2. Related Works. 3. Experimental Setup. 2.1 Vulnerability Detection Tools. 2.3 Previous work. 2.2 Literature Review. 3.1 Rangsit University Network
|
|
|
- Suzan Cummings
- 10 years ago
- Views:
Transcription
1 34 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 A Performance Evaluation of Vulnerability Detection: NetClarity Audito, Nessus, and Retina Sanon Chimmanee, Thanyada Veeraprasit, and Chetneti Srisa-An Rangsit University, Pathumthani, Thailand Summary Network vulnerability detection is used to determine the weaknesses of the network, risk assessment, and suggestions to resolve the problems. Basically, there are 2 types of vulnerability detection tools (Hardware and Software), which their cost are different. Thus, this paper is a performance comparison of vulnerability detection tools on the Rangsit University network and the Royal Thai Army network by using the hardware i.e., NetClarity Auditor, and software i.e., Open Source Nessus and Retina Network Security Scanner. There are three features for comparison as follows: 1) the searching ability, 2) the scanning time, and 3) the ability of vulnerability detection. From experiment, it is shown that 1) NetClarity Auditor gives the best in searching performance, 2) the scanning time of Nessus is the shortest, and 3) NetClarity Auditor is also the best in the ability of vulnerability detection. Key words: Vulnerability detection, NetClarity Audito, Nessus, Retina Network Security Scanner. 1. Introduction Network vulnerability detection is an important procedure to ensure that the organization network is secured. In information security for web-based applications, the detection and diagnosis of software vulnerabilities are important tasks for the user [1]. However, there are often significant differences in the content, organization, and format of different vulnerability reports [1-2]. CVSS is an open framework developed by National Institute of Standards and Technology for assessing vulnerabilities criticality across many disparate hardware and software platforms [3]. G. Corral et al. [4-5] proposed the distributed vulnerability detection system for wireless and intranet networks based on international best practices for security, the Open Source Security Testing Methodology Manual (OSSTMM). P. Zhang et al. [6] introduced a model of vulnerability detection system based on multiagent technology, and distributed network architecture was set up according to this model. Nessus, Retina, Snort, and other software-based are important tools for testing and monitoring or other components that are quite wide-spread these days [7]. Zhihong Tian et al [8] presented a Vulnerability-driven Active Alert Verification (VAAV) approach that performs real-time verification of attack detected by IDS. Kanchana [9] presented a performance comparison of intrusion detection software between SNORT and RealSecure under actual attacks in isolated Local Area Network. In [10], testing and comparing web vulnerability scanning tool for SQL injection and XSS attacks was presented. N. Antunes, and M. Vieira [11] proposed the comparing the effectiveness of penetration testing and static code analysis on the detection of SQL injection vulnerability in web services. A comparative study on software vulnerability static analysis techniques and tools was introduced by P. Li, and B. Cui [12]. Both hardware and software vulnerability detection tools are available but they have significantly difference in cost of investment. Thanyada Veeraprasit et al [13] introduced a performance comparison of NetClarity Auditor and Open Source Nessus Vulnerability Detection on Rangsit University Network. Sanon Chimmanee et al [14] investigated the performance comparison of these vulnerability detections on an additional site that is Royal Thai Army network. The main topic of this research is to compare between hardware and software tools in three dimensions, which are 1) the searching ability, 2) scanning time, and 3) the ability of vulnerability detection. There are two network sites for testing. First is the Rangsit University network and the other is the Royal Thai Army network. Each site consists of two zones (demilitarized zone and intranet zone). This paper adds another vulnerability detection that is Retina Network Security Scanner V Additional experiment is done on MTC zone 2 of Royal Thai Army network. From experiment, it is found that NetClarity Auditor is the best for the searching ability. Nessus is better than Retina Network Security Scanner for this feature. For scanning time, it can be seen that Nessus is the best performance. NetClarity Auditor has a better performance than Retina. For the ability of vulnerability detection, NetClarity Auditor is also the best performance. Retina is better than Nessus. From overall, NetClarity Auditor should be preferred. However, the cost of investment for NetClarity Auditor is the highest. The rest of this paper is organized as follows. Section II provides related works. In section III, experiment setup is stated. Section IV provides the performance evaluations. Section V gives conclusions and future work. Manuscript received March 5, 2014 Manuscript revised March 20, 2014
