IMPLEMENTING HONEYPOT LAN DETECTION: PORT DETECTION AND NETWORK MONITORING AMRAN BIN SALLEH
|
|
|
- Douglas Oliver
- 10 years ago
- Views:
Transcription
1 IMPLEMENTING HONEYPOT LAN DETECTION: PORT DETECTION AND NETWORK MONITORING AMRAN BIN SALLEH A thesis submitted in fulfillment of the requirement for the award of the degree of Bachelor of Computer Science (Computer Systems and Network) Faculty of Computer Systems &'Software Engineering University College of Engineering & Technology Malaysia OCTOBER 2005
2 ON ABSTRACT Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap. The attacker then tried to attempt the server or important network parts through ports on the network. Regarding that situation, it will be cause some of the host on the network unusable. To overcome this problem, one system has been developed for network administrator and it be used in the area of computer and Internet security. It is a resource, which is it intended to be attacked and compromised to gain more information about the attacker and his attack techniques. By using this technique the administrator can gather more information about the attacker. The administrator will get the pop up message based on each suspicious traffic on the network. Honeypot used to save information from attacker such as JP address, Mac Address, time attack, local port and remote port that honeypot deal with. When honeypot was attacked, the administrator uses the information to learn about vulnerabilities of the current network and improve it for the future. The expected from this honeypot, it will help the administrator to detect and know what port that is use by the attacker in the network. Microsoft Visual Basic 6.0 and Microsoft Access 2003 will be used to develop interface and database of honeypot. The investigation on this system can be used in future and can be extensive.
3 V1 ABSTRAK Pada masa sekarang kebanyakan penceroboh lebih minat menyerang sistem operasi rangkaian yang kurang mempunyai keselamatan dengan menggunakan "Nmap" dan sebagainya. Kebanyakan mereka akan mendapatkan "server" atau mana-mana bahagian penting rangkaian rnelalui "port" yang digunakan dalam rangkaian. Ekoran dari situasi mi ia akan menyebabkan sesetengah "host" dalam rangkaian tidak berfungsi. Olçh hal yang demikian, satu sistem akan dibangunkan untuk mengatasi masalah tersebut. Sistem tersebut dinamakan sebagai "Honeypol" yang digunakan untuk keselamatan di dalam komputer rangkaian. la merupakan satu sumber untuk menarik penceroboh dan berkompromi dengan mereka. mi adalah untuk membolehkan pentadbir rangkaian mengetahui semua makiumat tentang penceroboh. Pentadbir rangkaian akan mendapat satu mesej apabila berlakunya sebarang keraguan di dalam rangkaian. "Honeypot" mi juga akan menyimpan data dan penceroboh seperti "IP Address ' "MAC Address ' "Time Attacked", "Local Port" dan "Remote Port". Sekiranya penceroboh memasuki "Honeypot", pentadbir rangkaian akan mengetahui kelemahan rangkaiannya dan mencari penyelesian untuk meningkatkan kawalan pada masa hadapan. Dengan adanya "Honeypot" ini, ia akan dapat membantu pentadbir rangkaian dalam mengesan penceroboh dan mengetahui "port" yang digunakan. Untuk mambangunkan "Honeypot ", Microsoft Visual Basic 6.0 akan digunakan dalam membina antaramuka dan pengaturcaraan. Bagi menyimpan makiumat-makiumat penceroboh yang diperolehi, Microsoft Access 2003 akan digunakan sebagai pangkalan data. Dengan penghasilan "Honeypot" mi ia dapat digunakan path masa hadapan dan secara meluas.
