19. Exercise: CERT participation in incident handling related to the Article 13a obligations
|
|
|
- Bethany Matthews
- 10 years ago
- Views:
Transcription
1 CERT Exercises Handbook Exercise: CERT participation in incident handling related to the Article 13a obligations Main Objective Targeted Audience Total Duration This exercise provides students with information about rules, procedures and best practice in handling incident related to obligation for internet service providers described in the Article 13a of the European Telecom Package. 95 Incident handlers and CERT managers responsible for incident handling procedures within an organisation 2 hours 40 min. Time Schedule Frequency Introduction to the exercise Task 1: Building technical environment for analysing network monitoring data Task 2: Analysing of network monitoring data Task 3: Preparing report according to the Article 13a template report Once for each new CERT member 10 min. 30 min. 90 min. 30 min GENERAL DESCRIPTION The purpose of this exercise is to prepare participants to be ready to analyse a set of data related to a DDoS attack. The proposed type of attack is similar to those that should be reported to the Regulatory Authority according to the rules and obligations for internet service providers (ISPs) described in Article 13a of the European Telecom Package. In this particular example, the attack is against an important online service provided by ISP and used by ISP customers for e-services. The service for customers is not available due to on-going DDoS attack. Additionally due to the DDoS attack, the network service is temporarily unavailable. During the exercise participants will learn: how to analyse network traffic data related to the attack; 95 Directive 2009/140/ec of the European Parliament and of the Council (dealing with electronic communications) -
2 224 CERT Exercises Handbook what kind of information can be obtained from network traffic data; how to prepare the report that should be used for reporting security incidents according to Article 13a EXERCISE COURSE The course of this exercise is as follows. All assumptions and discussions should be moderated by the trainer INTRODUCTION TO THE EXERCISE At the beginning of the exercise you should introduce participants to the attack that occurred in the network of the ISP. Participants play the role of representatives of the ISP CERT team, which is responsible, along with other duties, for analysing network monitoring data and preparing an incident security report for the national regulatory authority Reporting obligations There are three different levels of incident notifications and obligations related to them: 96 a service provider reporting to the national regulatory authority; a national regulatory authority reporting to other national regulatory authorities; a national regulatory authority reporting to ENISA.
3 CERT Exercises Handbook Figure1: Reporting schemes of Article 13a 96 These obligations are described in paragraph 3 of Article 13a 97 : Member States shall ensure that undertakings providing public communications networks or publicly available electronic communications services notify the competent national regulatory authority of a breach of security or loss of integrity that has had a significant impact on the operation of networks or services. In practice it means that the provider (mainly this will relate to ISPs) should continuously monitor the level of the security of their telecommunication resources. Detection and especially reaction and handling to observed incidents should be based on the best practices 96 Technical Guideline on Reporting Incidents Article 13a Implementation - CIIP/Incidents%20reporting/Technical%20Guidelines%20on%20Incident%20Reporting/incidents-reporting-to-enisa/technicalguideline-on-incident-reporting 97
4 226 CERT Exercises Handbook related to incident handling activities, 98 which means that incident handling capability should exists in all providers. A citation from Article 13a of the European Telecom Package: Where appropriate, the national regulatory authority concerned shall inform the national regulatory authorities in other Member States and the European Network and Information Security Agency (ENISA). The national regulatory authority concerned may inform the public or require the undertakings to do so, where it determines that disclosure of the breach is in the public interest. In particular cases, where the security incident could have a significant influence on the level of security in countries other than the country of the incident s origin, cooperation and effective communication between national regulatory authorities is very important. Thanks to this cooperation an appropriate warning and alerting in other countries is possible. It is worth adding that this internal country warning and alerting activities are very often based on CERT involvement in these processes. A citation from Article 13a of the European Telecom Package: Once a year, the national regulatory authority concerned shall submit a summary report to the Commission and ENISA on the notifications received and the action taken in accordance with this paragraph. The purpose of such reporting is to gather relevant information about Internet network breaches. The assumption is that it will help authorities to better understand new trends and mechanisms in Internet threats as well as being an important element in raising the public s level of awareness regarding Internet security. In this exercise a security incident related to the ISP network is discovered: the online service for customers is not available due to on-going DDoS attack. Additionally due to the DDos the network service is temporarily unavailable. There is no clear information on how long it could last, what requests might come from customers in case they have no access to their data or network Task 1 Building a technical environment for analysing network monitoring data Participants will have to build a technical environment for analysing network monitoring data. They will need to install Wireshark software 99 for extracting data from Pcap files (packet capture). Additionally as a recommended tool they would need the tcpdump application. Alternatively the technical environment can be prepared by trainer. The Wireshark application installation guide can be found in Wireshark User s Guide in Chapter 2: Building and Installing Wireshark ENISA Good Practice Guide for Incident Management:
5 CERT Exercises Handbook Figure 2: Using Wireshark The figure presents the Wireshark interface with pcap loaded into the application; information about packets can be seen in the picture Task 2: Analysing of network monitoring data Network monitoring data, provided to participants in this exercise, includes different types of network TCP/IP protocol data, like ICMP flows and UDP flows. Participants should make the following types of analysis. Subtask 1 determination of time and volume of the attack Firstly, participants should create a short summary including basic information of each pcap file they have. They should check: the start and end time of capture; the size of captured packets; the total number of packets as well as average packet/byte rates; This information should give a general overview of the size of data that are going to be analysed and allow the placement of PCAP files on the timeline (note that capture times of separate PCAPs can overlap).
