Intrusion Detection: Challenges and Current Solutions
|
|
|
- John Doyle
- 10 years ago
- Views:
Transcription
1 Intrusion Detection: Challenges and Current Solutions Ibraheem Alhashim Department of Computer Science Portland State University Portland, Oregon Introduction Abstract: The problem of intrusion has been a long standing computer security challenge. With governments and institutes relying more on computer networks it is becoming essential to arm networks with defenses against intrusion and misuse. Such intrusions include installing harmful viruses, spreading worms, initiating distributed attacks, and misuse by authorized users. To defend against these attacks, systems can utilize anomaly detection and pattern matching against known attacks to detect intrusions. These intrusion detection systems have rapidly evolved since their introduction in the 1980s. This paper discusses some of the challenges and threats that face intrusion detection systems followed by a survey of several systems currently available. In all the major public and private sectors, people rely on computers and networking to accomplish the simplest and most complex tasks of their lives. Computers record and handle important information from online game accounts to bank accounts, from tracking personal packages to even tracking military fighters. Such important resources are faced with constant attacks from different types of individuals with the intention of damaging or stealing such valuable informations. These attacks raised serious concerns in the domain of security and data protection. Experts in the field of computer security have worked on developing security models that protect systems from attacks by shielding. Shielding requires users to identify and authenticate themselves. However, these models are limited by a number of constrains that do not allow for a flexible system. Such limitations include the improbability of building a perfectly secure system, the slow evolution of shielding systems, and constrains on the user's environment and abilities. Perhaps a more significant limitation is the fact that a shielded system is still vulnerable to insider attacks [1]. During the mid 1980s, security experts proposed an alternative approach to security that involved auditing user activities and reporting anomalous behavior [2]. Research on this approach resulted in what is now called an intrusion detection system (IDS). Intrusion detection deals with the problem of identifying unauthorized access or abusive usage by authorized users. Examples of such intrusions include unauthorized alteration of files 1
2 and unauthorized use of the system resources such as user account creation or deletion [1]. For nearly thirty years of research and development, the field of intrusion detection is still maturing [2]. The threats and attacks on computer networks today increase at a rate that makes it hard on IDS developers to create sold intrusion detection solutions. Despite these challenges, today's systems are composed of a highly sophisticated set of hardware and software solutions that help secure valuable information. Attacks and threats Malwares are softwares that are designed to infiltrate or damage a computer system without the owner's informed consent [3]. A software is considered to be a malware based on the intentions of its developer. Generally, the effects of malware range from simple nuisance adwares to hard drive wiping viruses. Other malwares are used to regain access to unauthorized data by executing their payloads, such malwares are called Trojan horses. One of the dominant types of malware are computer viruses. Computer viruses act in a similar manner as biological viruses. They infiltrate the system, destroy data, replicate and spread. The life cycle of viruses start with the execution of an infected code. The code then starts to spread to other applications on the system by copying it self and hiding in other executable files. Each time an infected application is executed the virus code executes as well. Subramanya categorized viruses into seven types in his paper on computer viruses [4]. Such categories include file infecters, boot record infecters, encrypted viruses, and polymorphic viruses. An example of such viruses is the Nimda virus that was active in the year This virus has a mailing worm code that work on spreading the virus through an attachment named Readme.exe. The virus work on infecting executable files in the windows environment. The virus also search for vulnerable web servers and work on infecting them [4]. Such viruses require system calls that fit the profile of a malicious anomaly. Therefore, such attack patterns should be included in the detection rules of an intrusion detection systems. With the advancements in the field of anti-virus development, a new breed of malware, called computer worms, gained popularity with the help of large scale networks. A computer worm is a program that self-propagates across a network exploiting security or policy flaws in widely used services [5]. The difference between computer viruses and computer worms is that viruses need to be executed by the user for propagation where as worms doesn't dependent on existing executables for survival. Worms are also different from viruses in the targets they attack. Often, a worm's main goal is to spread throughout a network without necessarily destroying data or infecting other files on the same system. Weaver et al., in their paper A taxonomy of computer worms, categorized worms based on five criteria [5]. First is target discovery which represent the technique in which the worm 2
