kernel-level rootkits, the OSSEC HIDS scans the entire file system for unusual files and permissions and looks for the presence of hidden network ports on which Trojans may listen. Active Response The OSSEC HIDS uses the term active response to refer to its solution for automatic execution of commands or fast responses in real time when security violations and threats are detected. This automatic remediation process of the OSSEC HIDS can be used to block specific hosts or services so that a detected threat or violation can be stopped in real time. Reference: Hay, A., Cid, D., & Bray, R. (2008). OSSEC host-based intrusion detection guide. Burlington, MA: Syngress. UMUC 2012 Page 6 of 36

7 OSSEC Alert Example OSSEC is a client-server architecture that can have multiple agents or sensors reporting to the central report server or a single agent running on the same machine as the report server. An OSSEC alert is classified according to the rule it matches and the level of significance of that rule. The OSSEC rules are classified in multiple levels, with 0 being the lowest and 15 the highest. Here is an example of an OSSEC alert that was generated because of an automated scanning of the Apache Web server for vulnerable PHP files. In this example, an attacker tried to access important PHP files such as setup.php in various locations. The OSSEC generated an alert because setup.php file doesn t exist on the Web server Apr 11 01:47:42 Rule Id: level: 10 Location: c13software->/var/log/apache2/access.log Src IP: Multiple web server 400 error codes from same source ip [11/Apr/2011:01:47: ] "GET //phpadmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //typo3/phpmyadmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //mysqladmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //mysql/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //myadmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //dbadmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //db/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //admin/phpmyadmin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //admin/pma/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //admin/scripts/setup.php HTTP/1.1" "-" "-" [11/Apr/2011:01:47: ] "GET //scripts/setup.php HTTP/1.1" "-" "-" Line 1: The first line displays the timestamp, rule ID, and severity level. The alert was generated on 2011 Apr 11 01:47:42, due to an event that matched rule # The severity level is 10. Line 2: This line indicates the location in the log file where the log entries are recorded. Line 3: This is the source IP address of the attacker. UMUC 2012 Page 7 of 36

8 Topic 4: IDS vs. IPS IDS vs. IPS: Characteristics An IDS identifies malicious, harmful, or unauthorized attacks or activities on a network. An IPS goes further, stopping the malicious attacks identified by the IDS. Although both systems recognize malicious attacks, they differ primarily in their network placement. Intrusion Detection System The IDS receives a copy of traffic for analysis. An IDS device is considered passive because it cannot block or stop the first or initial malicious packet. It can communicate with a security device or a router to prevent any subsequent network packets from getting through to the system. However, the initial offending packet can reach its destination. An IDS can be used to add value to a network that employs an IPS device by verifying that the IPS device is still operational. Intrusion Prevention System An IPS device resides in line with the traffic and can prevent the first malicious packet from reaching its destination because it can block or drop the traffic inline. An IPS device should be used if an organization wants to block malicious traffic in real time. UMUC 2012 Page 8 of 36

9 Hybrid Approach The image displays a hybrid approach to intrusion detection and prevention. An IDS device can be used to verify whether the IPS device is operational. Furthermore, an IDS device can be used to identify suspicious traffic and send an alert about that traffic without causing the IPS device to drop that particular traffic. Not all suspicious traffic is malicious. Activity Read the question and choose the correct option. Question: Thomas is a systems administrator with a telecom company. Over the past few months, he has had to deal with suspicious traffic entering the company s network. Recently, Thomas has also noticed a rise in the incidence of virus attacks. Which system would be more effective in proactively tackling Thomas s problem an IDS or an IPS? a. IDS b. IPS Correct answer: Option b Feedback: An IPS would proactively prevent harmful traffic from reaching the company s network. An IDS is a passive system, which would warn Thomas and his team about an impending harmful activity but would be unable to prevent it. UMUC 2012 Page 9 of 36

10 Topic 5: Intrusion Detection System Taxonomy Types of Intrusion Detection Systems There are two types of IDSs: knowledge-based and behavior-based. The two types of IDSs differ in their detection methods. A knowledge-based IDS, also known as a signature-based IDS, uses recorded evidence of previous attacks. A behavior-based IDS, also known as an anomaly-based IDS, keeps records of normal or regular behavior. Any deviation from this behavior triggers an alarm. Knowledge-Based IDSs In a knowledge-based IDS, information about previous attacks and vulnerabilities is contained in the system in the form of footprints or signatures. When a similar attack is encountered, an alarm is raised. Any action that does not attempt to exploit these vulnerabilities is considered acceptable and is passed without raising an alarm. Therefore, a signature-based IDS could fail to identify a unique attack. Behavior-Based IDSs A behavior-based intrusion detection system builds a model of normal or valid behavior from existing information. When a deviation from this model is observed, an alarm is raised. In this type of system, any new type of behavior is considered intrusive, triggering an alarm. However, behavior-based IDSs have high false-alarm rates compared to knowledge-based IDSs. UMUC 2012 Page 10 of 36