6 228 CERT Exercises Handbook All of this information can be easily checked using the capinfos tool that comes with Wireshark: 101 $ capinfos /path/to/pcap/file.pcap Figure 3: Using capinfos Figure 3 shows the output of the capinfos application, allowing the user to obtain general information about the pcap file. Information consists of file size, number of captured packets, checksums, capture times and also a few average values. In the next step, participants should examine the captured traffic and try to determine what kind of DDoS attack was performed. Usually, during a DDoS attack, more than one DDoS technique is used; or there are separate and distinct attack sources. At this point, they should try to create a Wireshark filter 102 or a tcpdump Berkeley Packet Filter (BPF) filter, 103 which would allow filtering out each type of DDoS attack stream. In fact there were two kinds of attacks and this should be found out by participants (see below). ICMP flood UDP flood In the ICMP flood, all ICMP packets were type 3 (Destination Unreachable) with codes 3 (Destination Port Unreachable) and a few cases of code 1 (Destination host unreachable) and 13 (Communication administratively prohibited) More on Wireshark filters: More on tcpdump filters:
7 CERT Exercises Handbook Figure4: ICMP packet of type 3 (Destination Unreachable) with code 3 (Destination Port Unreachable) Figure 5: ICMP packet of type 3 (Destination Unreachable) with code 1 (Destination host unreachable)
8 230 CERT Exercises Handbook Figure 6: ICMP packet of type 3 (Destination Unreachable) with code 13 (Communication administratively filtered) The UDP flood consisted of many fragmented IP packets. For all of them, the protocol field was set to UDP and for most of them either the MF flag was set or the fragment offset was greater than zero. Help participants by explaining the filters presented below. If participants have problems with finding the solution, provide the proper Wireshark. Filters which could be used for this analysis are the Wireshark display filter, and the tcpdump filter. Wireshark display filter: (udp && not udp.port == 53) ip.flags.mf == 1 ip.frag_offset > 0 This is a sample Wireshark display filter allowing us to separate DDoS UDP flood. To do this we select all packets matching a) or b) or c) rule: a) (udp && not.udp == 53) - all udp packets with port other than 53 (we're not interested in DNS traffic which isn't part of DDoS attack) b) ip.flags.mf == 1 - packets having IP flag MF (More Frag.) set c) ip.frag_offset > 0 - packets with fragment offset greater than 0.
9 CERT Exercises Handbook Tcpdump filter: ip[6:2]&8191>0 or ip[6]&32!=0 or (udp and not port 53) 104 The second filter is the same filter, but written in BPF tcpdump filter syntax. This time we can't refer to separate fields of IP or UDP headers. To filter packets by IP header fields values we must refer to IP header as byte array with ip[0] being a first byte of IP header. Syntax is as follows: ip[a:n] - 'n' bytes starting from 'a' position/element/byte. & operator denotes bitwise AND operation. a) ip[6:2]&8191>0 - fragment offset greater than 0 b) ip[6]&32!=0 - flag MF is set c) udp and not port 53 - all udp packets with port other than 53 Packets to port 53 are excluded as packets sent to this port were proper DNS requests and weren't part of DDoS attack (at least in this case). Figure 7: Excluded packets to port 53 that are legitimate packets 104 ip[6:2]&8191>0 is for checking IP fragment offset field (2 bytes length starting from 6th byte of IP hdr, counting from 0) ip[6]&32!=0 is for checking whether MF (More fragments) flag was set
10 232 CERT Exercises Handbook Figure 8: UDP packet with More Fragments (MF) bit set Next, participants should recognise what distinct streams the DDoS attack consisted of (either different attack methods/techniques or clear source distinction). They can analyse input/output statistics for those streams in comparison with normal server traffic. To complete this task they should: 1. open the PCAP file in Wireshark; 2. choose Statistics IO Graph; 3. use the display filters created in the previous point to create separate graphs; 4. adjust other options if needed (X and Y axis scale, line style, etc.)