3 finds new systems to infiltrate. The second criteria is the carrier which represent how a worm travels to its new target. Perhaps the most important of all is the creator's intentions. The way that a worm gets activated is the fourth criteria. Another important criteria is the worm's payload. The payload of a computer worm is a separate code from the propagation code. Different payloads have been implemented for different attack intentions. The most common payload in worms is a nonfunctional payload in which the worm's sole purpose is to spread. An Internet remote control payload allows attackers the ability to execute commands on victim machines without their consent and it does so by exploiting back doors on that system. An example of such payload is the Code Red II worm that was active in 2001 [5]. A spam-relay payload helps spammers avoid IP filtering mechanisms especially since worms spread to different machines all over the world. HTML proxies payloads aid attackers in phishing for sensitive users data which can be done by redirecting web requests to some random proxy machines. Denial of Service (DOS) attacks can also be included with worm's payloads. Other payloads include data collection, data damage, physical-world control or damage, and worm maintenance that works on updating the worm's code from a covert server. Similar to computer viruses, these attack follow a pattern of system calls, disk operations, and network activities that can be modeled and monitored by IDS applications. Other harmful intrusions on computer networks are Distributed denial-of-service (DDoS) attacks. Denial-of-service attacks are explicit attempts to prevent the legitimate use of a service [6]. The distributed version of the attack employs multiple sources to achieve the DoS goal. The result of such attacks often cause the victim to receive destructive traffic that would inflict damage on the system. The attacks often starts when the attacker sends a stream of data packets to the victim that would then consume an important resource. When that resource is consumed, the system can no longer serve legitimate clients requesting its services. Another approach for DDoS attacks is made by sending special kinds of packets that would cause an application or a protocol to freeze or shutdown. DDoS attacks are usually carried out in several stages. Attackers start by searching the network, often the Internet, for vulnerable systems and work on recruiting them for an attack. These systems, commonly called bots, get broken into and then infected by the attacker's code. This code can also help in searching and recruiting more systems. Another way for recruiting that attackers use, is by disguising their code in what seems to be useful software. This software can be distributed by attachments as a fake update or what would seems to be a fun or entertaining application. These types of softwares could contain other malicious code, similar to what viruses or worms would normally do, and are called Trojans. Once a system gets infected it would start sending the harmful packets, as a part of a large botnet, throughout the internet. 3
4 The reason why DDoS attacks are possible and effective is that the current Internet infrastructure allows for an effective mechanism to transfer packets from source to destination. This leaves the responsibility of security and protection on the destination system rather than inspecting the current packet that is being forwarded by the intermediate network. Thus, if a system is compromised it would efficiently work on affecting other connected systems in its network. Another reason for why DDoS are successful is the fact that most Internet hosts and services are at risk of being overwhelmed with too many user requests. It is very difficult and highly impractical to limit the number of requests a server should expect at any point. For intrusion detection systems to be able to detect these attacks it would require a highly sophisticated approach to isolate the malicious packets from the legitimate traffic. Another serious intrusion threat is the misuse of authorized users. These attacks are challenging for intrusion detectors since authorized users, especially maintenance and administrative personnels, retain rights to modify and delete important data on a system. An IDS is forced to follow the security policies and anomaly models for what to report and what to allow. Thus, in the event of a misuse by a network administrator, or a hijacked account, the IDS would report a modification misuse with a lower priority since that user has been granted the leverage to perform such modifications [9]. To overcome this problem IDS designers need to incorporate the primary principles of multi-level security systems and separation of