11 Topic 5: Intrusion Detection System Taxonomy Types of Knowledge-Based IDSs Knowledge-Based IDSs Knowledge-based intrusion detection offers several types of analytical approaches such as signature-based, expert systems-based, and state-transition approaches. Because the signature-based approach is most widely used, knowledge-based intrusion detection is often referred to as signature-based intrusion detection. Signature-Based Approach Most commercial products are based on signature-based systems, which examine the traffic for well-known attack patterns. Using this method, a security engineer must code a pattern match called a signature that can detect a known exploit. Network administrators routinely update the signature files that can detect new attacks. This update is similar to regular antivirus updates that ensure that antivirus software is up-to-date. For example, an IDS could search for a pattern in the Multipurpose Internet Mail Extension (MIME) header of an message. Expert System-Based Approach An expert system-based approach is a commonly used signature-based IDS scheme. Under this method, the expert system contains a set of rules that describe security attacks. This system enables users to record information about various attacks as if-then rules. Conditions indicative of an intrusion are given in the if part of the rule, and when an intrusion condition is met, the corresponding then part of the rule is performed. Here is an example of such a rule: If consecutive failed login attempts of a user > 5, then lock the user account. The above rule says that if a user makes six consecutive failed login attempts, the IDS will lock that user s account. Reference: Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks 31. Retrieved from ftp://polinux2.eui.upv.es/viejo/pub/doc/ids/towards_a_taxonomy_of_intrusion_detection_systems.pdf State Transition-Based Approach The state transition-based approaches use system state and state transitions expressions to describe and detect intrusions. The two main types of models used to apply state transition-based schemes to intrusion detection are: State transition analysis Petri nets State Transition Analysis An attack is described by two parameters, a set of goals, and the transitions that must be achieved by an intruder to enter the system. Transitions are represented on statetransition diagrams. UMUC 2012 Page 11 of 36

12 Colored Petri Nets Petri nets are a graphical formal modeling language in which places represent states and transitions describe relations between places. In a graphical representation, places are drawn as circles, transitions as bars, and tokens as dots. Transitions symbolize actions, and places symbolize states or conditions that need to be satisfied before an action can be executed. Places can hold tokens that may move from one place to another by executing actions. Here is an example of how a colored Petri net issues an alarm if a user with a low clearance logs into a multilevel system and tries to access a highly confidential file more than three consecutive times within five minutes. Step 1 When the user fails to access the confidential file, the transition, represented by a vertical bar, occurs from the start state to s2 if there is a token in state s1. The time of the first unsuccessful attempt is measured. Step 2 The user tries to access the file again and fails. Step 3 The user tries to access the confidential file for the third time and fails. Step 4 The transition from state s4 to state s5 can happen if there is a token in s4, an unsuccessful login attempt, and the time difference between this and the first unsuccessful access attempt is less than 5 minutes. The final state, s5, corresponds to signature matching and raises an alarm. Reference: Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks 31. Retrieved from ftp://polinux2.eui.upv.es/viejo/pub/doc/ids/towards_a_taxonomy_of_intrusion_detection_systems.pdf UMUC 2012 Page 12 of 36

13 State Transition Here is the state transition diagram for the example above. As shown in the diagram, the start state transits to the state s2 when a failed access attempt event takes place. The state s5 is reached after four consecutive failed attempts. UMUC 2012 Page 13 of 36

14 Topic 6: Behavior-Based Intrusion Detection Introduction to Behavior-Based Intrusion Detection Behavior-based intrusion detection is often referred to as profile-based detection. Using this detection approach, security experts build profiles for each user group in a system. A user profile includes information about user habits and usage patterns. If the deviation from this profile reaches a threshold, it triggers an alert. The profile can also build a baseline for network activities such as typical bandwidth usage of a network or a statistical usage of a particular Internet service. The statistical-based IDS is the most commonly used behavior-based intrusion detection approach. Behavior-Based IDSs Advantages Behavior-based IDSs: 1. Enable the detection of new attack vectors as they occur. 2. Control false-positive alarms by changing deviation-threshold values. 3. Offer customized profiles that make it difficult for attackers to identify the activities that could set off an alarm. Disadvantages Some disadvantages of behavior-based IDSs include: 1. Generation of false alarms: When a user activity deviates from the normal routine, the behavior-based IDS generates an alarm even when the activity is not malicious. 2. Maintenance of user profiles: The definition of normal behavior changes over the life of the system. As the system changes, the traffic or user behavior of the system can also change. The profile of the system must be updated to reflect those changes. 3. Nongeneration of alarms: Sometimes, if the intrusive activity imitates a regular user habit, then the activity may not generate an alarm. Statistical-Based Approach In this approach, the behavior of a user, system, or network is measured by a number of variables sampled over a period of time. Some of these variables include the login and logout time of each session, the resource duration, and the amount of processormemory-disk resources consumed during the session. UMUC 2012 Page 14 of 36

15 Example 1 Take the example of an organization that uses the Secure Shell (SSH) session length as a variable to measure the behavior of its systems. When the SSH session length exceeds the average SSH session length, there is a spike or deviation in the session length, which triggers an alarm. Example 2 Take the example of an organization that measures the network traffic on its corporate Web site as one of the variables to monitor deviations in behavior of its systems. Step 1 The organization regularly measures network traffic over a long period. Site statistics show that 45 percent of network traffic is directed to the company s public Web server. UMUC 2012 Page 15 of 36

16 Step 2 A sharp spike in Web traffic, in this case from 45 percent to 85 percent of the company s network traffic, triggers an alarm. UMUC 2012 Page 16 of 36

17 Topic 7: Network-Based Intrusion Detection How Network-Based IDSs Work A network-based IDS (NIDS) captures data packets traveling on cable or wireless network media and is usually implemented at the perimeter of an organization. Unlike an HIDS, an NIDS does not need to be installed on each host in the network. While the placement of the NIDS box depends on the network, it is advisable to place it behind the router or firewall. An NIDS monitors all the incoming and outgoing network traffic of a network for suspicious activity and logs or flags any anomaly. There are two types of NIDSs: signature-based and behavior-based. Signature-Based NIDSs A signature-based NIDS uses pattern matching to detect known attack patterns. An NIDS formats a network event and compares it against its knowledge base by using a pattern-matching analysis engine. The analysis engine searches for predefined patterns known as attacks. If the network event matches the pattern of the known attack, the analysis engine raises an alert. Behavior-Based NIDSs A behavior-based NIDS collects the network data in which behavior considered normal on the network is baselined over a period of time. The data collected is formatted, processed, and stored in the knowledge base. A monitored network event is compared to the knowledge base. An alarm is trigged by any network event that falls outside baseline normal activity. UMUC 2012 Page 17 of 36

