SIE, PassiveDNS, and data combining
|
|
|
- Philomena Kelley
- 10 years ago
- Views:
Transcription
1 SIE, PassiveDNS, and data combining ENOG, June 2011 Eric Ziegast / Shane Kerr <[email protected]>
2 About ISC SIE Agenda Passive DNS and DNSDB Data analysis and combining examples How to participate
3 3 Shane Kerr
4 The Security Information Exchange (SIE) is... Efficient bi-lateral peering and multi-lateral sharing within a common legal/privacy framework Common software, protocols and extensible binary data formats Exchange, relay, VPN, upload, download, infrastructure NMSG Passive DNS Replication and Analysis I/SDRN Scaling security data collection within service providers DNSDB DNS RPZ Standardizing DNS-enabled enforcement for security policy More background information on SIE & NMSG, 12/2009:
5 SIE Channels SIE used channels as the term for peers who are connected to a port to subscribe to a data flow. There are several types of channels which are all variants of private channels : Community Channels multilateral peering, open to any who connect to a port (ISC channels will be converted to Multilateral Community Channels). Private Channels bi-lateral, multilateral, and commercial exchange between the SIE constituents. Incident Channels created to provide data during an incident carries specific distribution rules. sensor sensor sensor sensor sensor sensor RELAY RELAY NMSG Channels SIE Peers
6 SIE Efficiencies I/SDRN 6
7 PassiveDNS FIRST 2005, Florian Weimer 7
8 How Passive DNS works 8
9 SIE Improvements google: sie-dns-sensor Advantages: Platform-neutral binary format Re-assembles IP and EDNS0 fragments Determines bailiwick information Matches queries to responses Better timetamps than pcap Multiple payloads per message Improved payload replication capabilities Defcon 18 pres: google: dc-18-archive.html#vixie 9
10 Channel example - ch202 - dnsqr [268] [ :28: ] [1:9 ISC dnsqr] [20f58a64] [] [] type: UDP_QUERY_RESPONSE query_ip: A.B.C.D response_ip: proto: UDP (17) query_port: response_port: 53 id: qname: ns2.snapfish.com. qclass: IN (1) qtype: A (1) rcode: NOERROR (0) delay: udp_checksum: CORRECT query: [34 octets]... omitted... response: [98 octets]... omitted...
11 120 Mbps! 10 Mbps 5 Mbps 2 Mbps! 11
12 Processing notes Reduce and filter incoming data to a manageable level before database Loosely coupled multi-processor Broadcast ethernet as an IPC message bus Different-sized single-purpose servers working together in real time Database (Pgsql => DB4 => Cassandra => TokyoCabinet) Write-optimized - constant updates Sort & Merge - hourly, daily, monthly, yearly Clustered storage /w replicas 12
13 Channel example - ch204 [98] [ :52: ] [2:1 SIE dnsdedupe] [ ] [] [] type: EXPIRATION count: 100 time_first: :52:09 time_last: :50:16 bailiwick: gamejobs.com. rrname: gamejobs.com. rrclass: IN (1) rrtype: NS (2) rrttl: rdata: ns.rackspace.com. rdata: ns2.rackspace.com.