duties in their intrusion detection solutions. Threats are still possible in some cases in which attackers can escape detection [9]. This can be achieved when the attacking code follows a slower routine of modifications than a known malicious behavior. Also, the attacker's code might take advantage of low level features of the system that the IDS do not usually log which is executed by infiltrated accounts with a low security level. Intrusion Detection Systems (IDS) An intrusion detection system is a set of security tools deployed throughout a network that work on detecting intrusions [7]. The two common types of IDS are the Network Intrusion Detection Systems and the Host Intrusion Detection Systems. Network Intrusion Detection Systems (NIDS) are commonly installed as a dedicated part of the network. Multiple NIDS are often used to detect and report malicious behaviors or files that conform with a known model of attacks. Such incident reports would then be logged and sent to a security administrator. There are several advantages when using network based detection systems. A single NIDS subnet could cover a large range of systems. NIDS allow network administrators to easily install and update the IDS software that would in turn affect a large segment of the network. Network based setups would also be immune to DoS attacks that commonly target host machines. Another significant advantage is that NIDS are usually platform 4
5 independent and hence securing multiple systems and running on different operating environments all on the same network. There are, however, some disadvantages to NIDS [7]. These network based intrusion detection systems are known to produce false positives due to the complexity of distinguishing between a legitimate traffic and a malicious one. Another obstacle for NIDS is their inability to analyze encrypted traffic or handle certain high speed networks [8]. IDS relay on known threat models to detect intrusion which limit its ability to detect new variations of similar threats. Similar to any network based service a NIDS is subject to a latency effect that would render the system useless if an attack inflect a damage before the IDS sends an alert to the security administrator. The second type of IDS is the Host Intrusion Detection System (HIDS). HIDS are designed to monitor, detect, and respond to user and system activity and attacks on a host [8]. Unlike the network based IDS that deal with network packets, this setup allows for a better deal of detection on a single system. HIDS work by supervising modifications to important variables on the host system and compare them to known attack models. An advantage of using host based IDS is the system's ability to associate a user to an event [7]. In some cases, these systems are able to detect threats that aren't detectable by network based IDS. Unlike NIDS, a host based system can detect encrypted traffic since it resides on the destination system that would decrypt the encrypted packet. Host-based intrusion detection is also best suited to combat internal threats and misuse by authorized users [8]. This is due to the fact that a HIDS can monitor and react to specific user actions on the same host. Limitations of HIDS exist and in some cases are closely related to essentials of the intrusion detection process. Such limitation is that intrusion reports are rendered as unrealizable once an attack is successful on a host. Another limitation is that these systems would normally run under the host's operating system, and therefore vulnerable to the same attacks on the OS. Also, HIDS are required to be installed on each system in the network which is not practical during the process of upgrading the IDS software. Host based IDS require resources to run on the host and thus threatened by DoS attacks [7]. To overcome the shortages of both system, a third type of IDS can be setup on a network. Such system is called the Hybrid Intrusion Detection System. Hybrid systems offer management of and alert notification from both network and host-based intrusion detection devices [8]. Current IDS solutions Network security and intrusion detection have been an important issues since the early use of computer networks in the military. Research in the field of intrusion detection extended to include players from the Department of Defense, the UC Davis Computer Security Lab and 5
6 other academic institutes, and eventually commercial developers [8]. Current IDS products can be categorized into research, government sponsored, commercial, and open source products. Examples of these products are discussed below. Research Systems EMERALD The Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD) is an IDS research tool that was developed and maintained by the Stanford Research Institute, also known as SRI International [10]. The project began in 1983 following the introduction of a multivariate statistical algorithm that help separate different user behaviors. Later on the project included the use of a signature analysis subsystem and eventually resulted into a real time system that monitors activities on multiple hosts. EMERALD was the end product of these projects with the objective of creating