4 vii TABLE OF CONTENTS CHAPTER TITLE PAGE Declaration of the Status Thesis Supervisor's Declaration Title Page Declaration of Originality and Exclusiveness Dedication Acknowledgements Abstract Abstrak Table of Contents List of Tables List of Figures List of Appendices ii iii iv v vi vii x Xi xiii 1 INTRODUCTION 1.1 Problem Statement Objectives of the System Scopes of the System 3 2 LITERATURE REVIEW 2.1 Attack Hacking Methodology Footprinting Scanning Enumeration Gaining Access Escalating Privilege 7
5 viii Pilfering Covering Tracks Creating Back Door Denials of service Types of Attack Effects of Attack Honeypot Types of Honeypot Research Honeypot Production Honeypot Concepts of Level of Involvement Low-involvement Mid-involvement High-involvement Comparison Between Level of 16 Involvement How Basic Honeypot Works Services FTP Data Type of FTP FtProcess Cerberus FTP Server SMTP SMTP Process Post cast Server Vulnerabilities of FTP Service Vulnerabilities of SMTP Service Programming Language Visual Basic 24 3 METHODOLOGY 3.1 System Workflow Selected Project Method Initiation and Planning Phase 27
6 ix 3.4 Analysis Phase Design Phase Data Dictionary Honeypot System Implementation and Testing Phase Maintenance Phase Selected Hardware for the System Selected Software for the System 32 RESULT AND DISCUSSION 4.1 Result and Discussion Advantages and Disadvantages of the system Advantages of the System Disadvantages of the System Assumptions Further Research 40 5 CONCLUSION 42 REFERENCES 43 APPENDIX A-J 44-53
7 x LIST OF TABLES TABLE NO TITLE PAGE 2.1 Footprinting Step Scanning Step Enumeration Step Gaining Access Step Escalating Privilege Step Pilfering Step Covering Tracks Step Creating Back Doors Step Denial of Services Step Comparison between each level involvement Overview of differences between high and low level involvements i 3.1 Attacker Table Administrator Table CD-ROM Content APPENDIX E
8 x LIST OF FIGURES FIGURE NO TITLE PAGE 1.1 Attacker tries to attack the network by using scanning tool Using the honeypot to detect the attackers Hacking Methodology Steps Classification of honeypots Application Lab Assistant for FSKKP laboratory system workflow The System Development Life Cycle Splash screen on the honeypot system Welcome screen Login Form Main Menu Form Message Pop UP Get Tcp Function VB Tcp Function Data located in the memory FTP application mail SMTP application mail 38
9 xii LIST OF ABBREVIATIONS PC FTP SMTP IP IDS MAC MX DNS NTC TJDP TCP SDLC LAN GUI RAID DAO RDO ADO VB KMC DNS CPU - Personal Computer - File Transfer Protocol - Simple Mail Transfer Protocol - Internet Protocol - Intrusion Detection System - Media Access Control - Mail Exchange - Domain Name Service - Network Interface Card - User Datagram Protocol - Transmission Control Protocol - System Development Life Cycle - Local Area Network - Graphical User Interface - Rapid Application Development - Data Access Object - Remote Data Object - ActiveX Data Object - Visual Basic - Knowledge Management System - Domain Name System - Central Processing Unit
10 xli' LIST OF APPENDICES APPENDIX TITLE PAGE A Gantt Chart 44 B FC File Transfer Protocol 45 C Planning a Computer Attack 46 D SMTP - simple mail transfer protocol 47 E CD-ROM 48 F DAILY REPORT 49 G WEEKLY REPORT 50 H MONTHLY REPORT 51 I SELECTED PORT REPORT 52 J PENETRATE TESTING 53
11 CHAPTER 1 INTRODUCTION A honeypot is a security resource whose value lies in been probed, attacked, or compromised. That means, whatever administrator designate as a honeypot, it is our expectation and goal to have the system probed, attacked, and potentially exploited. Honeypots do not help directly in increasing a computer network's security. On the contrary, they do attract attacker and can therefore attract some interest from the blackhat such as hackers, attacker community on the network, where the honeypot is located. 1.1 Problem Statement As network and host-based security becomes more of an interest and concern for organizations, researchers and business people alike are looking for effective network security solutions. Therefore, the attacker try attack an unsecured network operating system. The attacker would have probably scanned a subnet with a tool such as Nmap to looking for open services and detect what operating systems individual machines were running on the scanned subnet. The attacker then tried to attempt the server or important network parts by using the port which is open and manipulate the whole of the network. This activity will cause that some of the host on the network unusable.
12 2 Currently the attackers almost exist in every network organization. They always try to hack server or other part of the network in order to get some confidential information about the organization or to break down the network. They will use scanning tool such as Nmap in order to discover vulnerabilities that able to help them to break into the server or other network part. Figure 1.1 shows how attackers use scanning tool to break into network. Figure 1.1: Attacker tries to attack the network by using scanning tool As a network administrator, they need to know when and how the internal or external attacker attempt to break into the server and how to stop them. Therefore, to know that, honeypot will act as bait and log all the activities when they attempt to any Internet Protocol (IP), which bind with honeypot. After honeypot saved all the information about the attacker into database, it sends pop up message to the administrator to inform them. Figures 1.2 below shows how honeypot detect attacker. vr ri "I Figure 1.2: Using the honeypot to detect the attackers
13 3 1.2 Objectives of the System The objective of this project covers for three (3) out on Research 1-loneypot. The objectives of the system are listed below: (i) (ii) (iii) To simulate honeypot application. To provide record of attacker activity when they break into honeypot computer. To simulate FTP and SMTP application. 1.3 Scopes of the System The scope of this project, it just focuses on Research Honeypot and the all capabilities of honeypots. This honeypot is base on High involvemet. Beside that, this project, it covers three (3) functions are describes below: (i) (ii) (iii) Implement a specific service Implement real specific service which are FTP and SMTP and make the attacker break into the target host on the network. Detection Detect the attacker when they break into the target host by implement specific service. Notifiation Notification is use to send pop up message to administrator. Many honeypots simulate or implement service on well-known port that would be an interest to attacker. This project will touch on two (2) ports such as SMTP (25) and FTP (21). This honeypot is implemented in FSKKP Computer Laboratory by using Switch 5 port or wireless network.