18 Topic 8: Signature-Based NIDSs Components of Snort Snort is an open-source signature-based NIDS. It can operate as an IDS or an IPS. It was originally intended to function as a packet sniffer. As a packet sniffer, it can capture all of the packets of data that pass through a given network to detect any intrusions. Snort can be ported to a variety of platforms, such as Windows, FreeBSD, Linux, and Solaris. Snort has various components responsible for different aspects of the system. Reference: Rehman, R. (2003). Intrusion detection with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Copyright (2003) by Prentice Hall PTR. Used under the terms and conditions in the Open Publication License, version 1.0 or later. Packet Decoder The packet decoder receives packets from different types of network interfaces such as Ethernet, Serial Line Internet Protocol (SLIP), and Point-to-Point Protocol (PPP) from the Internet. The packets are prepared for preprocessing or to be sent to the detection engine. Preprocessors Preprocessors can be components of Snort or plug-ins. They arrange or modify data packets so that the packets can be compared against the rules in the detection engine. Some preprocessors look for anomalies in packet headers and generate alerts. Preprocessors are important for any IDS, as they prepare data packets for comparison against the rules in the detection engine. Detection Engine The detection engine uses Snort rules to detect any intrusive activity existing in a packet. If a packet matches any rule, the engine triggers an alert or logs the packet, depending upon what is found inside the packet. Otherwise, the packet is ignored and dropped. Logging and Alerting System This system maintains logs in formats including simple text files and tcpdump-style files. Output Components Output components are plug-ins. They control the output generated by the logging and alerting system. UMUC 2012 Page 18 of 36

19 Topic 8: Signature-Based NIDSs Snort Rules Snort is signature-based, and therefore it can be configured for specific threats. A system administrator can create a set of rules. The Snort rules search for the specific contents in the payload of a packet or for malicious settings in the header of a packet. There are two separate elements that make up a typical Snort rule Snort rule header and option, as shown below. Snort Rule: <rule header> The rule header consists of the following factors: rule actions (for example, log and alert), source IP address, destination IP address, source port, destination port, and protocol. <rule option> The second half of a rule is the rule option (also called a rule body). This rule option defines what is involved in the packet. Reference: Rehman, R. (2003). Intrusion detection with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Copyright (2003) by Prentice Hall PTR. Used under the terms and conditions in the Open Publication License, version 1.0 or later. Example The following rule generates an alert for every IP packet that Snort detects. alert ip any any -> any any (msg: "IP Packet detected";) This alert indicates that the rule will generate an alert message. This ip indicates that the rule will apply to all IP packets. 1 st any: This any is the placeholder for the source IP address. Here, any is a keyword for all IP addresses. 2 nd any: This any is the placeholder for the source port. Here, any is a keyword for all port numbers. ->: The -> symbol indicates the direction of the packet flow. 3 rd any: This any is the placeholder for the destination IP address. Here, any is a keyword for all IP addresses. 4 th any: This any is the placeholder for the destination port. Here, any is a keyword for all port numbers. Msg: The element msg is an element of the rule option. It indicates that the message IP packet detected will output if a network event matches the rule. UMUC 2012 Page 19 of 36

20 Variation A rule may detect one type or multiple types of intrusion activity. The following rule will generate an alert if an ICMP packet is detected going to the IP address with a time-to-live flag of 100. alert icmp any any -> /32 any (msg: "ICMP Packet"; ttl:100;) /32 indicates a subnet mask of the IP address Because /32 is used, the rule scans for an entire 32-bit source IP address that is, the host with IP address Note that there are two options (msg and ttl) specified in the rule option. UMUC 2012 Page 20 of 36

21 Topic 8: Signature-Based NIDSs Snort General Syntax for Rules The following shows an overview of how a Snort rule is laid out. Rule Action Protocol Source IP Address Source Port Header Flow (Direction) Destination IP Address Destination Port Reference: Rehman, R. (2003). Intrusion detection with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Copyright (2003) by Prentice Hall PTR. Used under the terms and conditions in the Open Publication License, version 1.0 or later. Option Additional Tests, Output Messages, Etc. Rule Action Snort has five built-in rule actions: log, alert, pass, activate, and dynamic. In this module, our focus is alert. The alert action writes a log entry and posts a notification when some network event (data packet) exactly matches a rule. The alert action is the most common action. Protocol Protocol specifies both high- and low-level protocols. High-level protocols include http, ftp, and dns. Low-level protocols include tcp, udp, and icmp. Source/Destination IP Address There are two address parts in a Snort rule that are used to check the source from which the packet originated and the destination of the packet. The address may be a single IP address or a network address or any. Notice that the format of the IP address uses Classless Inter-Domain Routing (CIDR). By using CIDR, network addresses are written using the number of bits in the netmask at the end of the IP address. Examples: An address /32 defines a single host with IP address An address /24 defines a class C network with addresses ranging from to Address exclusion: Snort provides a mechanism to exclude addresses by the use of the negation symbol!, an exclamation point. This symbol is used with the address to direct Snort not to test packets coming from or going to that address. Here is an example: alert icmp![ /24] any -> any any (msg: "Ping ;) The above rule will be applied to all ICMP packets that do not originate from the subnet. Notice that the square bracket is used for the exclusion. Snort can specify multiple IPs or ranges as well. Here is an example: alert icmp![ /24, /24] any -> any any (msg: Ping ;) The above example triggers alerts for each ICMP packet that does not originate from the or subnet. UMUC 2012 Page 21 of 36