14 DNSDB
15 Channel example - sinkhole [189] [ :57: ] [1:4 ISC http] [ ] [ISC] [ConfickerC] type: sinkhole srcip: 113.YY.YY.YY srcport: 4779 dstip: XX.XX.XX.XX dstport: 80 request: GET / HTTP/1.0 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR ;.NET CLR ) Host: XX.XX.XX.XX Pragma: no-cache
16 Spam example $ nmsgtool -l /8430 -c 1 -o - [407] [ :40: ] [1:2 ISC ] [0829f21a] [] [] type: spamtrap srcip: helo: bl dsl.asiatel.tl from: [email protected] bodyurl: bodyurl: bodyurl: bodyurl: bodyurl: bodyurl: bodyurl: bodyurl:
17 Other data IDS data Malvertising URLs Darknet / Backscatter 17
18 Data combining and analysis Some external examples Some SIE examples General lesson for hackers: conceal your access infrastructure use will be detected 18
19 Fast-flux botnet detection Malware 2008, Holz/Nazario What characteristics were common in Fast-Flux botnets? What automated heuristics could be developed to classify a new domain to badness? Number of IPs/domain Change frequency AS distribution Geographic distribution domain lifetime number of NS records low TTL, odd SOA 19
20 CMU CERT workshop /oarc-ers pdf uses SIE data 20
21 Damballa s NOTOS uses SIE ch
22 Damballa s NOTOS 22
23 DNS cache pollution (GTISC) M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, N. Feamster. "Building a Dynamic Reputation System for DNS". USENIX Security Symposium
24 ISECLAB s EXPOSURE uses SIE ch202 24
25 uses DNSDB API...etc... 25
26 26 Master of multiple channels: spam, PassiveDNS, darknet
27 More data combining RB-Seeker: Auto-detection of Redirection Botnets (NDSS 2009) Passive DNS + Netflow -> redirection domains Spam URLs -> redirection domains redirection domains + DNS queries -> actionable intel ICSI/Berkeley/UCSD Similar detection methods to RB-Seeker Add web crawling to cluster offers together Bought products to track payment processing Found that only a few banks processed most of the transactions Financial system could become a choke point for spamming uses SIE for other projects 27
28 How to Participate with SIE
29 How to Participate with SIE? Join the SIE Forum Configure a SIE Passive DNS Sensor and Contribute Passive DNS data. google: join-global-passive-dns Submit other data (darknet, spam) Get a beta DNSDB UI Account Get a trial server 29
30 SIE Forum The Security Information Exchange (SIE) Forum is a new, vetted, real time security peering project created by Internet Systems Consortium ( ISC ) organized under similar auspices as other ISC Fora (i.e BIND Forum, DHCP Forum, etc). The SIE Forum promotes the development of a trusted mechanism to exchange a variety of real time security data so to anticipate and tackle key network security issues for the protection, development, and maintenance of an operational Internet. SIE s measures it success by an industry ecosystem that provides law abiding Internet with the equitable means to identify and mitigate miscreant activities. SIE Forum membership funds the technological and operational expansion of the SIE architectural model. Send to [email protected] to get more information. 30
31 Submit Passive DNS Data Setting up a Passive DNS Sensor and submitting data is one of the best ways to start participation. [email protected] to get started. Content Facebook.com DNSDB Google.com.org DNS Caching Resolvers Query Response amazon.com.com Security Information Exchange Passive DNS Sensor.sc.org gtisc.gatech.edu.net Forwarded Inter-Server DNS Traffic 31
32 Submit Darknet data Do you have any netblocks lying around? ;) Can capture/compress/upload with nmsgtool Route or cross-connect with SIE Terouter static address-family ipv4 unicast ###.###.0.0/ arp vrf default ARPA interface GigabitEthernet0/1/0/3.14 description SIE Dark Net ipv4 address dot1g vlan 14 t 32
33 DNSDB User Interface Beta We have four ways to access DNSDB beta. Each are aligned with a sustainable public benefit service. Vetted Member of the Operational Security Community. Passive DNS Contributors. SIE Peers. SIE Forum Members. All applications should to [email protected] - Please include name, , contact phone number, and public PGP key with a location of the key server used 33
34 DNSDB API Access The DNS API access provides a programmable access to the passive DNS data. Its allows qualified and vetted organizations to build tools that integrated directly into DNSDB. Access to DNSDB is limited based on a sustainability model that also vets access to mitigate potential abuse. Status: The DNSDB API is in BETA. The BETA is currently closed. But, when the DNSDB API is opened, there will be four ways to obtain access DNSDB's API: Passive DNS Contributors. ISC Sponsored Researchers. SIE Peers. SIE Forum Members. 34
35 Questions... Web: DNSDB: NMSG: ftp://ftp.isc.org/isc/nmsg (nmsg-dev)
Build Your Own SIE. Oct 22, 2012 Baltimore, MD. Eric Ziegast <[email protected]>
Build Your Own SIE Oct 22, 2012 Baltimore, MD Eric Ziegast Agenda Limited Scope (internal only - no policy stuff) Hardware Infrastructure concepts nmsgtool Q&A Hardware SIE Switch Many
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Comprehensive Understanding of Malicious Overlay Networks
Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected]
Preetham Mohan Pawar (1000919136)
Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE Introduction. Basic concepts.( DNS ) Mobile
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
DNS as a Forensics Tool. Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston
DNS as a Forensics Tool Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston Internet as Territory But what is the internet? It's the largest equivalence class in the reflexive transitive
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
BASIC FIREWALL SERVICES
BASIC FIREWALL SERVICES Course # 1202 1 Services! NTP Network Time! DHCP Relay Server! DNS Proxy Server! Dynamic DNS! High Availability! Remote Logging! SNMP 2 NTP Network Time Service! NTP server will
Southwest Arkansas Telephone Cooperative Network Management Practices
Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...
