IMPLEMENT WEB ATTACK DETECTION ENGINE WITH SNORT BY USING MODSECURITY CORE RULES
|
|
|
- Cecily Bates
- 10 years ago
- Views:
Transcription
1 The E-Learming and Information Technology Symposium Tainan, TAIWAN, 1 April, 2009 IMPLEMENT WEB ATTACK DETECTION ENGINE WITH SNORT BY USING MODSECURITY CORE RULES Chung-Huang Yang and Chung-Hsiang Shen * Graduate Institute of Information and Computer Education, National Kaohsiung Normal University Kaohsiung, TAIWAN [email protected] Abstract. In the Web 2.0 generation, network system faced the racket - Web attack. Traditional network security devices like Firewall and Intrusion Detection System deal can hardly confront the threat of Web attacks since Hackers often use multi-level or multi-type encoding attack to evade Intrusion Detection Systems. The Intrusion Detection System usually uses the attack signature and Regular Expression to detect web attack, but with limited efficiency. The open source Web Application Firewall ModSecurity could use Core Rule to detect SQL Injection, Cross Site Scripting, Insecure Direct Object Reference and Cross Site Request Forgery attacks. The purpose of this paper is provide the ability of web attack detection for Snort by implementing the web attack detection engine using the Core Rule Sets of ModSecurity. Keywords: Intrusion Detection System, Web attack, Web Application Firewall, Regular Expression. 1 INTRODUCTION In this network generation, many kinds of resources and services are provided by the Internet is popular, such as e-shopping, business transactions and on-line game industries. However, the more convenient it is, the more danger it brings. For example, cyber-crimes occur frequently in on-line games, customer information of Citibank leaked out and cyber bank robbery happened to one of the domestic bank. Therefore, enterprises have deployed many kinds of network security facilities like Honeypot, Intrusion Detection System (IDS), and Firewalls. When the network system suffers from attacking, it relies on some devices like Intrusion Detection System (IDS) to monitor the network behaviors and to analyze the attack methods. By the report from IDS, system administrators are able to fix the insufficiencies and to tighten the security of the system. In the Web 2.0 generation, network companies have offered many web services like web page space, web album, blog, etc. Everyone can leave personal opinions to wherever one has browsed on the Internet, which brings a new type of attack, the Web attack. According to Gartner s report, network attacks using the weaknesses of Operation Systems, Applications or Protocols have turned to Web attacks, which are 75% of all attack activities. However, the ability of Intrusion Detection System to detect various and flexible Web attack activities is limited. For example, the widely spread forged to be from CNN in August 2008, contained the Phishing site, Flash malware and BOT NET. Tradition Intrusion Detection System using Regular Expressions to pattern matching attack signatures becomes inefficient and useless when it comes to those smart Web attacks. The Open Source Web Application Firewall, ModSecurity, which uses rule based analysis engine, is more flexible than pattern matching signature. Recent Web attack methods usually use multi-level or multi-type encoding to avoid being detected. Therefore the IDS could not make correct analysis on HTTP Requests with bad intention. On the contrary, by using Core Rule of ModSecurity, one could effectively detect the SQL Injections, Cross Site Scripting, Insecure Direct Object References and Cross Site Request Forgery from the Web attacks. The purpose of this paper is to use the Core Rule architecture of ModSecurity and to modify Snort preprocessor to load Core Rule to detect above malicious Web attack behaviors.