14 CHAPTER 2 LITERATURE REVIEW This chapter provides a general overview of hacking methodology. It also describes how honeypot detect an atacker and how many level honeypot that already exist on network security area. Honeypot are very helpful for administrator who want to know their network vulnerabilities. 21 Attacks The explosive growth of the internet has brought many good things such as electronic commerce, collaborative computing, and and so on. With the growth of the internet, computer security has become a major concern for businesses and governments. They want to be able to take advantage of the internet for electronic commerce, advertising, information distribution, and access, and other pursuits, but they are worried about the possibility of being attack. Therefore, the definition of the attacker and computer network attacks as below: (i) Attacker A person who enjoys learning the details of computer systems and how to stretch their capabilities as opposed to most users of computers, who prefer to learn only the minimum amount necessary. Refer Appendix C for more information.
15 5 (ii) Computer Network Attack A computer network attack is any operation intended to disrupt, deny, degrade, or destroy information held in computers or computer networks. Refer Appendix C for more information. 2.2 Hacking Methodology Figure 2.1 show about methodology that attacker always use in order to hack host on the network. Refer Appendix J for more information. footpnnting Scanning Enumeration G.iinincj Access Escalating Privilege Pilferting Covering Tracks Creiting Bick Doois Rhts usrdth Jiesre i.apwotk'its iomote ditop S7i'4 f31riq o de at tfrj_s &_Crl CIT it Figure 2.1: Hacking Methodology Steps
16 2.2.1 Footprinting Footprinting is information gathering. It will find out target Internet Protocol (IP) address or phone number range. Network Topology visual Route. It is essential to a surgical attack. The key here is not to miss any details. Table 2.1 show the technique and tool will be use in footprinting methodology. Refer Appendix J for more information. Table 2.1: Footpnnting Step Techniques Open Source Search Find domain name, admin, 1P addresses name servers DNS zone transfer Tools Google, search engine, Edgar Whois (Network solution; ann) Whois (Network solution; ann) Scanning Scanning is a bulk target assessment. Which machine is up and what ports services are open. It focuses on most promising avenues of entry. To avoid being detect, these tools can reduce frequency of packet sending and randomize the ports or IP addresses to be scan in the sequence. Table 2.2 shows the technique and tool will be use in scanning methodology. Refer Appendix J for more information. Table 2.2: Scanning Step Techniques Tools jg sweep Fping, icmpenum,ws Ping ProPack,Nmap fjjdp port scan Nmap,Superscan,Fscan Ldetection OS Nmap,queso,Siphon
17 Enumeration Identify valid user accounts or poorly protected resource shares. Most of the intruders like probing than scanning step. Table 2.3 shows the technique and tool will be use in enumeration methodology. Refer Appendix J for more information. L Techniques list user accounts Llist file shares identify applications Table 2.3: Enumeration Step Tools Null sessions,dumpacl,sid2usre,onsiteadmjn Showmount,NAT,Legion Banner grabing with telnet or netcat, rpcinfo Gaining Access Based on the information gathered so far, make an informed attempted to access the target. Table 2.4 shows the technique and tool will be use in gaining access methodology. Refer Appendix 3 for more information. Techniques Password eavesdropping File share,brute forcing Password,File grab Buffer,overflow Table 2.4: Gaining Access Step Tools Tcpdump/ssldump,LOphtcrack,readsmb NAT,legion Tftp,Pwddump2(NT) Ttdb, bind,hs.htr/ism.dll Escalating Privilege If only user level access has obtained in the last step, seek to gain complete control of the system. Table 2.5 shows the technique and tool will be use in escalating privilege methodology. Refer Appendix 3 for more information.