2 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March Related Works There are two major experiments: First is done at Rangsit University and the other is done at the Royal Thai Army. 2.1 Vulnerability Detection Tools Typically, there are two types of the vulnerability detection tool: Hardware-based, and Software-based. NetClarity Auditor based on hardware is one of popular vulnerability detection tool [13]. However, its cost is high. Open source Nessus based on software is the world's most popular vulnerability scanner, which is needed to install on the computer [15],[16]. Additionally, Nessus scanners may be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks [16]. It is free of charge for personal use in a non-enterprise environment [15]. Commercial organizations that deploy the Nessus vulnerability scanner have to purchase a Nessus ProfessionalFeed [16]. Retina CS is also softwarebase, which is a free vulnerability scanner for up to 256 IPs gives you powerful vulnerability assessment across your entire environment [17]. 2.2 Literature Review Snort is one of popular Intrusion Detection systems (IDS) since it is open-source software. IDS has been considered the second line of defense for computer and network systems along with prevent-based techniques e.g., access control [8]. Kanchana [9] evaluated a performance of IDS between Snort and RealSecure under actual attacks in isolated Local Area Network. From experiments, it is found that both IDS tools are similar performances and characteristics, as well as, CPU utilization. However, there are slightly differences in response time and accuracy. SNORT can detect faster but RealSecure is more accurate. Moreover, the performances of both systems will be reduced when there are mix of multiple attacks and background data. This results in a high fault alerts. Zhihong Tian et al [8] presented a Vulnerability-driven Active Alert Verification called as VAAV approach that performs real-time verification of attack detected by IDS. The proposed VAAV attempts to address the aforementioned shortcomings in current IDSs. It can be considered as a finite state machine. The role of VAAV is designed on base of Snort. Nessus, Retina, Snort, and other are important tools for testing and monitoring or other components that are quite wide-spread these days [7]. Pavel Vachek [18] proposed the developed interface that allows users to perform basic host security audits simply and securely for Nessus running on a PC sever under Linux operating system. G. Corral et al. [4],[5] discussed the issues related to vulnerability assessment in wireless networks. They proposed a new distributed system to analyze system interactivity, security capability and vulnerability detection in wireless networks. The designs and implementations were also presented. This research was based on international best practices for security, the Open Source Security Testing Methodology Manual (OSSTMM). P. Zhang et al. [6] presented a model of vulnerability detection system based on multi-agent technology, and the distributed network architecture was set up according to this model. By demonstration of the communication mechanism of the agent model, and the simulation of the network node s sending data packages, it is proved that the model can reduce time of detecting network and processes of hosts, and can ensure intranet s security. 2.3 Previous work There are four previous works about Vulnerability Detection by authors. In [13], Thanyada Veeraprasit et al. implemented NetClarity Auditor and Nessus on Rangsit University network in order to find vulnerability of the network and performance comparision. Then, Aniwat Hemanidhi, Sanon Chimmanee, and Prarinya [19] also deployed such vulnerability detection tools on Rangsit University network for finding vulnerability of the network. Network Risk Metric was proposed in order to evaluate a security risk level of the network based on information from such vulnerability detection tools. Consequently, Sanon Chimmanee et al. evaluated performance of such vulnerability detection tools on both Rangsit University and Royal Thai Army network [14]. Aniwat Hemanidhi, Sanon Chimmanee, and Prarinya. deployed the proposed Network Risk Metric in order to evaluate security risk level on Royal Thai Army network [20]. 3. Experimental Setup There are two major experiments: First is done at Rangsit University and the other is done at the Royal Thai Army. 3.1 Rangsit University Network As shown in a Fig. 1, Rangsit University Network is separated into three zones including: internet, intranet, and demilitarized zones. In this paper, two zones are chosen, demilitarized zone (DMZ) and intranet zone. There are two vulnerability detections on Rangsit University Network: NetClarity Auditor (Version 8.1.3), and Open Source Nessus HomeFeed (Version 5.0.1) installed in a computer notebook called as Nessus notebook in this paper. The experiments were done in the DMZ and the intranet zone during two days of working hours.