22 Source/Destination Port These parts of the syntax specify the port numbers. These numbers are relevant only when dealing with TCP or UDP packets. The first number is used to apply a rule on packets originating from a port. The second number is used to apply a rule on packets that go to that port. Learn More A colon can be used to specify a range of ports. For example, the following rule will create an alert for all UDP traffic coming from ports 1024 to 2048 from all hosts. alert udp any 1024: > any any (msg: UDP ports ;) The syntax allows users to specify only a starting port number or an ending port number in the range, if desired. Here is an example: 1000: includes all numbers above port 1000 and also includes :1024 includes all numbers up to It also includes The negation symbol! can be used to exclude a port or range of ports. For example, the following rule logs all UDP traffic except for source port number 53. logudp any!53 -> any any Note that it is invalid to use a comma character in the port field to specify multiple ports. Flow Direction The direction part of the syntax determines the source and destination addresses and port numbers in a rule. The direction symbol -> is typically used to denote the direction of a packet flow. Learn More Use the -> symbol to specify the address and port numbers on the left side of the direction field. Use the source of the packet and the address and port numbers on the right side of the field as the destination. The <- symbol is not used in Snort. A user can make -> equivalent to <- by switching the IP addresses and port numbers. Use the <> symbol to specify that the rule will be applied to packets traveling in either direction. This symbol is useful when you want to monitor data packets for both client and server. UMUC 2012 Page 22 of 36

23 Topic 8: Signature-Based NIDSs Snort Rule Options Snort has the ability to search for signatures inside a packet. The signature may be an ASCII string or binary data in the form of hexadecimal characters. Multiple content keywords can be used to find multiple signatures. Some keywords that can be used to refine content matching include content, offset, depth, nocase, content-list, and flags. Content The content keyword is used to find a string pattern inside a packet payload. The pattern is expressed in the form of an ASCII string or as binary data in the form of hexadecimal characters. Note that content matching is a computational-intensive process. Thus, using many rules for content (pattern) matching can negatively affect system performance. A few examples are illustrated as follows: alert tcp /24 any -> (content: hacking ; msg: malicious packet ;) The above rule says that an alert is generated if the packet ( ) is sent to the e- mail server ( ) containing the word hacking. Note that the mail port number is 25 and most mail packets are sent via TCP. alert tcp /24 any ->![ /24] any (content: "POST"; msg: "HTTP POST";) The above rule finds all http POST requests in the data part of TCP packets that leave the subnet /24 alert tcp any any -> any any (msg: binary string 7c fe in hex format is detected! ; content: 7c fe ;) The above rule says an alert is generated if the packet contains a series of hexadecimal characters (binary data) 7c fe Note that two symbols are used to enclose the hexadecimal characters. Offset The offset keyword can be used to specify the start of a search after a certain byte in the packet. For example, the following rule starts searching for the word password after eight bytes: alert tcp /24 any -> any any (content: password ;offset: 8; msg: Password can be revealed ;) Depth The depth keyword is used to specify a search that is limited to a certain byte in the packet. For example, the following rule tries to find the word HTTP between characters 8 and 40 of the data part of the TCP packet. alert tcp /24 any -> any any (content: "HTTP"; offset: 8; depth: 40; msg: "HTTP matched";) UMUC 2012 Page 23 of 36

24 Nocase The nocase keyword is used to turn off case-sensitive search. Content-List The content-list keyword is used to specify a text file that contains a list of words to be found in the packet. For example, a file named hack may contain a list of words such as password, cracking, and attack on three separate lines. The following rule will search this list of words (password, cracking, and attack) in the data portion of all packets matching the rule criterion. alert ip any any -> /24 any (content-list: "hack"; msg: "Malicious traffic";) Flags The flags keyword is used to find out which flag bits are set inside a TCP header of a packet. For example, the following rule alerts when a TCP ACK packet is received from the /24 subnet. alert tcp /24 any->any any (msg: ACK packet! ; flags: A;) The following TCP flags are used in Snort: F: FIN S: SYN R: RST P: PSH A: ACK U: URG 1: Reserved bit 1 2: Reserved bit 2 0: No flag set UMUC 2012 Page 24 of 36

25 Topic 8: Signature-Based NIDSs Snort Activity 1 Question 1: Select a Snort rule that generates an alert when a UDP packet is viewed from the /16 subnet with a port number greater than a. alert udp any 1000: -> any any b. log udp /16 any <> any any c. log udp / : -> any any d. alert udp / : -> any any Correct answer: Option d Feedback for Option a: Not quite. The rule has to include the IP range /16 and the port range has to be above This rule includes the port Feedback for Option b: Not quite. The rule has to generate an alert. This rule generates a log. In addition, the rule has to exclude ports that are less than This rule includes all ports. In addition, the source of the packet has to be /16. This rule is hit even when the /16 subnet is the destination. Feedback for Option c: Not quite. The rule has to generate an alert. However, this rule generates a log. Feedback for Option d: That's correct. This rule generates alerts when a UDP packet is seen from the /16 subnet with a port number greater than Question 2: Choose the Snort rule that logs when H4X0R is detected in the content of a TCP packet after 20 bytes between the /24 and /24 subnet. a. alert tcp /24 any -> /24 any (content: H4X0R ) b. alert tcp any <> any (content: H4XOR ; offset:20) c. log tcp /24 any <> /24 any (content: H4X0R ; offset: 20;) d. log udp /24 any -> /24 any (content: H4X0R ; offset:20) Correct answer: Option c UMUC 2012 Page 25 of 36

