Research on Network Attack-Defense Training Based on Virtual Machine
|
|
|
- Ethelbert Bates
- 10 years ago
- Views:
Transcription
1 Research on Network Attack-Defense Training Based on Virtual Machine 1 Zhang Hui, 2 Sun Yanwei *1, School of Computer Science and Technology, HuBei University of Education, [email protected] 2, College of Computer Science and Technology, ChongQing University of Posts and Telecommunications, [email protected] Abstract For modern information warfare, a bridle-wise team sophisticated in computer network attackdefense skills can be the key to the win or lose. Aiming at present military requirement for network attack-defense training and difficulties involved, a realistic and economical method for building network environment with virtual machine was put forward, which can construct a relative complicated network experiment environment with limited hardware condition. The related key technologies such as three kinds of network accessing pattern in VMware, the architecture of network attack-defense and the virtual network topology are also detailed. Finally, a simulation example was presented to prove the feasibility of the method. It can provide beneficial reference for building a network shooting range for attack-defense training, and soldiers can be versed in theories and skills of computer network attack-defense by training during short term. Keywords: Network Attack-Defense, Virtual Machine, Vmware, Network Address Translation, Virtual Simulation Network 1. Introduction Computer network war will be the leading pattern of operations on future information battlefield. It is an armchair strategist to keep initiative anytime and anywhere without a bridle-wise team sophisticated in computer network attack-defense skills. Researches of network information security and information secrecy are always attached much more importance. But the central point of the research emphasizes particularly on theory and soldiers can t get corresponding network attack-defense simulation training system to be used for training. So it is great important of developing network attack-defense simulation training system to build a network shooting range for attack-defense training, and soldiers can be versed in theories and skills of computer network attack-defense by training during short term. But in light of current reality of current network attack-defense areas, the biggest challenge is how to build a realistic simulation network environment and experimentation platform serving for training and researching in the limited condition of hardware and software. As the combination of hardware and software, virtual machine can create a running platform for Operation System and other software by using functions of existing Operation System and special hardware. The advent of virtual machine technology and its powerful virtual function, which make it possible to perform the experiment that is hampered by limited equipment before time. Accordingly, developing a network attack-defense training system based on virtual machine is brought forward. In this system, Red-Blue antagonizing mechanism is introduced to network security and Attack-Defense technologies are implemented. The large-scale network antagonizing drill can be put in practice by planning the scenario of both sides in the system. By observing the whole network attack and defense process, the trainer can get great skills and more experience. At the same time, the researcher can test research results of network Attack-Defense technologies. The system will provide scientific training means for network Attack-Defense drill of future information warfare, and it will also provide advantaged training support for improving network operational capability of digital troops. 2. Related works Works on network Attack-Defense training simulation based on virtual machine are seldom found in related research fields and approaches. But building test platform and performing Journal of Convergence Information Technology(JCIT) Volume 7, Number 21, Nov 2012 doi : /jcit.vol7.issue
2 network security experiment by using virtual machine have been gained great advancement in recent years and can provide beneficial reference. New progresses have been achieved in network Attack-Defense technology. The typical attacks against IP communications network security, such as different kinds of denial-of-service and attacks against RIP/OSPF/ISIS routing protocols are analyzed by Cheng Yanli [1]. Various network attacks and the security protection technologies including disclosure, counterfeiting, tampering, malicious attacks, vulnerabilities, denial of service, data stream encryption, access control, data stream filtering, intrusion detection and security scanning are detailed by Wei Junhua [2]. A kind of simulation platform model of network attack-defense was put forward by Wu Xianhong [3]. Within the platform model, every component is analyzed and its function is pointed out. In terms of the component of virtual network environment, the design of virtual network topology, the saving and parsing of virtual network topology and the creation of virtual network environment, the simulation environment of network attack-defense is designed and implemented in detail. A network