3 36 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 hosts. There are four colors which represent four levels of risk. Details of risk definition are listed in Table 1. Fig. 1 Network Diagram of Rangsit University. NetClarity, Nessus, and Retina need to be configured in a proper manner before the vulnerability detection procedure can take place. IP address of the auditor must be set within the same subnet of the target network. A range of investigated IP addresses is required. In this experiment, the target network of DMZ is XXX.YYY.184.0/24 and the target network of intranet zone is XXX.YYY.118.0/23. Fig. 2, Fig.3 and Fig. 4 show the configuration of these vulnerability detection tools, respectively. Fig. 4 The configuration of vulnerability detection with Retina Network Security Scanner referred from ( Fig. 2 The configuration of NetClarityVulnerability Auditor. Fig. 5 Example of the outcome of vulnerability detection with NetClarity Auditor. Fig. 3 The configuration of vulnerability detection with Nessus. For comparison, experimental results are divided into three features including: 1) the searching ability, 2) the scanning time, and 3) the ability of vulnerability detection. Fig. 5, 6 and Fig. 7 display the outcome of the vulnerability detection with NetClarity Auditor, Nessus and Retina, respectively. The horizontal axis represents a number of the vulnerability. The vertical axis represents Fig. 6 Example of the outcome of vulnerability detection with Nessus.
4 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March the CISCO Core Switch-L3. They are MTC network zone 0, 1, and 2 as shown in Fig. 8. Fig. 7 Example of the outcome of vulnerability detection with Retina Network Security Scanner referred from ( SecurityScanner/) Table 1: Risk level of each vulnerability types classifies by NetClarity [12]. Risk Vulnerability Type Level Low Medium Risk Level High Serious Less important vulnerability - harder to exploit and usually causes little or no damage to your network assets. Slightly more important than a Lowlevel vulnerability but usually hard to exploit. Medium level vulnerabilities Vulnerability Type might allow an attacker to gain access to your network. Very important vulnerability that may be easy to exploit and allow an attacker to cause serious damage to your network. Extremely important vulnerability that may be easy to exploit and allow an attacker to cause critical damage to your network. 3.2 The Royal Thai Army Network There are many types of data communication networks in the RTA. The MTC has responsible on several major networks including gateway that link to the internet/extranet. For security reason, the network diagram of the RTA will not be described in depth on this paper. Nevertheless, it is necessary to show some details of the MTC network diagram used in this research. In the overview, there are three main network zones connected to Fig. 8 Network Diagram of the Military Technology Center (MTC). The Thai Army network configuration is the same direction as the Rangsit University network configuration in subsection 3.1. There are two vulnerability detections on MTC zone 1 like on the Rangsit University network. Additionally, there are three vulnerability detections on MTC zone 2: NetClarity Auditor (Version 8.1.3), Open Source Nessus HomeFeed (Version 5.0.1), and Retina Network Security Scanner V installed in the HP desktop call as Retina Computer in this paper. 4. Performance Evaluation 4.1 Experimental Result of Rangsit University Network There are two main experimental results for DMZ and intranet zones. In DMZ, a summary of the found active hosts and scanning time are shown in a Table 2. Also, the total detected vulnerabilities are represented in Fig. 9 and 11. It is found that the scanning time of Nessus is shorter than NetClarity Auditor up to times. For the searching ability, it is shown that the number of active hosts is the same for both NetClarity Auditor and Nessus. This means that the searching performance of NetClarity Auditor and Nessus are approximately the same. For the ability of vulnerability detection, it is found that NetClarity Auditor has a better performance than Nessus times.
5 38 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 Tool Active Host Time (h:m:s) NetClarity Auditor 26 1:36:04 Nessus 26 0:36:30 Fig.11 The total detected vulnerabilities on Rangsit University network in DMZ. Table 3: A summary of performance comparison of the vulnerability detection on Rangsit University network in the intranet zone. Tool Active Host Time (h:m:s) NetClarity Auditor 39 3:19:21 Nessus 21 0:52:15 Fig. 9 shows the details of vulnerabilities in individual risk of each Host from NetClarity Auditor in DMZ. Fig. 12 The total detected vulnerabilities on Rangsit University network in Intranet zone. Fig.10 shows the details of vulnerabilities in individual risk of each Host from Nessus in DMZ. Table 2: A summary of performance comparison of the vulnerability detection on Rangsit University network in DMZ.4.2 Experimental Result of Rangsit University Network. The found active hosts and scanning time on the intranet zone of Rangsit University network is listed in Table 3 and the total detected vulnerabilities are shown in the Fig. 10 and 12. It is show that Nessus uses shorter time to detect actives host and vulnerabilities than NetClarity Auditor about times. Somehow, NetClarity Auditor shows a better searching performance than Nessus up to times since it can find more host than Nessus. Finally, NetClarity implies better ability of vulnerability detection over Nessus about times by the total number of detected flaws. From this point of view, NetClarity and Nessus represent different number of found vulnerabilities in each risk level because they tied their detecting ability among various different standards.
