Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 /
|
|
|
- Philippa Thompson
- 10 years ago
- Views:
Transcription
1 Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 / Fabian Fischer Data Analysis and Visualization Group University of Konstanz
2 Data Preprocessing with & I wanted to visualize the log files with an visualization application written in Java developed for real-time event processing. To make use of this tool, we need some preprocessing: Normalize the timestamps to ISO format using Python scripting. Merge all log files into one chronological file using Bash. fischer@fischer-ubuntu:/mnt/fischer/sanitized_log$./convert.sh Importing and normalizing timestamps auth.log... -> sanitized_events.tmp.auth.log Importing and normalizing timestamps daemon.log... -> sanitized_events.tmp.daemon.log Importing and normalizing timestamps debug... -> sanitized_events.tmp.debug Importing and normalizing timestamps dpkg.log... -> sanitized_events.tmp.dpkg.log Importing and normalizing timestamps kern.log... -> sanitized_events.tmp.kern.log Importing and normalizing timestamps messages... -> sanitized_events.tmp.messages Importing and normalizing timestamps secure... -> sanitized_events.tmp.secure Importing and normalizing timestamps user.log... -> sanitized_events.tmp.user.log Importing and normalizing timestamps www-access.log... -> sanitized_events.tmp.www-access.log Importing and normalizing timestamps www-error.log... -> sanitized_events.tmp.www-error.log Importing and normalizing timestamps www-media.log... -> sanitized_events.tmp.www-media.log Sorting the output file based on timestamps... -> sanitized_events.log Removing temporary files... Fabian Fischer Data Analysis and Visualization Group University of Konstanz 2
3 Analyzing and Importing the Events All log lines (events) start with a proper timestamp after preprocessing. Let's write an analyzer module for our Java application: Read events from text files. Extract fields for hostname, process, Extract all IP addresses and make cached geo lookups. Apply scoring* for well-known errors & risks based on regular expressions and weighted average for similar messages. Create Java objects to represent events. Forward the events to the visual analytics tool for interactive exploration. fischer@fischer-ubuntu:/mnt/fischer/sanitized_log$ tail -5 sanitized_events.log T23:11:01 app-1 CRON[5319]: pam_unix(cron:session): session closed for user root T23:11:02 app-1 CRON[5316]: pam_unix(cron:session): session closed for user root T23:11:13 app-1 sudo: user1 : TTY=tty1 ; PWD=/var ; USER=root ; COMMAND=/bin/tar -cpzf log.tar.gz log T23:11:13 app-1 sudo: pam_unix(sudo:session): session opened for user root by user1(uid=0) T23:11:13 app-1 sudo: pam_unix(sudo:session): session closed for user root * in a real scenario we would have more data for peak, trend and pattern detection on the event stream. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 3
4 Event Visualizer The Event Visualizer is a visual analytics tool. It is a loosely coupled modular system for collecting, processing, analyzing and visualizing dynamic real-time event data streams. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 4
5 Explanations Real-Time System I was interested in the real-time use case, therefore I decided to stream the available log dumps into the system in real-time. Color does reflect the score, based on rules and simple "anomaly". Many observations can be made during visual exploration. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 5
6 Visualization is updated in Real-Time. (Log data is treated as "live stream") events on events on Interesting Observation: No log data for
7 Explanations Layout Algorithm The space available for each day is fixed, which is important for real-time analysis to have a static non-changing layout. If the number of events per day exceeds the available space, less important (lower score) events will be removed in favor of more important ones. The number of removed events is shown as label (e.g., "+296 events). Fabian Fischer Data Analysis and Visualization Group University of Konstanz 7
8 Interaction with the Timeline Interesting Observation: Configuration Problem? Binding problems of SSHD! (several occurrences) Selection of an event in timeline, will enlarge the selected event. show the tooltip with the full message. highlight other occurrences of this event in the timeline. draw connecting lines to easily spot occurrences on long timelines located outside the visible region. show the Event Details with a line chart for this event type. will extract IP addresses and will search all events and will highlight them in black.
9 Several Aligned Timeline Visualizations for Different Services Different Services/Programs: Each service has its own timeline. This reduces the number of changes and gives us more time for exploration. "Successful Logins" for example have their own timeline, because we are often interested in these.