26 Feedback for Option a: Not quite. The subnet mask has to be /24. The rule has to check all TCP packets between /24 and /24. Also, the offset needs to be included in the options, and the rule has to generate a log. Feedback for Option b: Not quite. The rule has to generate a log, not an alert. Also, the content is not typed correctly. Feedback for Option c: That's correct. This rule logs when H4X0R is detected in the content of a TCP packet after 20 bytes between the /24 and /24 subnet. Feedback for Option d: Not quite. The rule has to check all TCP packets (not UDP) between the /24 and /24 subnet. UMUC 2012 Page 26 of 36

27 Topic 8: Signature-Based NIDSs Snort Activity 2 Introduction An organization, CybN Inc., is using Low Orbit Ion Cannon (LOIC) to test its network s robustness against malicious attacks. LOIC is an open source network attack application written in C#. It is a denial-of-service (DoS) or stress-testing tool, popularized by the group Anonymous with its attacks against MasterCard and Sony. LOIC is available for Windows, Mac, and Linux. When the URL or IP address is entered into LOIC, it performs a DoS attack to disrupt the service of a particular host. LOIC floods the server with TCP packets, UDP packets, or HTTP requests. Greg, a security analyst at CybN, has used LOIC attack methods to study the strength of the organization's network security. He has generated some screenshots. Greg now needs to decide whether the network is under a malicious attack and select the relevant Snort rules for two attack scenarios. Workspace Step 1: UDP DoS Attack NAT Diagram In this diagram, the NAT router is the only equipment with a publicly accessible IP address. The router translates all incoming traffic into the private network /16. The IDS is located inside the private network, between the router and all other systems on the network. UMUC 2012 Page 27 of 36

28 Question: The image provided shows the output of a UDP DoS attack. Identify the options that most accurately describe why the network activity shown in the image is malicious. a. A series of UDP packets is sent from the source b. A series of UDP packets targeting the HTTP Port (80) c. A burst of UDP packets within.0018 seconds d. Source Port and Destination port 80 are used Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Correct answers: Options a, b, c Feedback: is a private IP address. If a UDP packet originating from a private IP address is received, it is malicious unless you are not on the same subnet. A range of IP addresses, , is reserved for the private IP. The image shows that UDP traffic uses port 80. Port 80 is reserved for HTTP, and HTTP is based on TCP, not UDP. A sudden burst of UDP packets indicates DoS attacks. Snort Rule to Detect a UDP Attack LOIC's UDP attack generates many UDP packets in a short time. To allow Snort to keep track of the activity within a period from a specific host, a threshold can be set with the option "threshold: type threshold. Additional options can be added, such as "track by_src" to keep track of the traffic on a per source base. To raise the alert when a certain packet count is reached in a certain time frame, "count" and "seconds" flags can also be defined. Here is how to derive a Snort IDS rule that will alert when a UDP attack is detected targeting the private /16 subnet on port 80. alert udp any any -> /16 80 (msg: "LOIC UDP"; threshold: type threshold, track by_src, count 100, seconds 1;) UMUC 2012 Page 28 of 36

29 TCP SYN Flood DoS Question: This image shows the output of a TCP SYN flood DoS attack. Identify the options that most accurately describe why the network activity shown in the image looks malicious. a. A series of TCP packets is sent from the source b. A series of TCP SYN packets connecting to the HTTP Port (80) c. Burst of TCP SYN packets originating from the same source IP d. Random source port is used to connect to HTTP Port (80) Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Correct answers: Options a, c Feedback: is a private IP address, and if a TCP packet originating from a private IP address is received, it is malicious when not on the same subnet. Requesting many TCP SYN connections from the same source in a short period of time is very suspicious. By itself, the information in Option B does not suggest suspicious activity. Browsers often establish multiple connections to a Web server simultaneously from multiple ports. Therefore, this information in Option D by itself is not suspicious. Snort Rule Question: The image provided shows the output of a Snort rule that generates an alert when a TCP SYN flood is detected targeting the /16 subnet. Identify the Snort rule that will generate this output. a. alert tcp any any -> /16 80 (msg: SYN FLOOD ; flags: S; threshold: type threshold, track by_src, count 10, seconds 10;) b. alert tcp any any -> /16 any (msg: SYN FLOOD ; threshold: type threshold, track by_src, count 100, seconds 1;) c. log tcp any any -> /16 any (msg: SYN FLOOD ; flags: S;) d. log tcp any any -> /16 80 (msg: SYN FLOOD ; flags: S; threshold: type threshold, track by_src, count 100, seconds 10;) UMUC 2012 Page 29 of 36

30 Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Correct answer: Option a Feedback: This rule will be triggered when 10 SYN packets are observed in a 10-second interval from the same source targeting the HTTP port (80). Malicious Binary Download The image depicts the sequence of events of a user accidentally visiting a malicious Web site and downloading a suspicious binary executable. This is an illustration of the Wireshark screenshot included below. UMUC 2012 Page 30 of 36

31 Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. The image shows a user initiating a download of a suspicious binary named funny_screensaver.exe. The binary may or may not be malicious, but it is definitely suspicious. Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. The image shows a segment of the binary being transferred from the suspicious Web server to the user. Question: Refer to the diagram and the Wireshark images. Evaluate which of the following Snort rules is the most effective in detecting future downloads of the binary executable from the Internet. a. log tcp any any -> any 80 (msg: funny_screensaver.exe! ; content: funny_screensaver ;) UMUC 2012 Page 31 of 36