6 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March Experimental Result of the Royal Thai Army Network In this experiment, two network zones of the MTC are discovered as the representative network of the Royal Thai Army (RTA). From the MTC zone 1, the found active hosts and scanning time are listed in Table 4 and the total detected vulnerabilities are represented in Fig. 13. It is found that scanning time of Nessus is shorter than NetClarity Auditor up to times. NetClarity Auditor shows better searching performance than Nessus up to times and implies better ability of vulnerability detection over Nessus about times. Table 4: A summary of performance comparison of the vulnerability detection on the MTC zone 1 of the Royal Thai Army Network. Time Tool Active Host (h:m:s) NetClarity Auditor 14 1:37:06 Nessus 13 0:45:18 Fig. 13 The total detected vulnerabilities on the MTC zone 1 of the Royal Thai Army network. Next shown in Table 5 is the performance comparison of the vulnerability detection on the MTC zone 2. Table 5: A summary of performance comparison of the vulnerability detection on the MTC zone 2 of the Royal Thai Army Network. Time Tool Active Host (h:m:s) NetClarity Auditor 26 1:34:55 Nessus 11 0:22:09 Retina Network Security Scanner 10 7:34:53 Fig. 14 The total detected vulnerabilities on the MTC zone 2 of the Royal Thai Army network. From the Table 5, it is found that Nessus is the best for the scanning time. It uses a shorter time to detect actives host and vulnerabilities than NetClarity Auditor about times. NetClarity Auditor is better than Retina Network Security Scanner up to times. For searching ability, it can be seen that NetClarity Auditor is the best performance. It is better than Retina Network Security Scanner up to 2.6 times. Nessus has a better performance than Retina up to 1.1 times. For the ability of vulnerability detection as shown in Fig.8, NetClarity Auditor is also the best performance. It is better than Retina Network Security Scanner up to 1.84 times and better than Nessus up to times. From this point of view, NetClarity Auditor, Nessus, and Retina Network Security Scanner represent different number of found vulnerabilities in each risk level because they tied their detecting ability among various different standards. The comparison of vulnerability detection from NetClarity and Nessus on the Rangsit University networkis and the Royal Thai Army network are shown in the following Table 6. Table 6: The comparison of two vulnerability detection tools, NetClarity Auditor and Nessus, on Rangsit University and the Royal Thai Army. Basis of Detail comparison The searching ability The scanning time Ability of vulnerability detection 5. CONCLUSION NetClarity Auditor gives a better searching performance than Nessus. The scanning time of Nessus is shorter than NetClarity Auditor. NetClarity Auditor introduces a better ability of vulnerability detection than Nessus. In DMZ of the Rangsit University network, the scanning time of Nessus is shorter than NetClarity Auditor times. During the scanning, both of them could find the same amount of active hosts. However, NetClarity Auditor gives a better searching performance than Nessus times. In intranet zone, the scanning time of Nessus is shorter than NetClarity Auditor times but NetClarity Auditor gives a better searching performance than Nessus times. It also introduces a better ability of vulnerability detection than Nessus times. From the MTC zone 1 of the Royal Thai Army Network, the scanning time of Nessus is shorter than NetClarity Auditor up to times. NetClarity Auditor shows better searching performance than Nessus up to times and implies better ability of vulnerability detection over
7 40 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 Nessus about times. In the MTC zone 2, Nessus uses shorter time to detect actives host and vulnerabilities than NetClarity Auditor about times. NetClarity Auditor shows better searching performance than Nessus up to times and implies better ability of vulnerability detection over Nessus about times. From MTC zone 2 of the Royal Thai Army Network, it is found that NetClarity Auditor is the best for the searching ability. Nessus is better than Retina Network Security Scanner for this feature. For scanning time, it can be seen that Nessus is the best performance. NetClarity Auditor has a better performance than Retina Network Security Scanner. For the ability of vulnerability detection, NetClarity Auditor is also the best performance. Retina Network Security Scanner is better than Nessus. In summary, NetClarity Auditor has a better performance than Nessus and Retina Network Security Scanner. However, the cost of investment for NetClarity Auditor is significantly higher than Nessus and Retina Network Security Scanner. The security metric of evaluation