版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Intrusion DetectionCS-480bDick Steflik1Hacking AttemptsIP Address Scansscan the range of addresses looking for hosts (ping scan)Port Scansscan promising ports for openness (80, 21, )Service Evaluationdetermine the OS Target Selectionpick the most vulnerable host, most running services.Vulnerability
2、ProbesAutomated password attacksFTP, HTTP, NetBIOS, VNC PCAnywhere.Application specific attackstry known vulnerabilities on present services2Intrusion Detection Systems (IDS)Inspection Based (Signature Based)Uses a database of known attack signaturesobserve the activity on a host or network and make
3、 judgements about whether or not an intrusion is in progress or has taken placelook for known indicatorsICMP Scans, port scans, connection attemptsCPU, RAM I/O Utilization activity, modification of system files, permission modificationsAnomaly Basedbaseline the normal traffic and then look for thing
4、s that are out of the norm Variations of IDSRule basedStatisticalHybrid3Decoys/HoneypotsPurposely place an incorrectly configured or unprotected system where it is easily found so that a hacker will try to use it as an attack vector. All accesses will set off alarms that indicate an intrusion is in
5、progress4IDS SystemsTripwireWindows or UNIXalarms on modification to system filesc:c:WINNTc:WINNTsystemc:WINNTsystem32CyberCopNetwork Assoc.suite of 4 ID toolsSun/SymanteciForce IDS ApplianceSun/Solaris and Symantecs ManHunt IDSID Analysis at 2 Gbits /secManHunt uses distributed network sensors and
6、a variety of methods to identify threats, including protocol-anomaly detection, signature detection, traffic-state profiling and statistical flow analysis. 5SNORTOpen Source ( )Uses:Packet Snifferproduces a tcpdump formatted outputPacket Logger can log packets so that after-the-fact data mining tool
7、s can be used for analysisTraffic Debugging and AnalysisCan design a ruleset that recognizes certain traffic patternsCan do both anomaly based and Inspection based detectionSPADE (Silicon Defense) a SNORT preprocessor that logs anomalies for later analysis 6ActiveScoutForeScout Technologies ( )Intru
8、sion Prevention ToolMethod:Watches for hacker reconnaissance (port scans, NetBios Scans, ect.)Return bogus info to hackerIf hackers attempts to break in with the bogus data Active Scout sets off alarms or block any further traffic for the intruderDownside: only works in conjunction with Check Points
9、 Firewall-1Requires little administration and eliminates many false positivesCost w/T1 port is about $10K7ManhuntSymantec Corp. ( )Advanced Threat Management SystemSignature based hybrid detectionprotocol anomaly detection traffic rate monitoring protocol state trackingIP packet reassembly to provid
10、e a level of detection superior to other, signature-based systems. These detection capabilities can identify threats in real time, eveReal-time Analysis and Correlationcollects information from security devices throughout the network to spot trendsAutomatic Policy Based ResponsesScaleable Across Geogr
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 四年级数学(四则混合运算带括号)计算题专项练习与答案
- 绿植租摆协议书(2篇)
- 南京工业大学浦江学院《移动通信技术产品及物联网应用》2022-2023学年第一学期期末试卷
- 南京工业大学浦江学院《社会企业》2022-2023学年第一学期期末试卷
- 分数的产生说课稿
- 蹲踞式跳远说课稿
- 南京工业大学浦江学院《计算机网络课程设计》2023-2024学年期末试卷
- 《线段的垂直平分线》说课稿
- 幼儿课件图画教学课件
- 南京工业大学《虚拟仪器设计》2023-2024学年第一学期期末试卷
- 砌筑工-技能评分记录表3
- 司索工安全操作规程
- 人教版数学五年级上册课本习题(题目)
- 钢筋合格证(共6页)
- BIM技术全过程工程管理及应用策划方案
- 弯扭构件制作工艺方案(共22页)
- 水利工程填塘固基、堤身加固施工方法
- 中医针灸的骨边穴怎样定位
- 人教版八年级上册英语单词表默写版(直接打印)
- 电脱水、电脱盐讲解
- 违约损失率(LGD)研究
评论
0/150
提交评论