2 2 RELATED WORKS 2.1 The History of Intrusion Detection System The beginning of Intrusion Detection System is from the government and Ministry of Defence in 1980s [4]. The purpose of the system is to monitor network malicious behavior and was popular in the market in mid-1990s. 2.2 The philosophy of Intrusion Detection System designs The Intrusion Detection Systems can be divide into 3 types according to it s design [4,12] : Network-based intrusion detection system It uses sniffer mode to capture packets transferring in the internet. Then, put it into to the built in export system for pattern match. Therefore, it needs powerful computing capability, so most enterprise Intrusion Detection System sales in Hardware devices. The advantage is: Deployment easily: Network Intrusion Detection System using passive mode to sniffer packets from the LAN and analysis them. Lower cost: In large network environments just only deploy a few Sensors to monitor the area. Large area: In sniffer mode it could monitor the large areas for abnormal activities, the area is bigger than Host Intrusion Detection System. Host-based intrusion detection system It is used to monitor critical Host systems by checking the users, system activities and attack behavior in the host. The Advance HIDS also provides Policy auditing, Access Control, Data Forensics ability. The advantage is: The more detail the logging data is, then more effect. Because it monitors the host system logs. Network-node Intrusion Detection System Also called as Distributed Intrusion Detection System; the processing method is the same with Network-based Intrusion Detection Systems. The difference is DIDS will forward logs to a backend management analysis platform. It is more suitable with lager network environments. The Intrusion Detection Systems could divide to 3 types according to the detect mechanisms used [5, 10] : Signature-Based Intrusion Detection System The signature is to analyze previous attacked information by experts. It is based on pattern match with packet and signature. The advantage is: It could detect known attack, low false alarms, and more efficient and the disadvantage is it could not detect unknown attack, and needs to update the signature database frequently. Anomaly-Based Intrusion Detection System It uses the built in normal communication model to analyze, when against the model then justices to anomalous. The advantage is: It could detect unknown attack method, but the disadvantage is the false alert alarms higher and less effort. Hybrid Intrusion Detection System It combines Signature-based and Anomybased characters. It is the future trend. 2.3 Web Attack According to Gartner s research report, in more than 300 websites they have analyzed, 97% are with security weakness. And 75% attacks are on application level. In the OWASP 2007 report, there are 10 major security weaknesses in the Web attack methods, and here are those related to program coding [14] : Cross Site Scripting [5] By using unchecked input attributes, cause of hackers could embed executable malicious code. It may be embedded with Trojan or directed to a phishing site. Injection Flaw By the weakness of unchecked input attributes, hackers could modify unauthorized access command or database. On some special environment, then even may obtain system administrator privilege. It is often used Drive-by Download method. Malicious File Execution It is an imperfection from web system design and may cause remote malicious codes to be executed remote malicious code. It usually happens on PHP based Webpages. Insecure Direct Object Reference Because of the defect in the system function design of file reading, hackers could arbitrarily access files under any paths. This threat may cause the exposure of major system files. For example, the password file would lead to accounts and passwords hacked, and hackers would get the system administrator privilege. Cross Site Request Forgery It is based on the Cross Site Scripting extends attack method. Hackers inject the malicious code, causing unauthorized code to automatically get executed on an authorization user id. Why is the detection of web attack so difficulty [5]? When the weaknesses exist
3 in web applications, attacks from hackers are normal http requests, and they could penetrate firewalls and evade Intrusion Detection System without making alerts. Besides attack methods today usually use multi-level or multi-type encoding to evades Intrusion Detection Systems. As a result, there are certain related detection solutions heuristic [15], statistics [3,8], Data Mining [9], Attack Graph [10] etc. 3 SYSTEM DESIGN AND IMPLEMENTATION 3.1 Snort Snort is a lightweight Intrusion Detection System developed by Marty Roesch in 1998 [2,16]. It is open source and has good processing effect, and is also the most popular Intrusion Detection System in Open platform. The most importance issue in the Signature-based Intrusion Detection System fields is the requirement of frequentlyupdated signature database. Snort has a customized rule set language. Users