the vulnerability from several tools will be studied in the future work. Acknowledgments Author thanks Aniwat Hemanidhi for his supports. References [1] Peter KokKeongLoh, and Deepak Subramanian, Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting, IEEE Transaction on Information Forensics and Security, Vol. 5, No. 4, December [2] DHS National Security Division, NIST, Web Application Vulnerability Scanners [Online]. Available: bility_scanners [3] GolnazElahi, Eric Yu, and Nicola Zannone, Security Risk Management by Qualitative Vulnerability Analysis, IEEE, Third International Workshop on Security Measurements and Metrics, [4] G. Corral, X. Cadenas, A. Zaballos, and M. T. Cadenas, A Distributed Vulnerability Detection System for WLANs, IEEE, the First International Conference on Wireless Internet (WICON'05), Hungary, July [5] G. Corral, A. Zaballos, X. Cadenas, and A. Grane, A Distributed Vulnerability Detection System for an Intranet, IEEE, the 39th annual 2005 international carnahan conference, [6] P. Zhang, J. Shang, and Z. Liang, Application of Multi- Agent Model in Vulnerability Detection System, IEEE, First IEEE International Symposium, [7] MIROSLAV VOZNAK, FILIP REZAC,"SIP Threats Detection System", 9th WSEAS International Conference on DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO'10), Universtiy of Algarve, Faro, Portugal, November 3-5, 2010 [8] Zhihong Tian, Binxing Fang, Bin Li, Hongli Zhang, A Vulnerability-Driven Approach to Active Alert Verification for Accurate and Efficient Intrusion Detection, WSEAS TRANSACTIONS on COMMUNICATIONS", Issue 10, Volume 4, October 2005, pp , ISSN [9] Kanchana Silawarawet, The comparision of network intrusion detection system between SNORT and RealSecure under attack, Thesis, Master of Science, Chulalongkorn University, Thailand, [10] J. Fonseca, M. Vieira, and H. Madeira, Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks, IEEE, 13th IEEE International Symposium on Pacific Rim Dependable Computing, [11] N. Antunes, and M. Vieira, Comparing the effectiveness of penetrating testing and static code analysis on the detection of SQL injection vulnerabilities in web services, IEEE, 15th IEEE Pacific Rim International Symposium on Dependable Computing, [12] P. Li, and B. Cui, A comparative study on software vulnerability static analysis techniques and tools, IEEE, Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, [13] Thanyada Veeraprasit, Kritsada Sriphaew, and Sanon Chimmanee NetClarity Auditor and Open Source Nessus Comparison for Vulnerability Detection on Rangsit University Network, The 1st Mae Fah Luang International Conference 2012 (MFUIC 2012), Thailand, [14] Sanon Chimmanee, Thanyada Veeraprasit, Kritsada Sriphaew, and Aniwat Hemanidhi Peformance Comparisionof Vulnerability Detection betweennetclarity Auditor and Open Source Nessus, WSEAS Proceedings of the 3 rd European Conference of Communications (ECCOM 12), Paris, France, December 2-4, 2012.pp [15] [16] [17] [18] Pavel Vachek, "CESNET Audit System", Proceedings of the 13th WSEAS International Conference on COMPUTERS, Rodos, Greece, July 22-25, 2009 [19] Aniwat Hemanidhi, Sanon Chimmanee, Prarinya Sanguansat, Network Risk Evaluation from Vulnerability Detection Tools for IT Department of the Royal Thai Army, The 1st Mae Fah Luang International Conference 2012 (MFUIC 2012), Thailand, [20] Aniwat Hemanidhi, Sanon Chimmanee, Prarinya Sanguansat, Risk Evaluation by Vulnerability Detection Tools for IT Department of the Royal Thai Army, Proceedings of the 13th WSEAS International Conference on COMPUTERS, Rodos, Greece, July 22-25, 2009, pp
8 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March Sanon Chimmanee received B.Eng. degree in Electrical Engineering, Rangsit University, Thailand in 1996 and M.S. degree in Telecommunications Science and Computer Network Engineering, South Bank University, London in 1998 and Ph.D. degree in Sirindhorn International Institute of Technology (SIIT), Thammasat University, Thailand in He is now with Rangsit University, Thailand as Assistant Professor in Faculty of Information Technology. He is also Director of MSITM-online program. Thanyada Veeraprasit received B.Eng. degree in Telecommunication Engineering, Suranaree University of Technology, Thailand in 2004 and M.S. degree in Master of Science Program in Information Technology Management, Rangsit University, Thailand in She is now with Samart Communication Services Co., Ltd. in Thailand as Network Engineer. Chetneti Srisa-An received B.Eng. degree in Electrical Engineer, Chiangmai University, Thailand and MBA (Finance) Loyola University of Chicago, USA. He got MSCS (Computer Science) and Ph.D. (Computer Science) lllinois Institute of Technology, USA. He is now with Rangsit University, Thailand as Assistant Professor in Faculty of Information Technology.
