Monitoring Network Security with the Open-Source Bro NIDS
|
|
|
- Cameron Todd
- 10 years ago
- Views:
Transcription
1 Monitoring Network Security with the Open-Source Bro NIDS Robin Sommer Lawrence Berkeley National Laboratory & International Computer Science Institute at Jefferson Lab
2 Outline Overview of Bro s design & architecture Topics Dynamic Protocol Detection Bro Cluster Time Machine with Bro interface Outlook 2
3 The Bro NIDS 3
4 System Philosophy Bro is being developed at LBNL & ICSI since 1996 LBNL has been using Bro operationally for >10 years It is one of the main components of the lab s network security infrastructure Bro provides a real-time network analysis framework Primary a network intrusion detection system (NIDS) However it is also used for pure traffic analysis Focus is on Application-level semantic analysis (rather than analyzing individual packets) Tracking information over time Strong separation of mechanism and policy The core of the system is policy-neutral (no notion of good or bad ) User provides local site policy 4
5 System Philosophy (2) Operators program their policy Not really meaningful to talk about what Bro detects by default Analysis model is not signature matching Bro is fundamentally different from, e.g., Snort (though it can do signatures as well) Analysis model is not anomaly detection Though it does support such approaches (and others) in principle System thoroughly logs all activity It does not just alert Logs are invaluable for forensics 5
6 Target Environments Bro is specifically well-suited for scientific environments Extremely useful in networks with liberal ( default allow ) policies High-performance on commodity hardware Supports intrusion prevention schemes Open-source (BSD license) It does however require some effort to use effectively Pretty complex, script-based system Requires understanding of the network No GUI, just ASCII logs Only partially documented Lacking resources to fully polish the system Development is primarily driven by research However, our focus is operational use; we invest much time into practical issues Want to bridge gap between research and operational deployment 6
7 Bro Deployment Bro is typically deployed at a site s upstream link Monitors all external packets coming in or going out Deployment similar to other NIDS Internet Tap Internal Network Bro 7
8 LBNL s Bro Setup External 10G Tap 10G Internal (ESNet) (LBLNet) Bro 8
9 LBNL s Bro Setup External 10G Tap Gateway Tap 10G Internal (ESNet) (LBLNet) Bro Bro 8
10 LBNL s Bro Setup External (ESNet) 10G Tap Gateway Tap 10G Internal (LBLNet) Bro Bro Bro Bro Bro Bro 8
11 LBNL s Bro Setup External (ESNet) 10G Tap Gateway Tap 10G Internal (LBLNet) acld Dynamic Blocking Bro Bro Bro Bro Bro Bro Bro blocks several thousands addresses per day! 8
12 Architecture Packet Stream Network 9
13 Architecture Event Stream Event Engine (Core) Packet Stream Network 9
14 Architecture Real-time Notification Policy Script Interpreter Event Stream Event Engine (Core) Packet Stream Network 9
15 Event-Engine Event-engine is written in C++ Performs policy-neutral analysis Turns low-level activity into high-level events Examples: connection_established, http_request Events are annotated with context (e.g., IP addresses, URL) Contains analyzers for >30 protocols, including ARP, IP, ICMP, TCP, UDP DCE-RPC, DNS, FTP, Finger, Gnutella, HTTP, IRC, Ident, NCP, NFS, NTP, NetBIOS, POP3, Portmapper, RPC, Rsh, Rlogin, SMB, SMTP, SSH, SSL, SunRPC, Telnet Analyzers generate ~300 types of events 10
16 Policy Scripts Scripts process event stream, incorporating context from past events... site s local security policy Scripts take actions Generating alerts via syslog or mail Executing program as a form of response Recording activity to disk 11
17 Example Log: Connection Summaries One-line summaries for all TCP connections Most basic, yet also one of the most useful analyzers > bro -r trace tcp Time Duration Source Destination \ http tcp SF X Serv SrcPort DstPort Proto SrcBytes DstBytes State Dir LBNL has connection logs for every connection attempt since June 94! 12
18 Example Log: HTTP Session %2 start :53041 > : %2 GET /index.html (200 "OK" [57634] %2 > HOST: %2 > USER-AGENT: Mozilla/5.0 (Macintosh; PPC Mac OS %2 > ACCEPT: text/xml,application/xml,application/xhtml %2 > ACCEPT-LANGUAGE: en-us,en;q=0.7,de;q=0.3 [...] %2 < SERVER: Apache/ (Unix) mod_fastcgi/ %2 < CACHE-CONTROL: max-age= %2 < EXPIRES: Wed, 12 Apr :18:28 GMT [...] %2 <= 1500 bytes: "<!-- Vignette StoryServer 5.0 Wed Apr..." %2 <= 1500 bytes: "r " r..." %2 <= 1500 bytes: "icon.ico" type="image/ico">^m^j..." %2 <= 1500 bytes: "erver 5.0 Mon Mar 27 15:56:55..." [...] 13