10 Explanations Panning & Zooming The visualization is drawn to a Zoomable User Interface, which provides zooming & panning capabilities. While the data is incrementally loaded, we can start to explore the different timelines, by panning & zooming around. New data will be added on the right. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 10
11 Interesting Observation: MySQL does complain several times about accounts without password.
12 Common Cronjob Events plotted over Time Interesting Observation: There is much log data missing. We should definitely check our remote syslog server (not mentioned by FC5 winners). Maybe the attackers tried to wipe their traces?
13 Interesting Observation: High number of CMOS error messages on
14 Brute-Force Attacks from around the World
15 Which are the most popular nonexisting user names the attackers tried to login with? Where do successful logins come from?
16 Drill-Down and Area Selection loads all logins from the selected area
17 The Word Cloud can be loaded on demand Interesting Observation: The IP has successfully logged in, but it has hundreds of failed logins.
18 Investigation of successful brute-force attacks Automatic Highlighting of events with same IP address helps Interesting Observation: Events marked with black lines are from IP This IP has many brute-force attempts! We have successful logins. SUCCESSFUL COMPROMISED. The IP is a successful brute-force attacker.
19 Is legitimate user or attacker? Selected Event with IP Interesting Observation: Only 1 failed login from this IP address. Now we see, that the connecting lines make sense! If there were other login attempts on the days before or after, a horizontal line would give us the hint! The IP " " is probably a legitimate user!
20 Interesting Observation: is also a successful brute-force attacker!!! Selected Event with IP How to improve the visualization? The red rectangles are hard to distinguish. Let's Apply shading to the visualization, to emphasize outlines (next slide)
21 Interesting Observation: is also a successful brute-force attacker!!! Visual shading helps to distinguish events with the same scoring level (mapped to color).
22 Is legitimate user or attacker? Selected Event with IP Interesting Observation: No failed logins from this IP address, and we do have some legitimate web server requests. The IP is probably a legitimate user!
23 Is legitimate user or attacker? Selected Event having a high score and was a successful login. ssh failures failed passwords IP is a successful brute-force attacker!
24 Is legitimate user or attacker? Selected Event with IP Interesting Observation: This IP address has some failed logins and does log in successfully to several different user accounts. We want to investigate these events further. Load a word cloud and the raw messages (next slide).
25 Is legitimate user or attacker? Manual Inspection of events with this IP address. Sadly it is still not clear, what is going on
26 Is legitimate user or attacker? There was a new user generated which is called "dhg". If this was really done by an intruder (the responsible system administrator should know), the IP address is probably an attacker, because he used that account to log in to the server by SSH. Additionally in the user's home folder "psybnc" could be found. None of the FC5 winners mentions this IP address as intruder, so I could be wrong. However, it would actually make sense, that a real attacker does not use the IP address, which he uses for large brute-force attacks, to actually log in to the sytem! could still be a legitimate user is an attacker if "dhg" is not an official user account.
27 Is legitimate user or attacker? Selected event has a high score and was a successful login. The word cloud is obvious. This was a successful brute-force attack!
28 Is legitimate user or attacker? Selected Event having a high score and was a successful login. "root" was added to ignore list. Successful brute-force attacks. Most attempts to account "root", "oracle" and "guest".
29 Is legitimate user or attacker? Selected Event having a high score and was a successful login. Successful brute-force attack from
30 Changing the firewall settings is probably evil Several sudo commands changing the firewall settings (opening several ports). Later it seems to be that someone configured a http proxy. The iptable changes might have been the preparation steps (not mentioned by FC5 winners).
31 Interesting Patterns because of Color-Encoded Scores Interesting patterns (orange, light green, green) occur after a successful break-in. Log messages created by an installed IRC bot! At this point you should switch to a textual search. Because visualization SHOULD NOT replace traditional workflows completely. It should support and enhance the analysis task!
32 Switching from Visual Representation to Textual Data Searching the data reveals, when the bot has been installed.
33 More Interesting Patterns More Interesting patterns (orange, orange, green, green). This pattern does occur for a while, but is not present on all days. Based on the available data the reason cannot be identified. This was not mentioned by FC5 winners
34 More Interesting Patterns Many sefaults for SSHD. Reason is unclear There are much more interesting messages which can be interactively and visually explored.