could construct the signature database they demand once familiar with the language. The system architecture is illustrated in Figure 1. Figure 1. System architecture Packet Decode Snort uses PCAP library to capture the packets transferred/received in the LAN in which contain the captured time, packet length, and link type (for example: Ethernet, FDDI etc.). It also creates a pointer pointing each packer for efficient analysis. With the inline mode, it has additional function of firewall such as packet transfer, packet modification, rejecting specific packets or dropping them. Preprocessor After packets are captured, Snort will transfer them to Preprocessor for packet repacking and normalizing based on the format of each protocol. The preprocessor also analyses statistics of the network traffic and detects unregulated attacks such as deny of service and worms. Detection engine The detection engine is the core of Intrusion Detection System. Users could download the signature database from the official website. With suitable settings detection of network attacks can be effective. If the system the packet captured matches any signature pattern, the system will alert an attack alarm to audit logs. Audit Logs When the system determine attacked, it will generate logs and make an alert containing related information of the attack for the administrator to remove the attack. Snort has 2 mechanisms for alerts, Event Queue and Thresholds. When an attack happens and violates multiple rules, it would generate alerts in the order of the priorities defined for each rule in advance. Therefore the administrator gets to exclude less urgent items with Event Queue. The Threshold mechanism is to generate only one alert when a huge amount of the same attack behaviors happen in a short time. It is helpful when Deny of Service or the worm attack happens, which often causes lots of alerts, to decrease the same alerts and to simplify the complexity of tracking the source of attacks. Output Module Snort supports various output modules for users to choice from under different environments and objects. Default Logging SNMP traps XML Logging Syslog SMB Alerting PCAP logging SnortDb Unified Log 3.2 ModSecurity The open source Web Application Firewall ModSecurity is developed by Ivan Ristic [1, 13]. It adopts rule-based detection engine which is more flexible than regular expression detection engine. Therefore ModSecurity is effective on detecting more kinds of Web attacks, such as SQL Injection, Cross Site Scripting, Insecure Direct Object Reference and Cross Site request Forgery.
4 3.3 Web attack detection engine implementation The signature database of Snort is constructed by protocols and keywords. Then, it uses PCRE library for regular expression pattern matching which has better effect on specific signature attacks than on elastic Web attacks. Therefore, the purpose of this paper is to construct a Web attack detection engine by modifying the preprocessor of Snort Http Inspect to be able cooperate with the Core Sets of ModSecurity. The development environment is under Windows XP using GCC (built-in MinGW 5.1) for implementation of the following functions. The functions are illustrated in Figure 2. Figure 2. Diagram of Implementation Steps Normalization Since the web server log is taken as input data, which Snort could not analyze directly this paper uses off-line mode to analyze collected web server logs. First, preprocess the web server based on Apache and IIS format to get full URLs, and then put them in the Web attack engine for analysis. URL decode Before the browser sends a HTTP Request, it would first encode some symbols and Chinese words. Therefore, it should be decoded before the analysis, which would lower false alert rate of the system. At the meanwhile, hackers usually use multi-type encoding methods to encode the malicious codes evades Intrusion Detection Systems. This function would decode URLs and then determine those that still contain encoded URLs to be Web attacks. Examining White List Many kinds of web servers have special http request pattern and different search engines such as Google, Yahoo, Msn and Baidu spiders. They can by add into the white list in the first place to speed up the analysis them, as well as those that are similar to malicious attacks but normal Http request. Examining Black List Collect known malicious web sites for black list [7,11]. They are usually presented as normal files likes as js, css, and other text files, or malicious binary files that contains shell codes such as gif, ppt and pdf etc. The malicious files could not be analyzed by simply examining the HTTP Requests. They need to be examined by further analysis of their behaviors. Therefore, this research refers to the black list released from web security forums. If an http request contains web sites in the black lists, it will be determined a Web attack. The advantage is low false alert rate, but it could not detect an unknown malicious web site automatically. Examining Http Request This function mainly implements