32 b. log tcp any any -> any any (msg: funny_screensaver.exe! ; content: 7c fe c2 9f 3c d8 ;) c. log tcp /32 any -> any any (msg: funny_screensaver.exe! ;) d. log udp / > any any (msg: funny_screensaver.exe! ; content: funny_screensaver.exe ;) Correct answer: Option b Feedback: The log will be generated if the segment of the binary in hex format is detected in any TCP packet. This is the most effective rule among the ones presented. Review Suspicious binaries can be targeted by looking for parts of the binary, in hex format, in the packets passing through the IDS. This method is very common. However, it may be ineffective when malicious binaries disguise themselves as they spread. In such cases, having a static binary hex in the Snort signature will not detect different versions of the same binary. Further Challenges Besides disguising the binary, how would encryption affect the Snort rule presented in Question 4 of the Workspace tab? Here s the Snort rule for reference: log tcp any any -> any any (msg: funny_screensaver.exe! ; content: 7c fe c2 9f 3c d8 ;) UMUC 2012 Page 32 of 36

33 Topic 8: Signature-Based NIDSs What Is Bro? Bro is an open-source, UNIX-based, signature- and behavior-based NIDS. Bro s Working How Does Bro Work? Bro detects harmful or hostile traffic by first analyzing network traffic to extract its application-level semantics. It then executes event-oriented analyzers that compare the activity with suspicious patterns. Bro s parsing includes detection of specific attacks and unusual activities. The attacks include those defined by signatures and those defined by events. Certain hosts connecting to certain services or patterns of failed connection attempts are examples of unusual activities. Bro s Operation How Does a Site Tailor Bro's Operation? A site tailors Bro s operation using Bro s specialized policy language. When a malicious activity is detected, Bro can be instructed to generate a log entry, generate an alert in real time, or execute an operating system command. An example of executing an operating system command is terminating a connection or blocking a malicious host. Bro Signatures Bro Signatures Bro has a tool called snort2bro that can used to convert Snort signatures into Bro signatures. Reference: Bro Intrusion Detection System. (2011). Retrieved from Example Consider the conversion of the following Snort rule. alert udp / : -> any any () Here is the snort2bro command and the converted output of the Snort rule../snort2bro /etc/snort/rules/test.rules Reading /etc/snort/rules/test.rules signature sid-unknown-0 { ip-proto == udp src-ip == /16 src-port>= 1001 src-port<= } UMUC 2012 Page 33 of 36

34 Topic 9: Summary We have come to the end of Module 7. The key concepts covered in this module are listed below. An intrusion detection system (IDS) is a warning system that notifies users about any anomalies in incoming traffic, but it does not take any action to correct the anomalies. An intrusion prevention system (IPS) is a reactive system that not only detects suspicious incoming traffic but also automatically takes necessary action to block it. Host-based intrusion detection systems (HIDSs) are installed as agents on a host. An HIDS analyzes internal systems to detect malicious activity or cyber attacks. There are two types of IDSs: knowledge-based and anomaly-based. In a knowledge-based IDS, information about previous attacks and vulnerabilities is contained in the system in the form of footprints or signatures. A behavior-based intrusion detection system builds a model of normal or valid behavior from existing information. When a deviation from this model is observed, an alarm is raised. Knowledge-based IDSs includes signature-based IDSs, expert-based IDSs, and transition-based IDSs. Snort is an open-source signature-based NIDS that can operate as an IDS or an IPS. Snort rules are created using information about signatures of intruder activities. Bro is an open-source, UNIX-based, signature-, and behavior-based NIDS. UMUC 2012 Page 34 of 36

35 Glossary Bandwidth Term Behavior-Based Intrusion Detection System Bro Classless Inter-Domain Routing File Integrity Monitoring Firewall Host Host-Based Intrusion Detection System Intrusion Detection System Intrusion Prevention System Knowledge-Based Intrusion Detection System Log Analysis Definition Bandwidth is the speed at which data is transferred. A behavior-based intrusion detection system uses information about the normal behavior of the system it is monitoring. Bro is an open-source, UNIX-based signature- and behaviorbased network intrusion detection system. Classless Inter-Domain Routing (CIDR) is a method of interpreting IP addresses and routing Internet Protocol packets. File integrity monitoring is the process of verifying the authenticity of a file with the help of algorithms. A firewall is the hardware or software that prevents unauthorized users from accessing a computer or a network. A host is a network connected computer that provides facilities to other computers. A host-based intrusion detection system (HIDS) performs detection of any suspicious activity from within the system. An intrusion detection system (IDS) detects malicious activities on the network and reports them to the system administrator. An intrusion prevention system (IPS) monitors and blocks any malicious activity in a network or system. A knowledge-based intrusion detection system uses information about a malicious attack. Log analysis is the technique involved in comprehending computer-generated records or logs. MIME Header Multipurpose Internet Mail Extensions (MIMEs) enable e- mail to support characters other than ASCII, nontext attachments, message bodies with multiple parts and header information in non-ascii character form. A MIME header indicates that the message is MIME-formatted. Network-Based Intrusion Detection System Packet Petri Nets A network-based intrusion detection system (NIDS) is an IDS that tries to detect malicious activity by checking traffic on a network. A packet is a unit into which a larger piece of data is broken down for more efficient transmission. Petri nets are a graphical formal modeling language in which places represent states and transitions describe relations between places. UMUC 2012 Page 35 of 36