35 Visualizing the Category for "User Changes" does reveal newly generated user accounts. Those accounts do have UID=0 and have root permissions (not mentioned by FC5 winners).
36 The Challenge Design and build a visualization that describes the attacks that were analyzed in FC5. As an example, the visualization may have a geographic element, represented as a map, link graphs, histogram, or parallel coordinates, that sheds light on the following: (1) Where the attacks came from? (2) The volumes of attacks originating from various locations? (3) The success or failure of these attacks? (4) The nature of the attacks ( primary and secondary phases)? (5) Can the attacks be color coded to describe groups of attacks/attackers? Use external data sources such as the many freely available geomapping databases. The output can be anything that you like - from a still image, to interactive flash/java, dynamically updating, dashboard style, magazine infographic, holograms are also accepted. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 36
37 Where do attacks come from? (10 points) Does only make sense in the interactive prototype, because the map can be explored. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 37
38 What is the most prolific attack? (5 points) Shown in the previous slides. All successful brute-force attacks are critical, because programs have been installed! The machine is compromised! Fabian Fischer Data Analysis and Visualization Group University of Konstanz 38
39 Which attacks were successful and which failed? (5 points) Shown in the previous slides. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 39
40 What assumptions were made and what was the reasoning? Don't be afraid to make assumptions! (5 points) Shown in the previous slides. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 40
41 What are the limitations of the visualization? (5 points) Already slightly discussed in the previous slides. The visualization will not show all data in time intervals with too many items. The time intervals can be changed from "days" to "hours", if there is too much incoming data. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 41
42 How could you improve the visualization if given more time and resources - e.g. on a future GSOC project? (2 points) First of all, I would provide a downloadable prototype. I had not enough time to modify the software, so that it could be published as open-source for public use. The intended setup is to make all analytics on the server side and not on the client machine running the visualizer. To solve the challenge, I ignored this recommended setup and included everything into the visualizer tool. This lead to scalability issues. To solve the challenge I kept the data in memory and haven't used MongoDB, which I use for real scenarios with the tool. The implementation of the visualizations should be heavily improved for larger amounts of data. Integration of OpenGL based visualization would increase scalability. If this would be a long-term project I would try to move the visual interface using the time line and scoring to a web-based system. I would probably try to connect to data from data sources stored in Loggly or Graylog2. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 42
43 Provide a description of the toolsets and scripts used (10 points) Many things have already been discussed. Custom scripts and a Java program used. The prototype is not available for public-use right now, because the framework is submitted to an event/data streaming conference for next year. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 43
44 Aesthetic appeal and ability to hold the subject's attention (5 points) The color scale can be changed. The used default color scale ("green yellow red") is not the best choice for all users. But it does represent the intuitive "importance" of an "red" event. The timeline can be explored, even many items are still incoming. Therefore, the analyst has time to smoothly switch between exploration and monitoring. Visual shadows are used as improvements. Many improvements could be made, of course. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 44
45 Interactivity, eg the ability to drill down, explore, or zoom in on events. (10 points) Fully functional. The main visualization is actually based on a zoomable user interface. Sadly, there was not enough time left to provide a video demonstration. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 45
46 Animation, particularly based on a timeline. (10 points) An interactive real-time timeline is integrated, which preserves the ordering up to a certain degree. The intended usage is real-time monitoring. Therefore depending on the amount of data, it is not possible to show everything. At one point the analyst can only take care of the most important events and has to trust the underlying analytics. Fabian Fischer Data Analysis and Visualization Group University of Konstanz 46
47 Creating a visualization which uncovers any trends, observations or artifacts which were not described in the FC5 prize winning solutions. (20 points) Mentioned in the previous slides Fabian Fischer Data Analysis and Visualization Group University of Konstanz 47
48 Creating a visualization that tells a story about the data set, threat environment, and the attack. (20 points) This visualizations do focus on visual exploration and not on visual presenting the data / attack to others. I had plans to include another type of visualization to visually "present" the attacks, but I started just a couple of days before the deadline, so time went out. ;-) Fabian Fischer Data Analysis and Visualization Group University of Konstanz 48
49 Thank you very much for your attention! Fabian Fischer Data Analysis and Visualization Group University of Konstanz 49
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
XpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.
Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation. Please consult this document before contacting atech Telecoms
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
Side-by-side Migration Guide for Snare Server v7
Side-by-side Migration Guide for Snare Server v7 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for
Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK [email protected] tel: +44 845 250 4470
Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle Introduction I ve always been interested and intrigued by the processes DBAs use to monitor
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Development of Monitoring and Analysis Tools for the Huawei Cloud Storage
Development of Monitoring and Analysis Tools for the Huawei Cloud Storage September 2014 Author: Veronia Bahaa Supervisors: Maria Arsuaga-Rios Seppo S. Heikkila CERN openlab Summer Student Report 2014
ASULPUNTO Magento unicenta opos integration extension Version 1.0.0
ASULPUNTO Magento unicenta opos integration extension Version 1.0.0 Magento unicenta opos Integration Extension Version 1.0.0 Page 1 Table of Contents Requirements...3 A working copy of unicenta opos on
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
ORACLE BUSINESS INTELLIGENCE WORKSHOP
ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING 1 CONTENTS About Zabbix Software... 2 Main Functions... 3 Architecture... 4 Installation Requirements...
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
SonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.8 Copyright Information 2004 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
With the purchase of ONSSI NetDVMS you have chosen an extremely powerful and intelligent surveillance solution.
Dear ONSSI Customer, With the purchase of ONSSI NetDVMS you have chosen an extremely powerful and intelligent surveillance solution. This Getting Started Administrator Guide will explain how to install
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Using WebLOAD to Monitor Your Production Environment
Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Quick Start Guide. www.uptrendsinfra.com
Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000
User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
Distance-Learning Remote Laboratories using LabVIEW
Distance-Learning Remote Laboratories using LabVIEW Introduction Laboratories, which are found in all engineering and science programs, are an essential part of the education experience. Not only do laboratories
Finding Anomalies in Time- Series using Visual Correla/on for Interac/ve Root Cause Analysis
VizSec 2013 October 14, 2013 Atlanta GA, USA Finding Anomalies in Time- Series using Visual Correla/on for Interac/ve Root Cause Analysis Florian Stoffel, Fabian Fischer, Daniel A. Keim Data Analysis and
New Relic & JMeter - Perfect Performance Testing
TUTORIAL New Relic & JMeter - Perfect Performance Testing by David Sale Contents Introduction 3 Demo Application 4 Hooking Into New Relic 4 What Is JMeter? 6 Installation and Usage 6 Analysis In New Relic
Dell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
AKCess Pro Server Management Software
Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Using DeployR to Solve the R Integration Problem
DEPLOYR WHITE PAPER Using DeployR to olve the R Integration Problem By the Revolution Analytics DeployR Team March 2015 Introduction Organizations use analytics to empower decision making, often in real
Server Account Management
Server Account Management Setup Guide Contents: About Server Account Management Setting Up and Running a Server Access Scan Addressing Server Access Findings View Server Access Scan Findings Act on Server
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
Case Study 2 SPR500 Fall 2009
Case Study 2 SPR500 Fall 2009 6 th November 2009 Due Date: 9 th December 2009 Securing Sotnec's web site using Linux Firewall technology Sotnec corporation, an Open Source Company, consists of a small
AIMMS The Network License Server
AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult
Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide
Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3
Manual. Sealer Monitor Software. Version 0.10.7
Manual Sealer Monitor Software Version 0.10.7 Contents 1 Introduction & symbols 1 2 Installation 2 2.1 Requirements 2 2.2 Installation process 2 3 Menu & Tooblar 5 3.1 File menu 5 3.2 Print menu 6 3.3
The SkySQL Administration Console
www.skysql.com The SkySQL Administration Console Version 1.1 Draft Documentation Overview The SkySQL Administration Console is a web based application for the administration and monitoring of MySQL 1 databases.