19 Script Example: Tracking SSH Hosts global ssh_hosts: set[addr]; event connection_established(c: connection) { local responder = c$id$resp_h; # Responder s address local service = c$id$resp_p; # Responder s port if ( service!= 22/tcp ) return; # Not SSH. if ( responder in ssh_hosts ) return; # We already know this one. add ssh_hosts[responder]; # Found a new host. alarm fmt("new SSH host found: %s", responder); } 14
20 Expressing Policy Scripts are written in custom, domain-specific language Bro ships with 20K+ lines of script code Default scripts detect attacks & log activity extensively Language is Procedural Event-based Strongly typed Rich in types Usual script-language types, such as tables and sets Domain-specific types, such as addresses, ports, subnets Supporting state management (expiration, timers, etc.) Supporting communication with other Bro instances 15
21 Port-independent Protocol Analysis with Dynamic Protocol Detection 16
22 Port-based Protocol Analysis Bro has lots of application-layer analyzers But which protocol does a connection use? Traditionally NIDS rely on ports Port 80? Oh, that s HTTP. Obviously deficient in two ways There s non-http traffic on port 80 (firewalls tend to open this port...) There s HTTP on ports other than port 80 Particularly problematic for security monitoring Want to know if somebody avoids the well-known port 17
23 Port-independent Analysis Look at the payload to see what is, e.g., HTTP Analyzers already know how a protocol looks like Leverage existing protocol analyzers Let each analyzer try to parse the payload If it succeeds, great! If not, then it s actually another protocol Ideal setting: for every connection, try all analyzers However, performance is prohibitive Can t parse 10000s of connections in parallel with all analyzers 18
24 Making it realistic... Bro uses byte patterns to prefilter connections An HTTP signature looks for potential uses of HTTP Then the HTTP analyzer verifies by trying to parse the payload Signatures can be loose because false positives are inexpensive (no alerts!) Other NIDS often ship with protocol signatures These directly generate alerts (imagine reporting all non-80 HTTP conns!) These do not trigger protocol-layer semantic analysis (e.g., extracting URLs) In Bro, a match triggers further analysis Main internal concept: analyzer trees Each connection is associated with an analyzer tree 19
25 Application Example: Finding Bots IRC-based bots are a prevalent problem Infected client machines accept commands from their master Often IRC-based but not on port 6667 Just detecting IRC connections not sufficient Often there is legitimate IRC on ports other than 6667 DPD allows to analyze all IRC sessions semantically Looks for typical patterns in NICK and TOPIC Reports if it finds IRC sessions showing both such NICKs and TOPICs Very reliable detection of bots Munich universities use it to actively block internal bots automatically 20
26 Application Example: FTP Data (2) xxx.xxx.xxx.xxx/2373 > xxx.xxx.xxx.xxx/5560 start response (220 Rooted Moron Version WinSock ready...) USER ops (logged in) SYST (215 UNIX Type: L8) [...] LIST -al (complete) TYPE I (ok) SIZE stargate.atl.s02e18.hdtv.xvid-tvd.avi (unavail) PORT xxx,xxx,xxx,xxx,xxx,xxx (ok) STOR stargate.atl.s02e18.hdtv.xvid-tvd.avi, NOOP (ok) ftp-data video/x-msvideo `RIFF (little-endian) data, AVI' [...] response (226 Transfer complete.) [...] QUIT (closed) 21
27 The Bro Cluster Scalable, Stateful Detection on Commodity Hardware 22
28 Motivation NIDSs have reached their limits on commodity hardware Keep needing to do more analysis on more data at higher speeds Analysis gets richer over time, as attacks get more sophisticated However, single CPU performance is not growing anymore the way it used to Single NIDS instance (Snort, Bro) cannot cope with >=1Gbps links Key to overcome current limits is parallel analysis Volume is high but composed of many independent tasks Need to exploit parallelism to cope with load 23
29 The Bro Cluster Load-balancing approach: use many boxes instead of one The Bro cluster works transparently like a single NIDS Gives same results as single NIDS would if it could analyze all traffic Correlation of low-level analysis No loss in detection accuracy Scalable to large number of nodes Single system for user interface (log aggregation, configuration changes) Most NIDS provide support for multi-system setups However instances tend to work independently Central manager collects alerts of independent NIDS instances Aggregates results instead of correlating analysis 24