18 8 7Techniques [?sword cracking Known Exploits Table 2.5: Escalating Privilege Step Tools John the ripper,lophtcrack Lc_messages,Getadmin,sechole Pilfering Based on the information gathered so far, this step will gather info on identify mechanisms to allow access of trusted systems. Table 2.6 shows the technique and tool will be use in pilfering methodology. Refer Appendix J for more information. Table 2.6: Pilfering Step Techniques Tools Evaluate Trusts RhostsLSA secrets Search for clear text passwords User data, Configuration filesregistry Covering Tracks Once total ownership of the target has secured, hiding this fact from system administrators become paramount, less they quickly end the romp. Table 2.7 shows the technique and tool will be use in covering track methodology. Refer Appendix J for more information. Table 2.7: Covering Tracks Step Techniques Tools Clear Logs Zap, Event Log GUI Hide tools Rootkits file streaming
19 2.2.8 Creating Back Door Trap doors will lie in various parts of the system to ensure that privilege access is easily regained whenever the attacker decides. Table 2.8 shows the technique and tool will be use in creating back door methodology. Refer Appendix J for more information. Table 2.8: Creating Back Doors Step Techniques Tools Create rogue user accounts Members of wheel, admin Schedule batch jobs Cron, AT Infect startup files rc, startup folder, registry keys Plant remote control services Netcat, remote.exe\tnc, B02K remote desktop Install monitoring mechanisms Keystroke loggers, add acct. to secadmin mail aliases Replace appis with Trojans Login, f'pnwcint.dll Denials of service If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last result. Table 2.9 shows the technique and tool will be use in denials of service methodology. Refer Appendix J for more information. Table 2.9: Denial of Services Step Techniques Tools - n flood synk4 ICNT techniques Ping to death smurf Identical src/dst SYN requests Land Latierra Overlapping fragment/offset Netcat, remote.exe,vnc, B02K bugs remote desktop Out of bounds TCP options Keystroke loggers, add acct. to secadmin mail aliases PDoS Trinoo,TFN,stacheldraht
20 Types of Attack (i) Unauthorized access This simply means that people who should not use someone computer services are able to connect and use them. For example, people outside UTEC might try to connect to student host or to UTEC server. There are various ways to avoid this attack by carefully specifying who can gain access through these services. (i) Exploitation of known weaknesses in programs Some programs and network services are not originally designed with strong security in mind and are inherently vulnerable to attack. The best way to protect from this attack is to disable any vulnerable services or find alternatives. [2] (ii) Denial of service Denial of service attacks cause the service or program to stop functioning or prevent others from making use of the service or program. These may be performing at the network layer by sending malicious datagram that cause network connections to fail. They may also be performed at the application layer by using commands are given to a program that cause it to become extremely busy or stop functioning [2]. Preventing suspicious network traffic from reaching hosts in UTEC network area and preventing suspicious program commands and requests are the best ways of minimizing the risk of a denial of service attack. (iii) Spoofing This type of attack causes a host or application to mimic the actions of another. Typically, the attacker pretends to be an innocent host by following IP addresses in network packets. To protect against this type of attack, verify the authenticity of datagram and commands. Prevent datagram routing with invalid source addresses. [2]
21 11 (iv) Eavesdropping This is the simplest type of attack. A host configured to listen to and capture data not belonging to it. Carefully written eavesdropping programs can take usernames and passwords from user login network connections. Broadcast networks like Ethernet are especially vulnerable to this type of attack. To protect against this type of threat, avoid use of broadcast network technologies and enforce the use of data encryption. [2] (v) Port scans Port scans are very noisy as they provoke a lot of network traffic. A properly configured Intrusion Detection System (IDS) or even firewall will trigger an alarm immediately when a port scan is started. This can be avoided if the port scan is done during a long period, therefore is spread over multiple days. Most IDS will not recognize this as a port scan and will not trigger an alarm. [2] (vi) Finger Finger is a daemon running on the target system, which does provide additional information about local users. This information can reveal some real identities or user settings like the used shell, last login as well as if there are some unread mails. Finger does not run on most systems, as it is a security threat, which reveals login names and other useful information for attacking a host. [2] (vii) Active Fingerprinting It can be useful to know what kind of operating system the attacker is using. For this purpose of a machine can be finger printed. By sending different packets with different flags and checking if a flag gets checked, deleted or skipped the running operating system can be guessed. Unfortunately, some packets are sent to the attacking host to get the according responses. The attacker could watch for these incoming packets and be warned. As with finger, port scans and active fingerprinting, the danger of being detected can