confrontation training simulation system has been designed by Gan Gang [4], and its related subsystems including interactive confrontation training simulation system, support software system, evaluation system, and information database are discussed. Due to performance increase of computer hardware, research on virtual machine and its application has attracted more attention. According to the principle and the purpose of the network technology experiment platform, a plan using virtual machines was offered by Gong Tao [5]. The content and flow of building the network technology experiment platform were introduced. Basing on the virtual machine software named VMware Workstation, the plan and design solution scheme for virtual machine is chiefly discussed by Wang Taicheng [6], which can implement and finish complex network experiments including DHCP relay agent and VPN remote access. The benefits of using virtual machine and the prospects of application for the National Meteorological Information Center of China are discussed by Zhang Haitao [7]. He also established a high available test environment with two Suse Linux servers sharing storage, and it can replace the actual expensive hardware environment. An approach of applying VMware virtual machine technology to support windows soft route labs under stand-alone computer environment was presented by Ren Yingxue [8]. Through his approach, there is no need to construct real intranet or networked lab and the interconnected communication of different IP address fields could be achieved by using virtual network composed of virtual machines and router constructed by Windows 2000 routing & remote access service. Based on the research actualities mentioned above, it is easy to know that the existing research results mainly focused on single network attack-defense technology and application of virtual machine. But how to build an experiment platform applying to skill training for different network attack-defense technologies by virtual machine can t be found yet. So research on network attack-defense training simulation system based on virtual machine will gain important practical significance for improving training effect. 3. Virtual machine The virtual machine technology can simulate an absolute physical environment with virtual machine software, which can be CPU, hard disk, CD-ROM, USB interface, network adapter and sound adapter etc. The Operation System can be installed in the virtual physical environment and runs well. The computer with virtual machine software running is called host computer and the memory of host computer must be large enough when virtual machine is running. The large numbers of memory will be occupied and host computer speed will be slow down in running time. The virtual machine can be used in most different virtual network environment and its advantages are summed up as follow. 1) Several virtual machines can be with just one host computer and each virtual machine is a independence computer. Different kinds of operation systems will be simulated in the same host computer such as Windows, Linux and FreeBSD etc. Every machine can run independently or subsequently, they can communicate with other virtual machine and host computer including dialog, files sharing and etc. 229
3 2) All hardware simulated by virtual machine are standard hardware. But all hardware simulated by host computer are on the same and can be copied between different physical hosts without considering the difference among these hardware. So virtual operation system will be reverted and resumed quickly when different kinds of problems appeared. 3) The virtual hard disk used by virtual machine is one or multi files, so it made the virtual machine can be renewed fleetly. Virtual machine can save and revert system state with the function mentioned above. All configuration parameters of virtual machine can be backed up by function named with snapshot. Both virtual machine and host computer have characteristic of isolation and operations in virtual machine will have no influences with the hard disk partition and its data of physical host. Now VMware has been the most commonly used virtual machine software and it can provide three kinds of network accessing pattern for user, which has been named as bridged pattern, Network Address Translation (NAT) pattern and host pattern. The principle diagram of these patterns can be shown as Fig. 1 to Fig 3. It can help connecting the virtual machine to network according the actual network environment after the virtual machine was created. As it is shown in three figures, the dashed framework is built by VMware software. Bridged Pattern. In this pattern, virtual machine and physical host are all connected to one same virtual Ethernet switch named VMnet0. The switch is equal to concatenating to the physical network switch of upper layer. At this time, the virtual machine and the other computer in actual local area network are all at the same local network. It is shown in Figure 1. Figure 1. The principle diagram of bridge pattern Network Address Translation (NAT) Pattern. In this pattern, virtual machine is connected to virtual switch VMnet8 and VMware simulated DHCP server and NAT device all together. It can provide both DHCP service and NAT service, which help itself to acquire network configuration parameters automatically and connect to outside physical network. Two VMware network adapters (VMnet1 and VMnet8) will be created in physical host when the virtual machine software (VMware) is installed. It is shown in Figure