A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus
A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus SANON CHIMMANEE, THANYADA VEERAPRASIT, KRITSADA SRIPHAEW, ANIWAT HEMANIDHI Faculty of Information Technology
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
eeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
Securing PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario M. Durai Ganesh (Research Scholars) Information Technology, St. Peter s University, Chennai- 54, Tamil Nadu, India Dr. G.Gunasekaran,
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
How To Manage A System Vulnerability Management Program
System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
Web Vulnerability Detection and Security Mechanism
Web Vulnerability Detection and Security Mechanism Katkar Anjali S., Kulkarni Raj B. ABSTRACT Web applications consist of several different and interacting technologies. These interactions between different
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
VEA-bility Analysis of Network Diversification
VEA-bility Analysis of Network Diversification Melanie Tupper Supervised by Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University [email protected] [email protected] August 31, 2007 Abstract:
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER
A C a s e s t u d y o n h o w Z e n Q h a s h e l p e d a L e a d i n g K - 1 2 E d u c a t i o n & L e a r n i n g S o l u t i o n s P r o v i d e r i n U S g a u g e c a p a c i t y o f t h e i r f l
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
The Devils Behind Web Application Vulnerabilities
The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Identification of File Integrity Requirement through Severity Analysis
Identification of File Integrity Requirement through Severity Analysis Zul Hilmi Abdullah a, Shaharudin Ismail a, Nur Izura Udzir b a Fakulti Sains dan Teknologi, Universiti Sains Islam Malaysia, Bandar
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
Security and Vulnerability Issues in University Networks
, July 6-8, 2011, London, U.K. Security and Vulnerability Issues in University Networks Sanad Al Maskari, Dinesh Kumar Saini, Swati Y Raut and Lingraj A Hadimani Abstract The paper deals with security
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Framework for Injecting the Attacks and Analyzing the Behaviour of Vulnerability on Server s
Framework for Injecting the Attacks and Analyzing the Behaviour of Vulnerability on Server s Panchamukesh Ch #1, Kumar.J *2, Neelima.S *3, Sailaja.D *4 #1 Department of CSE, HITAM, Gowdavally, Hyderabad,
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
A Study on the Security aspects of Network System Using Penetration Testing
A Study on the Security aspects of Network System Using Penetration Testing 1 Shwetabh Suman, 2 Vedant Rastogi 1,2 Institute of Engineering and Technology, Alwar, India 1 [email protected] 2 [email protected]
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015
QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
Network Security Using Hybrid Port Knocking
8 Network Security Using Hybrid Port Knocking Dr. Hussein Al-Bahadili and Dr. Ali H. Hadi, Arab Academy for Financial Sciences, faculty of Information Technology, Amman Jordan Arab Academy for Financial
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
How To Perform An External Security Vulnerability Assessment Of An External Computer System
External Vulnerability Assessment -Executive Summary- Prepared for: ABC ORGANIZATION On March 9, 2008 Prepared by: AOS Security Solutions 1 of 5 Table of Contents Executive Summary... 3 Immediate Focus
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Intrusion Log Sharing University of Wisconsin-Madison
Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt ([email protected]) Jason Franklin ([email protected]) Mary Vernon ([email protected]) 1 Talk Outline Background: Blacklists,
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Running head: USING NESSUS AND NMAP TOOLS 1
Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July 2010. Network Security 08
Network Security (Principles i & Practices) Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ By: Arash Habibi Lashkari July 2010 1 Introduction to Network Security Model of Network
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
SCOPING QUESTIONNAIRE FOR PENETRATION TESTING
SCOPING QUESTIONNAIRE FOR PENETRATION TESTING PathMaker Group adheres to the OSSTMM penetration testing methodology and code of ethics regarding this level and classification of test. The analysts performing