22 12 be quite high and the results of these active information-gathering attempts are not that important or informative to justify the risk of being detected. [2] 2.4 Effects of Attack There are four ways an attacker can cause harm an organization by attaining unauthorized access to their computer system. [3] (i) Breach of confidentiality. When an attacker breaks into a system, he can freely go through all the files. This in turn makes the organization lose control over its own information. Confidential records can be read or stolen or illegal copies of software can be made. (ii) Damage to information integrity. When there is damage to the integrity of information, the organization may lose credibility in the marketplace. (iii) Breach of authenticity. Authenticity can be breached if attackers pick up the identity of users on the system they penetrate. Once a hacker has a new identity he can use it to do just about anything and not be held accountable. (iv) Cut off availability. After gaining access to a computer network, an attacker can shut down any service that the organization may provide. For example, a hacker could shut down a Web site or a power grid. 2.5 Honeypot Attacks on information systems and networks are becoming increasingly frequent and sophisticated. Moreover, traditional security measures are often unable to deal with the modern malicious acts. For this reason, a more advanced tool is
23 13 needed to fight the evil. The solution, research honeypot is used as a primarily tool for detecting attacks. A honeypot is a program, machine, or system that located on a network as bait for attackers [6]. The idea is to deceive the attacker by making the honeypot seem like a legitimate system. Honeypots was running services and open ports, services, which one might find on a typical machine on a network. These running services are meant to attract the attention of attackers so that they spend valuable time and resources try to exploit the machine while the attacker is being monitored and recorded by the honeypot. There are two (2) main types of honeypots where is: (i) (ii) Research Honeypots Production Honeypots Research Honeypot One (1) of the biggest issues facing today is that network organizations do not know who these attackers are. The techniques, tools, and methods employed by these attackers. The main purpose of the research honeypot is to collect information about attacker as much as possible. After collect information network administrator, will analysis that to determine what their network vulnerabilities. Honeynet is one (1) of the research honeypot. From this it give organizations the capabilities to learn more on their own Production Honeypot The concept of production honeypots is to emulate specific service to make attackers spend time on the system. Production honeypot used for protect the real host in network from attacker. By using the production honeypot it will be generate
24 14 a few alerts and send to administrator when attacker tries to compromise with it. 2.6 Concepts of Level of Involvement One (1) characteristic of a honeypot is its level of involvement. The level of involvement does measure the degree an attacker can interact with the operating system. Figure 2.2 shows all level involvement of honeypot. Three (3) groups of involvement are listed below: (i) (ii) (iii) Low-involvement Mid-involvement High-involvement Low risk liigh Risk rf ProdUction Environment Production Aucordkg to Usage HoNEI) Reseamh Research Environment tow Emulation Nigh Risk g is loud F I Risk Low I High lnume.t Emulation Mid Inv 1"n*nt Production Work Research Work I I I Conshdersbde Risk Production Work Figure 2.2: Classification of honeypots Low-involvement They are listening on a certain port for incoming connections. All packets logged by low involvement honeypot. No answer sent to the request. Low
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
It iiumiuimmnuu. Pusat Khidrpp; Maklumat Akadendk UNIVERSITI MALAYSIA SARAWAK 04300 Kote ßarnprjn HOST-BASED INTRUSION DETECTION SYSTEM (HIDS)
P. KH IDMAT MAKLUMAT AKADEMIK UNIMAS Pusat Khidrpp; Maklumat Akadendk UNIVERSITI MALAYSIA SARAWAK 04300 Kote ßarnprjn It iiumiuimmnuu 1000132516 HOST-BASED INTRUSION DETECTION SYSTEM (HIDS) ZAID AFFENDI
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING A thesis submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Sciences (Software Engineering) FACULTY OF COMPUTER
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA A thesis submitted in fulfillment of the requirement for the awards of Bachelor of Computer Science (Computer Systems & Networking) with Honours Faculty of
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
School of Information Science (IS 2935 Introduction to Computer Security, 2003)
Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
Assessing Network Security
Microsoft Assessing Network Security Kevin Lam David LeBlanc Ben Smith Acknowledgments Foreword Introduction xxi xxiii xxvii Parti 1 Introduction to Performing Security Assessments 3 Role of Security Assessments
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Hands-on Hacking Unlimited
About Zone-H Attacks techniques (%) File Inclusion Shares misconfiguration SQL Injection DNS attack through social engineering Web Server external module intrusion Attack against the administrator/user
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad
Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. [email protected] Intranet Security Components Network Admission Control (NAC)
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
For more information email [email protected] or call 703.749.7723
Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they
DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954
DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET By NUR ATIQAH BT. HASAN 2003470954 In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons.) IN DATA COMMUNICATION AND NETWORKING
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Securing the system using honeypot in cloud computing environment
Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Car Rental Management System (CRMS) Lee Chen Yong
Car Rental Management System (CRMS) Lee Chen Yong This report is submitted in partial fulfillment of the requirement for the Bachelor of Computer Science (Database Management) FACULTY OF INFORMATION AND
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