4 Figure 2. The principle diagram of NAT pattern Host Pattern. In this pattern, virtual machine is connected to virtual Ethernet switch VMnet1 and DHCP Server is provided by VMware. The virtual network adapter in physical host is connected to VMnet1 of virtual switch, and physical host can communicate with the other virtual machine connected to this virtual switch by this virtual network adapter. If it is disabled, physical host may not communicate with other virtual machines, but it has no effect on the communication among these virtual machines. It is shown in Figure Network attack-defense training Figure 3. The principle diagram of host pattern The network attack-defense simulation training has characteristic of complicated architecture, too many software tools involved, higher requirement of training fidelity and complicated harmonizing of relationship. Above-mentioned are the greatest difficulty of system realization and the key approach of solving them is confirming the training subject in reason. According to architecture and base process of network attack-defense, it can be described with different sub-technology which is shown in Figure
5 Network Attack-Defense Technology Network Attack Network Defense Scanning Net Topology Detection OS Fingerprint Recognizing Port Scanning Leak Scanning Sniffer ARP Deceiving Wiretap Recognizing Redirection Hack Password OS Password Application Password Document Password Secret Key Exploit OS Exploit Database Exploit Application Exploit Social Engineering Network Fishing Network Deceiving Network Pretending Trojan Horse Keyboard Record Remote Control Network Ferry Integrative Function Security Policy Encryption Data Encryption Identification Authentication Honey Pot Firewall Soft Firewall Hardware Firewall Virtual Private Network Network Proxy Server Intrusion Detection SQL Injection Backdoor Figure 4. The architecture of network attack-defense A whole network attack-defense flow includes information collection of target system, bug analyzing, attacking/defense, result studying and deploying solving project. So typical training subject and software tools are arranged in every necessary step, such as net topology detection for scanning with tools named Trace Router, ARP deceiving for sniffer with tools named Sniffer Pro, OS exploit for exploit attach with tools named Winnt Auto Attack, etc. Trained soldiers can grasp comprehensive and integrative network attack-defense theories and skills by training with the software tools mentioned above. Simulation of virtual computer network is crucial sup-port for attack-defense training and integrative drilling. The whole virtual simulation network environment is composed of gray net, yellow net, green net and black net. The topology of virtual simulation network is shown in Figure
6 Red Training Subnet Blue Training Subnet Gray Network Yellow Network Green Network Black Network Virtual Simulation Network Environment Figure 5. The topology of virtual simulation network (1) Gray net is an attack-net. Soldiers trained in this net owned the control right of all terminal. And each computer can simulate running many different operation systems synchronously by utilizing virtual machine technology. So the soldier can be trained to start attacking in various operation systems, gains the skill of network attack on different system platform and thinks about the corresponding defense measures. (2) Yellow net is a target-net to be attacked. It includes two components. One is network group composed of workstations and servers installed by all kinds of operation system, the other is network environment equipped with router, switch and firewall. As the attacking target of the gray net, its function is convenient for training the skill of deploying and setting up security project, evaluating the equipment s ability and bugs correctly. The control right of this net is not granted to the soldiers in gray net. So they must scan the yellow net at first in order to collect the bug information. (3) Green net is a net connecting with military education and training net. It provides real attackdefense drilling platform for training soldiers. The real experiences can be got with actual combat and carrying out grand drilling. (4) Black net is a study-net. It can be used for studying theory and tactics of computer network war. And the commander can be trained to ready for commanding the future net-war effectively. For the gray net, the yellow net and black net, they can be simulated by the virtual machine technology and its network simulation configuration can be shown as Figure 6. Figure 6. The network simulation configuration diagram 233