Detection of DNS Traffic Anomalies in Large Networks
Detection of DNS Traffic Anomalies in Large Networks Milan Čermák, Pavel Čeleda and Jan Vykopal Institute of Computer Science, Masaryk University, Brno Czech Republic, {cermak celeda vykopal}@ics.muni.cz
HOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
Technical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5
Technical Note The vfabric Data Director worksheets contained in this technical note are intended to help you plan your Data Director deployment. The worksheets include the following: vsphere Deployment
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
Configuring Dynamic DNS
9 CHAPTER This chapter describes how to configure DDNS update methods, and includes the following topics: Information about DDNS, page 9-1 Licensing Requirements for DDNS, page 9-2 Guidelines and Limitations,
SIM Configuration Guide. February 2015 Version 1 Document Reference: 8127
SIM Configuration Guide February 2015 Version 1 Document Reference: 8127 Contents 1 SIM APN Settings... 3 2 SIM MMS Settings... 3 3 SIM Email Settings... 4 4 SIM SMS Settings... 5 5 SIM SMS Charging...
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC
Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC Background and Overview The Computer Security Incidents Internet2 (CSI2) working group organizes activities to better identify
F root anycast: What, why and how. João Damas ISC
F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.
COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator
> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering
Ethernet Switch and Ethernet Routing Switch Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Enterprise Solutions Engineering Document Date: March 9, 2006 Document Version:
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, and Wenke Lee Domain Name System Machine-level
JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003
JPNIC Public Forum Paul Vixie Chairman, Internet Software Consortium January 21, 2003 1 Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Rogue DNS servers a case study
Rogue DNS servers a case study Feike Hacquebord Forward Looking Threat Research, Trend Micro Cupertino, CA, USA [email protected] Contents Introduction to DNS DNS Changer Trojans Rogue
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Innominate mguard Version 6
Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna. 2010 Marc Heuse <[email protected]>
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna 2010 Marc Heuse Hello, my name is The future is here already Let s start with the basics IPv4 4 octets 4.294.967.296
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Load balancing Microsoft IAG
Load balancing Microsoft IAG Using ZXTM with Microsoft IAG (Intelligent Application Gateway) Server Zeus Technology Limited Zeus Technology UK: +44 (0)1223 525000 The Jeffreys Building 1955 Landings Drive
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?
Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible
Building Nameserver Clusters with Free Software
Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Configuring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Creating a master/slave DNS server combination for your Grid Infrastructure
Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
1 DNS Packet Structure
Fundamentals of Computer Networking Project 1 Primer: DNS Overview CS4700/CS5700 Fall 2009 17 September 2009 The DNS protocol is well-documented online, however, we describe the salient pieces here for
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted
APNIC IPv6 Deployment
APNIC IPv6 Deployment Ulaanbaatar, Mongolia 19 October 2015 Issue Date: Revision: Overview Deployment motivation Network deployment IPv6 Services deployment IPv6 Anycast service IPv6 Cloud service Summary
provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.
WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
- EtherChannel - Port Aggregation
1 Port Aggregation - EtherChannel - A network will often span across multiple switches. Trunk ports are usually used to connect switches together. There are two issues with using only a single physical
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Unified Security Management and Open Threat Exchange
13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Next-Generation DNS Monitoring Tools
Next-Generation DNS Monitoring Tools Cyber Security Division 2012 Principal Investigators Meeting October 9, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected] 404-808-5172
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
Firewall Log Format. Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g. 0101011, 0102011
Firewall Log Format Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information and reports
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