36 POP Rootkit Router Snort Spyware SSH Term Standard Deviation TCP Flags TCP SYN Packets Telnet User Datagram Protocol Windows Registry Monitoring Definition Post Office Protocol (POP) is a protocol which brings from and to a mail server. A rootkit is software or tools that allow intruders to get administrative-level access to a target system, and at the same time, hide their presence. A router is a device that facilitates the movement of packets of data between two points on a network. Snort is an open-source signature-based NIDS. Spyware is a type of malware that resides on a user s computer and gathers information about the user without his or her knowledge. Secure Shell (SSH) is a data exchange protocol that allows data to be exchanged using a secure channel between two network devices. Standard deviation is a measure of the variation in a distribution, equal to the square root of the arithmetic mean of the squares of the deviations from the arithmetic mean. TCP flags are control bits that show different connection states or give information about how a packet should be handled. TCP SYN packets are cookies that are the key element of a technique used to guard against SYN flood attacks. Telnet enables remote use and supervision of systems. Network administrators monitor and control systems remotely using Telnet. User Datagram Protocol (UDP) is a network protocol that allows computers to exchange messages over an Internet network without the need for special transmission channels or data paths. Windows registry monitoring is a tool that enables users to view all registry activity in real time. UMUC 2012 Page 36 of 36

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Intrusion Detection CIT 480: Securing Computer Systems Slide #1 Topics 1. Definitions and Goals 2. Models of Intrusion Detection 3. False Positives 4. Architecture of

More information

Exam Questions v8

Exam Questions v8 Exam Questions 412-79v8 EC-Council Certified Security Analyst https://www.2passeasy.com/dumps/412-79v8/ 1.Which of the following password cracking techniques is used when the attacker has some information

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Developing the Sensor Capability in Cyber Security

Developing the Sensor Capability in Cyber Security Developing the Sensor Capability in Cyber Security Tero Kokkonen, Ph.D. +358504385317 tero.kokkonen@jamk.fi JYVSECTEC JYVSECTEC - Jyväskylä Security Technology - is the cyber security research, development

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

The Intrusion Rules Editor

The Intrusion Rules Editor The following topics describe how to use the intrusion rules editor: An Introduction to Intrusion Rule Editing, page 1 Rule Anatomy, page 2 Custom Rule Creation, page 14 Searching for Rules, page 20 Rule

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

The Intrusion Rules Editor

The Intrusion Rules Editor The following topics describe how to use the intrusion rules editor: An Introduction to Intrusion Rule Editing, on page 1 Rule Anatomy, on page 2 Custom Rule Creation, on page 14 Searching for Rules, on

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures

More information

SCP SC Network Defense and Countermeasures (NDC) Exam.

SCP SC Network Defense and Countermeasures (NDC) Exam. SCP SC0-402 Network Defense and Countermeasures (NDC) Exam TYPE: DEMO http://www.examskey.com/sc0-402.html Examskey SCP SC0-402 exam demo product is here for you to test the quality of the product. This

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures not always up to date 0-days get through Someone brings in an infected

More information

CISNTWK-440. Chapter 5 Network Defenses

CISNTWK-440. Chapter 5 Network Defenses CISNTWK-440 Intro to Network Security Chapter 5 Network Defenses 1 Objectives Explain how to enhance security through network design Define network address translation and network access control List the

More information

Activating Intrusion Prevention Service

Activating Intrusion Prevention Service Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers

More information

CNIT 121: Computer Forensics. 9 Network Evidence

CNIT 121: Computer Forensics. 9 Network Evidence CNIT 121: Computer Forensics 9 Network Evidence The Case for Network Monitoring Types of Network Monitoring Types of Network Monitoring Event-based alerts Snort, Suricata, SourceFire, RSA NetWitness Require

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

Intrusion Detection Systems and Network Security

Intrusion Detection Systems and Network Security Intrusion Detection Systems and Network Security Chapter 13 Background A layered network security approach starts with a well-secured system: Up-to-date application and operating system patches. Well-chosen

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work? Lab1 Definition of Sniffing: A program or device that captures vital information from the network traffic specific to a particular network. Passive Sniffing: It is called passive because it is difficult

More information

The following topics describe how to configure correlation policies and rules.

The following topics describe how to configure correlation policies and rules. The following topics describe how to configure correlation policies and rules. Introduction to and Rules, page 1 Configuring, page 2 Configuring Correlation Rules, page 5 Configuring Correlation Response

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 22-1 1. Intruders 2. Intrusion

More information

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 13 Chapter 6: Intrusion Detection Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events,

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Intrusion Detection. What is Intrusion Detection

Intrusion Detection. What is Intrusion Detection Intrusion Detection 1 What is Intrusion Detection We are referering to the act of detecting an unauthorized intrusion by a computer on a Network. Attemp to compromise or otherwise do harm, to other Network

More information

The Intrusion Rules Editor

The Intrusion Rules Editor The following topics describe how to use the intrusion rules editor: An Introduction to Intrusion Rule Editing, page 1 Rule Anatomy, page 2 Custom Rule Creation, page 15 Searching for Rules, page 20 Rule

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam IDS / SNORT Matsuzaki maz Yoshinobu stole slides from Fakrul Alam 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Professor, SIS Lecture 12 2016 Intrusion Detection, Auditing System Firewalls & VPN 1 Intrusion Detection 2 Intrusion Detection/Response Denning:

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards. or Detection Comp Sci 3600 Security Outline or 1 2 3 4 5 or 6 7 8 Classes of or Individuals or members of an organized crime group with a goal of financial reward Their activities may include: Identity

More information

Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP

Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP Sagar N. Shah* M.E. (Computer Science & Engineering), Parul Institute of Engineering & Technology, Vadodara, Gujarat, India Ms.