JMC Next Generation Web-based Server Install and Setup
JMC Next Generation Web-based Server Install and Setup This document will discuss the process to install and setup a JMC Next Generation Web-based Windows Server 2008 R2. These instructions also work for
PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT
PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT December 6, 2013 Julien Lavesque CTO Itrust [email protected] Security experts company founded
CMS Manual. Digital Video Network Surveillance System. Unisight Digital Technologies, Inc.
CMS Manual Digital Video Network Surveillance System Index Overview... 4 Datacenter...4 Run...4 Configuration...5 CMS Settings...9 Functions:...9 Components:...9 Device Manager...17 Functions:...17 Components:...17
Healthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
C-more Remote HMI App
Topic: CM630 C-more Remote HMI App SAFETY NOTICE: The C-more Remote HMI App allows the user to connect to remote C-more panels from Ethernet, Wi-Fi, or cellular network connections. The Remote user can
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
P6 Analytics Reference Manual
P6 Analytics Reference Manual Release 3.2 October 2013 Contents Getting Started... 7 About P6 Analytics... 7 Prerequisites to Use Analytics... 8 About Analyses... 9 About... 9 About Dashboards... 10 Logging
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
A) What Web Browser do I need? B) Why I cannot view the most updated content? C) What can we find on the school website? Index Page Layout:
A) What Web Browser do I need? - Window 7 / Window 8.1 => Internet Explorer Version 9 or above (Best in Version 11+) Download Link: http://windows.microsoft.com/zh-hk/internet-explorer/download-ie - Window
1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
orrelog Ping Monitor Adapter Software Users Manual
orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
Using New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
Test Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
idisplay v.2.0 User Guide
idisplay v.2.0 User Guide 2013 i3 International Inc. The contents of this user manual are protected under copyright and computer program laws. www.i3international.com 1.866.840.0004 CANADA 780 Birchmount
Alinto Mail Server Pro
Alinto Mail Server Pro Installation Guide Alinto Version 2.0.1 Index 1. Introduction....................................................................................... 1 2. Prerequisites......................................................................................
Jazz Source Control Best Practices
Jazz Source Control Best Practices Shashikant Padur RTC SCM Developer Jazz Source Control Mantra The fine print Fast, easy, and a few concepts to support many flexible workflows Give all users access to
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas
Analyzing large flow data sets using modern open-source data search and visualization tools FloCon 2014 Max Putas About me Operations Engineer - DevOps BS, MS, and CAS in Telecommunications Work/research
PIKA µfirewall Cloud Management Guide
Version 1.0 April 2015 Introduction... 2 Installation... 2 Configuring the Unit... 10 Changing Parameters... 10 Adding Blacklists and White lists... 12 Upgrading Firmware... 15 Disclaimer... 18 Frequently
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
How to Use Motion Detection in ACTi Cameras
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Application Model: All Firmware: N/A Software: N/A Author: Ando.Meritee Published: 2010/11/19 Reviewed: 2011/03/02 How to Use
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
PHP and MongoDB Web Development Beginners Guide by Rubayeet Islam
PHP and MongoDB Web Development Beginners Guide by Rubayeet Islam Projects-Oriented Book Combine the power of PHP and MongoDB to build dynamic web 2.0 applications Learn to build PHP-powered dynamic web
ST 810, Advanced computing
ST 810, Advanced computing Eric B. Laber & Hua Zhou Department of Statistics, North Carolina State University January 30, 2013 Supercomputers are expensive. Eric B. Laber, 2011, while browsing the internet.
February 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
Lab 0: Preparing your laptop for the course OS X
Lab 0: Preparing your laptop for the course OS X Four pieces of software are needed to complete this course: 1. VMD Views and analyses molecular models. 2. NAMD Performs molecular dynamics simulations.
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Introduction... 1. Connecting Via FTP... 4. Where do I upload my website?... 4. What to call your home page?... 5. Troubleshooting FTP...
This guide is designed to show you the different ways of uploading your site using ftp, including the basic principles of understanding and troubleshooting ftp issues. P a g e 0 Introduction... 1 When
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Special Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
Creating a DUO MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
Centerity Monitor Standard V3.8 USER GUIDE VERSION 7.14
Centerity Monitor Standard V3.8 USER GUIDE VERSION 7.14 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Chapter 1:
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