a large network intrusion detector. The system structures users into domains that are then analyzed by three monitors. Each monitor work on anomaly detection and signature analysis. Another part of the monitors, the resolver, works on integrating these results. For its statistical profiling, EMERALD uses an abstract notion of a profile that separates management from analysis. For its signature analysis a layer called the service-layer works on detecting abnormalities that correspond with known threats. These threat reports get asserted by a higher level monitor that work on identifying the extent of the threat. The results of these reports can then be passed by the resolver to third party tools that provide an interface for network administrators and could execute counter measurement procedures [10]. Research on EMERALD is still active especially with the increased complexity of attacks posed on today's networks. Most of these attack require IDS to collect and analysis data from multiple networks, all in real time. EMERALD offer a flexible and well established intrusion detection architecture that represents the future of IDS. Bro Bro is an open source Unix based NIDS that is developed at the Lawrence Berkeley National Laboratory, and lead by Vern Paxson. It works by passively watching network traffic for suspicious activities [11]. Bro's detection process starts by extracting application level semantics from network traffic. The system then works on analyzing and comparing activities with known threat patterns. Bro detects both specific attacks defined by signatures or special events and detects unusual activities. Each event captured by Bro is checked through policy scripts that Bro administrators supply or by the default scripts that ship with Bro. The scripts are written in a specialized 6
7 language that is designed for network analysis and security analysis. Each script contains several event handlers specifying particular actions for each event. These event handlers maintain and update global state information, generate other new events, generate alerts that produce log messages, and can also invoke shell commands [11]. There are several design goals for the Bro IDS [10]. A major goal of Bro is its ability to handle high speed and high volume traffic with no packet dropping. Bro also features a real time notification system that ensure timely response to threats. Another design goal is the separation between mechanism and policy that results in easier implementations and straightforward maintenance. Bro's scripts feature allows for extensibility which is crucial for any IDS since attacks today are evolving very rapidly. Since Bro's source code is open source, it is actively evolving by the contributions from computer security specialists which has an advantage of being up to date on current threats. Government sponsored Systems CIDDS The Common Intrusion Detection Director System (CIDDS) is a dedicated collection of software and hardware that supports the Air Force Information Warfare Center s (AFIWC) Intrusion Detection Tools (IDT) program [10]. AFIWC has an Air Force Computer Emergency Response Team (AFCERT) that is responsible for administration and network security operations involving the IDT program. CIDDS obtain connections data from Automated Security Incident Measurement (ASIM) Sensor host machines and stores this data on a local database. ASIM is the first solution to incorporate both a hardware and software solution to network intrusion detection [8]. The data stored at the local Oracle databases is examined for detailed correlation and analysis by security analysts and automated tools. The system has a graphical user interface that allow users to correlate, study, and analyze indicators of potentially intrusive, malicious or unauthorized events occurring on Air Force networks [10]. The CIDDS and ASIM Sensors provide the capability to enforce Air Force network security policies and help protect Air Force networks from threats. Commercial Systems SecureNet IDS/IPS The SecureNet IDS is developed by the software company Intrusion. Intrusion claims that its software provide packet analysis and application awareness, and it can be deployed passively for ID or actively for intrusion prevention [12]. SecurNet can be work on networks with speed ranges upto 1 Gbit/s. The software allow for tweaking and creating pattern-matching and 7
8 protocol-decode signatures. The system uses a hybrid detection model that applies pattern matching for performance and protocol decoding for intentional evasion and network anomalies. SecureNet has a scripting language and graphical interface for adjustments and for creating specific protocol decode detection signatures. Dragon IDS/IPS Enterasys provide a range of network security solutions. Dragon is their IDS and Intrusion Prevention System (IPS). The system can be deployed as both host based or network based detection system. Its ID and IP systems use signature-based, protocol-based, anomaly-based, and behavior-based models simultaneously to detect intrusion [13]. Dragon features a multi-threaded architecture and a virtual sensor that allow for scalability. The IP and ID systems are the core