More information

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter Computer Network Lab 2017 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter 1 Security Security means, protect information (during

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

CE Advanced Network Security

CE Advanced Network Security CE 817 - Advanced Network Security Lecture 5 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other

More information

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

UMSSIA INTRUSION DETECTION

UMSSIA INTRUSION DETECTION UMSSIA INTRUSION DETECTION INTRUSION DETECTION Sensor1 Event1, Event2 Monitor No intrusion M SensorN Event1, Event2 Alarm! IDS CHARACTERISTICS Characteristics an IDS can be classified/evaluated by: Type

More information

ECCouncil Certified Ethical Hacker. Download Full Version :

ECCouncil Certified Ethical Hacker. Download Full Version : ECCouncil 312-50 Certified Ethical Hacker Download Full Version : http://killexams.com/pass4sure/exam-detail/312-50 A. Cookie Poisoning B. Session Hijacking C. Cross Site Scripting* D. Web server hacking

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 6 Intrusion Detection First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Intruders significant issue hostile/unwanted

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : GCFW Title : GIAC Certified Firewall Analyst Vendors : GIAC Version : DEMO Get Latest & Valid GCFW Exam's

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

CNIT 50: Network Security Monitoring. 6 Command Line Packet Analysis Tools

CNIT 50: Network Security Monitoring. 6 Command Line Packet Analysis Tools CNIT 50: Network Security Monitoring 6 Command Line Packet Analysis Tools Topics SO Tool Categories Running Tcpdump Using Dumpcap and Tshark Running Argus and the Ra Client SO Tool Categories Three Types

More information

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation) 1 Network Security Kitisak Jirawannakool Electronics Government Agency (public organisation) A Brief History of the World 2 OSI Model vs TCP/IP suite 3 TFTP & SMTP 4 ICMP 5 NAT/PAT 6 ARP/RARP 7 DHCP 8

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

system to cover their tracks, the HIDS can provide an independent audit trail of the attack.

system to cover their tracks, the HIDS can provide an independent audit trail of the attack. A host-based IDS (HIDS) works differently from a network-based version of IDS. While a network-based IDS resides on a network segment and monitors activities across that segment, a host-based IDS resides

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

1. Intrusion Detection and Prevention Systems

1. Intrusion Detection and Prevention Systems 1. Intrusion Detection and Prevention Systems Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which

More information

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In?

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In? Detection Vulnerability Assessment Week 4 Part 2 How Much Danger Am I In? Vulnerability Assessment Aspects of Assessment Vulnerability Assessment is a systematic evaluation of asset exposure to threats

More information

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology Behavior-Based IDS: Overview and Deployment Methodology Lancope 3155 Royal Drive, Building 100 Alpharetta, Georgia 30022 Phone: 770.225.6500 Fax: 770.225.6501 www.lancope.com techinfo@lancope.com Overview

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Incident Response. Figure 10-1: Incident Response. Figure 10-2: Program and Data Backup. Figure 10-1: Incident Response. Figure 10-2: Program and Data

Incident Response. Figure 10-1: Incident Response. Figure 10-2: Program and Data Backup. Figure 10-1: Incident Response. Figure 10-2: Program and Data Figure 10-1: Incident Response Incident Response Chapter 10 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Incidents Happen Protections sometimes break down Incident Severity

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

NetDetector The Most Advanced Network Security and Forensics Analysis System

NetDetector The Most Advanced Network Security and Forensics Analysis System Get Real......Real Solutions For Global Networks www.niksun.com NetDetector The Most Advanced Network Security and Forensics Analysis System NIKSUN, Inc. 1100 Cornwall Road Monmouth Junction, NJ 08852

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

Computer Science 3CN3 and Software Engineering 4C03 Final Exam Answer Key

Computer Science 3CN3 and Software Engineering 4C03 Final Exam Answer Key Computer Science 3CN3 and Software Engineering 4C03 Final Exam Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2008 THIS EXAMINATION

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Intrusion Detection and Prevention

Intrusion Detection and Prevention Intrusion Detection and Prevention Outlines: Intrusion Tpesof Types Intrusion Intrusion Detection Models Intrusion Prevention Models By: Arash Habibi Lashkari July 2010 Network Security 07 1 Definition

More information

Security Device Roles

Security Device Roles Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

Paloalto Networks PCNSA EXAM

Paloalto Networks PCNSA EXAM Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Topics. Principles of Intrusion Detection. Intrusion Detection. Characteristics of systems not under attack

Topics. Principles of Intrusion Detection. Intrusion Detection. Characteristics of systems not under attack Intrusion Detection Topics 1. Principles 2. Models of Intrusion Detection 3. False Positives 4. Architecture of an IDS 5. IDS Deployment 6. Active Response (IPS) 7. Host-based IDS and IPS 8. IDS Evasion

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Implementation of Signature-based Detection System using Snort in Windows

Implementation of Signature-based Detection System using Snort in Windows Implementation of Signature-based Detection System using Snort in Windows Prerika Agarwal Sangita Satapathy Ajay Kumar Garg Engineering College, Ghaziabad Abstract: Threats of attacks are increasing day

More information

CIH

CIH mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet

More information

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Introduction One of the earliest indicators of an impending network attack is the presence of network reconnaissance.

More information

GCIH. GIAC Certified Incident Handler.

GCIH. GIAC Certified Incident Handler. GIAC GCIH GIAC Certified Incident Handler TYPE: DEMO http://www.examskey.com/gcih.html Examskey GIAC GCIH exam demo product is here for you to test the quality of the product. This GIAC GCIH demo also

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0 Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Comments and errata should be directed to: cyber- tm@cisco.com Introduction One of the most common network

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 12 This chapter describes how to create multiple security policies and apply them to individual virtual sensors. It contains the following sections: Understanding Policies, page 12-1 Anomaly Detection

More information