30 Architecture Internet Local Tap NIDS Cluster 25
31 Architecture Internet Local Tap NIDS Cluster Frontend Frontend 25
32 Architecture Internet Local Tap NIDS Cluster Frontend Frontend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend 25
33 Architecture Internet Local Tap NIDS Cluster Frontend Frontend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Proxy Proxy 25
34 Architecture Internet Local Tap NIDS Cluster Manager Frontend Frontend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Backend Proxy Proxy 25
35 Prototype Setups Lawrence Berkeley National Laboratory Monitors 10 Gbps upstream link 1 frontend, 10 backends University of California, Berkeley Monitors 2x1Gbps upstream links 2 frontends, 6 backends IEEE Supercomputing 2006 Monitored conference s 1 Gbps backbone network 10 Gbps High Speed Bandwidth Challenge network Goal: Replace operational security monitoring at LBNL 26
36 Frontends Slicing the traffic connection-wise Hashing based on either 4-tuple (addrs, ports) or 2-tuple (addrs) Distributing traffic to backends by rewriting MACs In software via Click (open-source modular router ) In hardware via Force-10 s P10 (prototype in collaboration with F10) LBNL is contracting a hardware vendor Will build production frontends operating at 10Gbps line-rate Available be available in 4-5 months 27
37 Backends and Manager Running Bro as their analysis engine Bro provides extensive communication facilities Independent state framework Sharing of low-level state Script-layer variables can be synchronized Basic approach: pick state to be synchronized A few subtleties needed to be solved Central manager Collects output of all instances Raises alerts Provides dynamic reconfiguration facilities Working on interactive cluster shell 28
38 The Cluster Shell 29
39 Going Back in Time with the Time Machine 30
40 The Utility of Time Travel Bro s policy-neutral logs are often the most useful output Typically we do not know in advance how the next attacks looks like But when an incident occurred, we need to understand exactly what happened How did the attacker get in? What damage did he do? Did the guy access other hosts as well? How can we detect similar activity in the future? This is when you need all information you can find The most comprehensive resource are packet traces Wouldn t it be cool if you had a packet trace of that incident? 31
41 The Time Machine The Time Machine, a bulk-recorder for network traffic Efficient packet recorder for high-volume network streams Taps into a network link and records packets in their entirety Provides efficient query interface to retrieve past traffic Storing everything is obviously not feasible TM uses heuristics for volume reduction Cut-off:! Expiration:! For each connection, TM stores only the first few KB Once space is exhausted, TM expires oldest packets automatically Simple yet very effective scheme Leverages network traffic s heavy-tails Even in large networks we can go back in time for several days Proven to be extremely valuable for network forensics in operational use at LBL 32
42 Example: Retension Time at LBNL retention time [days] KB cut-off, 500GB disk buffer Retension time > 15 days Volume reduction > 97% Fri Sat Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Time 10Gbps upstream link, 10,000 hosts, Mbps average, 1-2TB/day 33
43 Query Interface Interactive console interface # An example query. Results are stored in a file. query to_file "trace.pcap" index ip " " # Dynamic class. All traffic of IP is # assigned to class alarm set_dyn_class alarm Command-line client for common queries tm-query --ip localhost host.pcap --time 12h 34
44 Interfacing the TM with Bro The Time Machine can provide a NIDS with historic traffic Internal Network Tap Internet NIDS Queries Traffic from the past Time Machine Applications Bro controls the TM (change cut-offs, switch storage class) Bro permanently stores attack traffic Bro analyzes traffic retrospectively 35
45 Augmenting Bro Alerts with Traffic 36
46 Current Work: Time Machine NG We are now building a generalized Time Machine Incorporates arbitrary network activity rather than just packets Allows live queries for future activity Server IDS Router Desktop "Who accessed system X and also fetched URL Y?" Time-Machine Analyst One goal: Facilitate cross-site information sharing 37