components which can be combined with other products from Enterasys such as the Dragon Security Command Console (DSCC) and NetSight Automated Security Manager (ASM). These tools work on identifying and locating intrusions and can automatically execute appropriate commands in case of serious threats. The Enterasys Network Access Control (NAC) tool can be used for monitoring behaviors of authorized users. The IDS integrates vulnerability pattern matching, protocol analysis and anomaly based detection and also applies application-based event detection that detects unknown signature attacks against common applications such as FTP. The IPS component work on attack alerts, dropping malicious packets and terminating sessions. It also establish firewall rules that block the source of the attack for a period of time [13]. Open Source Systems OSSEC OSSEC is an open source host based intrusion detection system. The system was first authored and is lead by Daniel B. Cid. OSSEC features a variety of IDS tasks such as log analysis, registry monitoring, integrity checks, rootkit detection, time-based alerting and active response [14]. OSSEC runs on various operating systems including Windows, Mac OS X 10, Linux, and other POSIX compliant systems. System integrity checking is a key feature of OSSEC's architecture. OSSEC can run as a standalone process or as a client-sever model. The client side compress and encrypts the data then uses UDP to communicate with the server. Authentication with the server is done by using a pre-shared key which eliminate the need for an integrity database on the server. The client process sends copies of the data to the server where the integrity delta is calculated. Newer 8
9 versions of OSSEC support reading database logs and storing alerts on PostgreSQL and MySQL OSSEC log analyzer contains a large number of predefined log rules. While running, the analyzer monitors a list of system logs that can be configured to include specifically important logs. These logs get processed by the an engine that attempts to match rules stored inside XML documents. These XML documents contain definitions that describe the level of alert, regular expression matching, process lookup, and other declarations. Snort Snort is a cross-platform, lightweight network intrusion detection tool that can be deployed to monitor small TCP/IP networks and detect a wide variety of suspicious network traffic as well as outright attacks [15]. It was first developed by Martin Roesch and now owned and developed by Sourcefire. Snort's design goal is to have a small system footprint, and be easy to configure by system administrators who need to quickly develop security solutions for a new threat. Snort is based on the libpcap packet sniffer and logger. It performs content pattern matching to detect attacks using rules based logging. Such attacks include buffer overflows, port scans, CGI script attacks, and Server Message Block (SMB) probes. Snort features a real-time alerting feature that send alerts to syslog, SMB WinPopup messages, or separate alert files. The system is configured by command line switches and Berkeley Packet Filter commands. The system's detection engine interprets a simple programming language that is used to describe per packet tests and actions. This IDS has three primary subsystems. The first subsystem is the the packet decoder. Each subroutine in the decoder order packets data by layering data structures on the network's traffic. These routines are called in order from the data link layer up through the application layer. The second subsystem is the the detection engine. Detection rules are stored in a two dimensional linked list of chain headers and chain options. Chain headers include common attributes and the chain options contain the detection modifier options. This technique helps in speeding up the detection process since the common attributes are compressed into one Chain header and the individual detection signatures are stored in the Chain option. Rule chains are searched recursively and when a rule matches the current packet in the detection engine it triggers the action assigned in the rule definition. The third subsystem of Snort is the logging and alerting subsystem. The logging system logs packets in a decoded format or in a tcpdump binary format which is saved to a single log file. Other logging options include shutting down the logging system that would result in performance improvements. Alerts options in Snort include sending alerts to syslog, logging to a text file, or sending WinPopup messages via the SMBclient program. The alerting system has two options when sending alerts to plain text files. A fast alert option writes a short list of 9