11 CERT Exercises Handbook Figure 9: statistics of the initial DDoS phase. Figure 9 presents the initial phase of the DDoS attack. Legitimate HTTP traffic is marked with a red line. We can see strong fluctuations over time of this type of traffic (which is quite normal). DDoS traffic (UDP flood) is marked with a pink line. In this case, fluctuations are much smaller and its throughput is almost constant (~10 Mbps). Also we can see that DDoS traffic doubles the average throughput of HTTP traffic. Figure 10: Slight increase of ICMP traffic (blue line) with the start of the second DDoS phase
12 234 CERT Exercises Handbook Figure 10 presents a slight increase of value for ICMP traffic around 14:18:00. This increase is a representation of the second phase of the DDoS attack. Figure 11: Second DDoS phase Around 14:17:58, the second DDoS phase started. We can see that with the start of the second DDoS phase, the total traffic significantly increased. Total traffic throughput increased from ~22.5 Mbps to ~200 Mbps, which means that traffic increased nearly nine times in comparison with the first phase, and forty times in comparison with legitimate HTTP traffic (~5Mbps). We should also note that traffic increase was almost entirely due to UDP flood (green line).
13 CERT Exercises Handbook Figure 12: Second DDoS phase in detail Figure 12 more clearly shows us increase of UDP flood (green line) traffic with the beginning of the second DDoS phase. The next subtask for participants is to determine the endpoints addresses of analysed hosts. There are various ways to export such addresses they can do this using either Wireshark or tcpdump. Method 1 with Wireshark: If participants use Wireshark application they should follow the following steps. 1. Open pcap with DDoS traffic in Wireshark (alternatively just apply the proper display filter to the file with all captured traffic). 2. Choose Statistics Endpoints and switch to IPv4 tab.
14 236 CERT Exercises Handbook Figure 13 Sources of the DDoS attack and packets statistics 3. If necessary make sure the Limit to display filter option is selected. 4. Click Copy and paste the data to some file. The data is in CSV format. 5. Save file as ddos.csv 6. Get the ip addresses only from.csv file using the following command: Method 2 with tcpdump cat ddos.csv cut -d ' ' -f 2 > ddos_ip.uniq If participants want to use tcpdump they should follow the following steps. 1. Use the tcpdump command: tcpdump -n -r data_ddos.pcap '<filter>' As the result they should receive: 14:13: IP x.x > x.x: ICMP host unreachable - admin prohibited filter, length 36 14:13: IP x.x > x.x: ICMP udp port 19 unreachable, length 40 14:13: IP x.x > x.x: ICMP host unreachable - admin prohibited filter, length 36
15 CERT Exercises Handbook :13: IP x.x > x.x: ICMP udp port 19 unreachable, length Use the tcpdump command: tcpdump -n -r ddos.pcap perl -ne 'if (m/ip (\d+\.\d+\.\d+\.\d+)/){print "$1\n";}' sort -u > ddos_ip.uniq This should produce the list of unique IP addresses (ddos_ip.uniq). Such list can be used for finding more information, e.g. autonomous systems. To get list of autonomous systems associated with these addresses, participants can use the free service available at The Shadowserver Foundation: All information gathered during the subtasks should be used to prepare the full report (see Task 3) Task 3: Preparing report according to the Article 13a template report After collecting all information from network monitoring data, participants should prepare a security incident report for the national regulatory authority (NRA). To better prepare this report, they should first learn more about the reporting schema template. You should present them the template and explain its fields using the following guide from the ENISA document Technical Guide on Reporting Incidents. 105 Each participant should use one of the ISP providers that they are most familiar with. The name of the ISP can be fictitious. Keeping in mind and referring to the real examples from their countries gives participants an additional chance to exchange information about practical aspects of cooperation between CERTs and ISPs in different countries. There is no need to use real names for this purpose. Field Description Tip for fulfilling Country Date and time The country that sends the report to NRA Details of the date and time when the incident took place (in national time). It can be interpreted as the time the incident was discovered. Time should be expressed in both According to analysed logs 105 ( CIIP/Incidents%20reporting/Technical%20Guidelines%20on%20Incident%20Reporting/incidents-reporting-to-enisa/technicalguideline-on-incident-reporting) (page 20).