7 5. Conclusion and future works Prototype of system is development mainly with Visual C++, Oracle, prti and other attack-defense tools based on the plug-ins soft framework [9]. The simulation example of remote control is shown in Figure 7. Figure 7. The software interface of remote control training with Remote-Anything This system is realistic, controllable, repeatability and economical, which can act as a training tool. Trainer can learn about attack-defense skills with it. The user of the system can act as a commander of the net-war who conducts the soldiers to perform tactical attack-defense actions. The trainer can build a virtual simulation networks with several kinds of subnet. The networks can answer the changes of users operation. The system is running smoothly in real-time. The simulation examples prove that the development method is feasible and valid. As a future possibility, we are working on building broader, including more attack-defense tools, optimizing the simulation algorithm, and updating the system to DIS to support the training off-site [10]. 6. Acknowledgement Part of this work has been funded by the Research Project of Hubei Provincial Department of Education under Grant No. B , the Research Project of Hubei Provincial Department of Education under Grant No. B and the School of Computer Science and Technology Hubei University of Education under Grant No. 2008A007. We thank them for providing better experimentation environment and condition. 7. References [1] CHENG Yan-li, ZHANG You-chun, Attack and Protection of IP Communication Network Security, Information Security and Communication Secrecy, Vol.4, pp Apr [2] Wei Junhua, Analysis of the Offense-defense Method and Technology of the Computer Network Security, Technology Square, Vol. 1, pp Jan
8 [3] Wu xianhong, Design and Implementation of Simulation Environment of Network Attacking and Defense, Master thesis of Xidian University, Xian. Jan [4] GAN Gang, CHEN Yun, LI Fei, Design and Implementation of Network Confrontation Training Simulation System, Journal of University of Electronic Science and Techonolgy of China, Vol. 36, No. 3, pp Jun [5] GONG Tao, WAN Gang, Building Network Technology Experiment Platform Based on the Virtual Machine Technology, Computer Knowledge and Technology, Vol. 5, No. 6, pp Feb [6] WANG Tai-cheng, CAI Yong, Using Virtual Machine Technology to Perform Complex Network Experiment, Computer Technology and Development, Vol. 19, No. 4, pp Apr [7] Zhang Haitao, Zhang Junfeng, Using VMware to Simulate HA Environment and Application Prospects, Meteorological Science and Technology, Vol. 34, Nol Suppl, pp , Sep [8] LIU Wen-tao, Research of Network Security System Based on SOA, Journal of Gansu Lianhe university(natural Sciences), Vol. 24, No. 2, pp.74-77, Mar [9] Zhang Yu, Computer Network Attack Detection Based on Quantum Pso And Relevance Vector Machine, Advances in Information Sciences and Service Sciences (AISS), Vol. 4, No. 5, pp , Mar [10] Shangqin Zhong, Guosheng Xu, Yu Yang, Wenbin Yao, Yixian Yang, Algorithm of Generating Host-based Attack Graph for Overall Network, Advances in Information Sciences and Service Sciences (AISS), Vol. 3, No. 8, pp , Sep
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Network Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013
Research Journal of Applied Sciences, Engineering and Technology 5(7): 2439-2444, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 26, 2012 Accepted: September
Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
IPv4 and IPv6: Connecting NAT-PT to Network Address Pool
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall
Figure 5-1: Border s Chapter 5 Revised March 2004 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Border 1. (Not Trusted) Attacker 1 1. Corporate Network (Trusted) 2 Figure
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1
International Conference on Informatization in Education, Management and Business (IEMB 2015) Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013. Applying Virtualization Technology in Security Education
Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013 Applying Virtualization Technology in Security Education Wenjuan Xu a *,
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Log Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Automated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
A Web Site Protection Oriented Remote Backup and Recovery Method
2013 8th International Conference on Communications and Networking in China (CHINACOM) A Web Site Protection Oriented Remote Backup and Recovery Method He Qian 1,2, Guo Yafeng 1, Wang Yong 1, Qiang Baohua
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview
ViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
UVic Department of Electrical and Computer Engineering
UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:
Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën (c) A. Mariën 31/01/2006 Topic Firewalls (c) A. Mariën 31/01/2006 Firewalls Only a short introduction See for instance: Building Internet Firewalls, second
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
VPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Special Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm
Comtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
School of Information Science (IS 2935 Introduction to Computer Security, 2003)
Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Network Security and Firewall Technology
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.2.30 Network Security and Firewall