47 Summary & Outlook 38
48 The Bro NIDS Bro is one of the most powerful NIDS available Open-source and runs on commodity hardware While primarily a research system, it is well suited for operational use One of the main components of LBNL s network security monitoring Working a various extensions New analyzers for NetFlow, BitTorrent, SIP, XML w/ XQuery support Multi-core support Turning cluster prototype into production at LBNL Reimplementing frontends on new platforms 39
49 Any questions...? Robin Sommer Lawrence Berkeley National Laboratory & International Computer Science Institute
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab
High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab Strategies for Monitoring External and Internal Activity Robin Sommer Lawrence Berkeley National Laboratory & International
The Open Source Bro IDS Overview and Recent Developments
The Open Source Bro IDS Overview and Recent Developments Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org The Bro NIDS - Outline
A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory
A Bro Walk-Through Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org Doing the Walk-Through... Going from simple
How to (passively) understand the application layer? Packet Monitoring
How to (passively) understand the application layer? Packet Monitoring 1 What to expect? Overview / What is packet monitoring? How to acquire the data Handling performance bottlenecks Analyzing the transport
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
The Bro Network Security Monitor. Broverview
The Bro Network Security Monitor Broverview Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework for network traffic
Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis
Flow-level analysis: wireshark and Bro Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis 1 wireshark tshark Network packet analyzer for Unix/Windows Displays detailed packet stats GUI (wireshark) or command-line
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
The Bro Network Security Monitor. Broverview. Bro Workshop 2011. NCSA, Urbana-Champaign, IL. Bro Workshop 2011
The Bro Network Security Monitor Broverview NCSA, Urbana-Champaign, IL Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers
Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers The Enterprise Packet Capture Cluster Platform is a complete solution based on a unique
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
Applications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance. Sunny Gleason COM S 717
Applications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance Sunny Gleason COM S 717 December 17, 2001 0.1 Introduction The proliferation of large-scale
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection Holger Dreger TU München [email protected] Anja Feldmann TU München [email protected] Michael Mai TU München [email protected] Vern
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
VERITAS Cluster Server Traffic Director Option. Product Overview
VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Configuration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
APV9650. Application Delivery Controller
APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Infrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
Firewalls. Network Security. Firewalls Defined. Firewalls
Network Security Firewalls Firewalls Types of Firewalls Screening router firewalls Computer-based firewalls Firewall appliances Host firewalls (firewalls on clients and servers) Inspection Methods Firewall
Preinstallation Requirements Guide
Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Cyber Security Scan Report
Scan Customer Information Scan Company Information Company: Example Name Company: SRC Security Research & Consulting GmbH Contact: Mr. Example Contact: Holger von Rhein : : Senior Consultant Telephone:
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers
Layer 4-7 Server Load Balancing Security, High-Availability and Scalability of Web and Application Servers Foundry Overview Mission: World Headquarters San Jose, California Performance, High Availability,
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
How to protect your home/office network?
How to protect your home/office network? Using IPTables and Building a Firewall - Background, Motivation and Concepts Adir Abraham [email protected] Do you think that you are alone, connected from
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