16 238 CERT Exercises Handbook CET and local time. Impacted services Number of users affected The affected service: the service rendered unavailable to the enduser. This field includes a description of the service whose continuity and availability are affected by the impact level. It should be noted that assessing the Level of Service (LoS) Quality of Service (QoS) introduces complexity into the analysis criteria and can become subjective. The possible choice is: fixed telephony, mobile telephony, (short) message services, Internet, . The total number of users affected when an incident occurs (percentage of all affected users of that service in a given country). The national report to the NRA may include the absolute number the NRA would have to translate into percentages for inclusion in the annual report to ENISA and the European Commission. According to participants knowledge of online service functionality and services According to participants knowledge of online service functionality and services Duration The duration of the incidents According to analysed logs Geographic spread/region Impact on Emergency calls If available, the region impacted by the incident If available emergency service impacted by the incident According to the participants choice of ISP geographical location. Add information about geographical location of attacking parties. For the purpose of the exercise, the real data of CERTs represented by
17 CERT Exercises Handbook participants Description Root cause Other incident information Fill in any further information you can share on the impact of the incident. What kind of disaster or reason caused the security problem. The potential choices are: natural disaster or phenomena, human error, malicious attack, hardware or software failure, failure at third party or external party. A general description of the incident. Also the description of all the incident handling actions and activities undertaken by a handler and post-incident actions. In this part of the report, there is information about other possible parties affected by an incident. Other descriptive information about an incident includes lessons learnt from an incident and further remarks. There is one more particular piece of information requested NRA s contacted (in case of a cross border incident). This one is especially dedicated for the NRA. From the perspective of the ISP and its CERT it is included in information about cooperation and contact with other parties. According to the findings from logs analysis According to participants knowledge of the source of incident. The description and findings can be changed during the analysis.
18 240 CERT Exercises Handbook Some of the information is not very important in preparing the report in terms of the exercise purposes, but it is important to give participants the whole picture and mention and discuss all information EXERCISE SUMMARY In the summary ask participants to present their findings about the incident by presenting the requested fields of the security incident report. Be sure that all participants present their work results. In particular, discuss findings if they differ among participants. Find a proper solution. At the end of the summary, present again the main rules for incident reporting schema between ISPs, NRAs and ENISA and explain the purposes of these regulations, as well as benefits for CERTs. These benefits may include: closer cooperation between CERTs on the operational level; common schema for collecting information about incidents; closer cooperation inside each Member States between parties involved in improving security level; systematic collection of security incident related data and its usage for building awareness about security threats in the Internet; 106 More descriptions of the report fields are available in the ENISA document Technical Guideline on Reporting Incidents Article 13a Implementation (page 21).
10. Exercise: Automation in Incident Handling
107 10. Exercise: Automation in Incident Handling Main Objective Targeted Audience Total Duration Time Schedule Frequency The purpose of this exercise is to develop students abilities to create custom
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Monitor Network Activity
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Administrator Guide. CA Multi-Port Monitor. Version 10.2
Administrator Guide CA Multi-Port Monitor Version 10.2 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ),
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup
Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
COMP416 Lab (1) Wireshark I. 23 September 2013
COMP416 Lab (1) Wireshark I 23 September 2013 2 Before the lab Review the content of communication architecture. Review TCP/IP model and protocol suite. Understand data transferring, layering, and encapsulation/demultiplexing.
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Network Forensics Network Traffic Analysis
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
BIG-IP Systems: DoS Protection and Protocol Firewall Implementations. Version 12.0
BIG-IP Systems: DoS Protection and Protocol Firewall Implementations Version 12.0 Table of Contents Table of Contents Legal Notices...7 Legal notices...7 Detecting and Protecting Against DoS, DDoS, and
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
How To Prevent DoS and DDoS Attacks using Cyberoam
How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam Applicable Version: 10.00 onwards Overview Denial of Service (DoS) A Denial of Service (DoS) attack
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
The Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Aculab digital network access cards
Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Ed. 00 GWIM. Firewall Handbook
Ed. 00 GWIM Firewall Handbook COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