10 information to the alert file which in turn allows for greater performance. The full alerting option writes alert messages and packet headers information through the transport layer protocol. As in logging, alerts can be turned off for performance reasons. Snort's uses a command line interface as its basic interface, however it can be combined with other software like OSSIM for a graphical user interface and for generating graphs and charts. Other proprietary versions which might include integrated hardware and software support are sold by the current owner of the Snort IDS. Challenges facing IDS The field of intrusion detection is still maturing with many challenges facing ID developers [10]. Such challenges include the increased number of intruders and intrusion techniques that uses sophisticated and complex methods. Another issue is the use of encryption when the malicious code spread through the connected networks. The use of different operating systems and technologies makes the job of an IDS harder since it needs to correlate data coming from different environments. An important requirement for a sold IDS is the ability to handle alerts in real-time. This is becoming much more difficult with the increase of network traffic and speeds. Other challenges include the lack of standards in the field of intrusion detection with multiple structures for each system. This strategy slows down the progress of intrusion detection since each system would have to create its own set of rules and definitions, different from other systems that already established similar attack signatures. IDS are also prone to high levels of false positives and false negatives that are unacceptable. IDS face threats and attacks to the system itself that are similar to attacks on anti-virus softwares and firewalls. IDS also face challenges of limited traffic visibility due to switched LANs [10]. Conclusions ID systems try to solve the problem of identifying unauthorized access or abusive usage by authorized users. Unauthorized access is used to gain access to important information, to spread worms, to recruit bots, to initiate DDoS attacks, or to be used for other malicious reasons. Different types of IDS include network based systems and host based systems. Other hybrid models exist and work by collecting data from HIDS and NIDS softwares. Most of these systems use techniques that identify threats using anomaly detection, signature analysis, or both. There are different options available for network administrators that include open source software and proprietary software. The new approach in the field of intrusion detection relies on the usage of abstract rules and real-time responses combined with the use of special networking hardware to optimize the intrusion detection process. These ID systems are rapidly evolving due to the increased challenges that face the network security domain. 10
11 References [1] Network intrusion detection, Mukherjee, B.; Heberlein, L.T.; Levitt, K.N. Network, IEEE, Volume: 8 Issue: 3 May/Jun Pages: [2] Defending yourself: The role of intrusion detection systems. McHugh, J., Christie, A., Allen, J., IEEE Software (Sept./Oct.), Pages: [3] Malware. Wikipedia, The Free Encyclopedia. Wikimedia Foundation, Inc. 12 Nov [4] Computer viruses. Subramanya, S.R.; Lakshminarasimhan, N.Potentials, IEEE Volume 20, Issue 4, Oct-Nov 2001 Pages: [5] A taxonomy of computer worms. Weaver, N.; Paxson, V; Staniford, S; and Cunningham, R. Proceedings of the 2003 ACM workshop on Rapid Malcode. [6] A taxonomy of DDoS attack and DDoS defense mechanisms. Jelena Mirkovic, Peter Reiher,, ACM SIGCOMM Computer Communication Review, v.34 n.2, April [7] IDS - Today and Tomorrow. Goeldenitz, T. The SANS Institute. January 22, From [8] The Evolution of Intrusion Detection Systems. Paul Innella, Tetrad Digital Integrity, LLC. November 16, From [9] An intrusion-detection model. D. E. Denning. IEEE Transactions on Software Engineering, Vol. SE-13(No. 2): , Feb [10] State of the practice of intrusion detection technologies. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., and Stoner, E Technical Report CMU/SEI-99TR -028, CMU/SEI. [11] Bro Intrusion Detection System. Lawrence Berkeley National Laboratory. Accessed November 17, 2007 from [12] SecureNet Product Brief. Intrusion, Inc. Accessed November 18th, 2007 from [13] Enterasys Dragon Intrusion Detection and Prevention. November 19th, 2007 from [14] Free Lunch: OSSEC. Storms, A. 360 Security, ncircle.com. November 20th, 2007 from 11
12 [15] Snort: Lightweight intrusion detection for networks. M. Roesch.. In Proc. 13th Systems Administration Conference (LISA), pages USENIX Association, November
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.
Our Security Ways we protect our valuables: By Edith Butler Fall 2008 Locks Security Alarm Video Surveillance, etc. History about IDS It began in 1980, with James Anderson's paper: History of IDS Cont
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
Network Security Forensics
Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new
Network & Agent Based Intrusion Detection Systems
Network & Agent Based Intrusion Detection Systems Hakan Albag TU Munich, Dep. of Computer Science Exchange Student Istanbul Tech. Uni., Dep. Of Comp. Engineering Abstract. The following document is focused
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Comparison of Firewall and Intrusion Detection System
Comparison of Firewall and Intrusion Detection System Archana D wankhade 1 Dr P.N.Chatur 2 1 Assistant Professor,Information Technology Department, GCOE, Amravati, India. 2 Head and Professor in Computer
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