the ability to recognize the attacks toward the four major web application vulnerabilities from OWASP 2007, which include SQL Injection, Cross Site Scripting, Insecure Direct Object Reference and Cross Site Request Forgery. For example, the Web Shell detection function. When a user uploads data with web programs, such as ASP, PHP or JSP, etc., this can be determined a Web Shell attack. Table 1 shows the Attack keywords in the detect engine. Table 1 shows the Attack keyword in the detect engine. Table 1. Attack keywords Function Keywords is_sql_injection() or, --', '--, and, exec, select, insert, update, delete, drop, where, dbo, cast(, char(, union is_xss() javascript, <scrip, /script>, document.write, document.cookie, url(, eval(, expression(, <object, onload, onmouseover, onerror,, windows.open, <iframe, function,.location, (', ); is_idor().ini,./., \\..,..,.swf?, boot.ini, etc/, /passwd is_webshell() <form, <%, <?, <php,
5 %>,?>, php>, action Table 2. Unknown attack analysis results Date Normal SQL Injection XSS Insecure Direct Web Shell Encoding Total Object Reference DAY1 522, , ,393 DAY2 137, , ,247 DAY3 357, ,908 DAY4 126, ,205 DAY5 199, ,241 DAY6 145, ,536 Total 1,489,231 1, , ,507,530 Present 98.79% 0.18% 0.02% 1.11% 0.0% 0% Normal Table 3. Known attack analysis results SQL XSS Insecure Direct Injection Object Reference Web Shell Encoding Total Total Present 0% 0% 99% 0.95% 0% 0% Core Rule Detection This paper implements a detection engine to adopt the Core Rule Sets of ModSecurity to detect Web attacks. The advantage is: Snort could make use of another attack database to increase the detection rate. 4 EXPERIMENTAL RESULTS Tradition Intrusion Detection Systems usually use the DARPA Dataset for intrusion detection testing, but it hasn t been updated since Therefore, this paper uses the web server logs of more than 1.5 million records from a Non-Government Organization as the testing dataset. The testing adopts off-line mode to analyze logs within 6 days. The result shows in Table2. The other testing dataset provided by XSS Attacks Cross site scripting exploits and defense, contains 315 malicious web sites [6]. The analysis result shows in Table3. 5 CONCLUSION This paper is to improve the inadequacy of Web attack detection for Snort by implementing a Web attack detection engine on the basis of the Http Inspect preprocessor. In addition to detect SQL Injection, Cross Site Scripting, Insecure Direct Object Reference and Cross Site Request Forgery, this detection engine also provides the ability to detect Web Shell, encoded attacks and malicious web sites on black lists. Besides, this paper implements the detection engine with the Core Rule Sets of ModSecurity to provide Snort with another attack database in order to detect various attack methods. REFERENCES [1] Barnett, R.C., Preventing Web Attacks with Apache, America: Addison Wesley. [2] Caswell, B., Beale, J. and Baker, A.R., Snort IDS and IPS Toolkit, America: Syngress. [3] Cheng, Y.C., Laih, C.S., Lai, G.H., Chen, C.M. and Chen, T., Defending On- Line Web Application Security with User- Behavior Surveillance, Availability, Reliability and Security: [4] Crothers, T., Implementing Intrusion Detection Systems, America: Willey. [5] Grpssman, J., Hansen, R., Petkov, P.D., Roger, A. and Fogie, S., XSS Attacks - Cross site scripting exploits and defense, America: Syngress. [6] Hwang, K., Cai, M., Chen, Y. and Qin, M., Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, Dependable and Secure Computing, 4(1): [7] IT Information Security,
6 [8] Kiani, M., Clark, A. and Mohay, G., Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks, Availability, Reliability and Security: [9] Lee, J.H., Lee, J.H. Sohn, S.G., Ryu, J.H. and Chung, T.M., Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System, Advanced Communication Technology, 2: [10] Lei, J. and Li, Z.T., Using Network Attack Graph to Predict the Future Attacks, Communications and Networking in China: [11] Malware-Test Lab, [12] McClure, S., Scambray, J. and Kurtz, G Hacking exposed - network security secrets & solutions, 4th ed, America: McGraw Hill. [13] ModSecurity, [14] OWASP, Top_10_2007.pdf. [15] Seo, J., Kim, H.S. Cho, S. and Cha, S., Web server attack categorization based on root causes and their locations, Information Technology: Coding and Computing, 91: [16] Snort,
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Anomaly Detection Using Negative Security Model in Web Application
Anomaly Detection Using Negative Security Model in Web Application Auxilia.M Department of Information Technology Christ College of Engineering & Technology Puducherry, India [email protected]
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Evolutionism of Intrusion Detection
Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte
Web Application Firewall Profiling and Evasion Michael Ritter Cyber Risk Services Deloitte Content 1. Introduction 2. WAF Basics 3. Identifying a WAF 4. WAF detection tools 5. WAF bypassing methods 6.
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Network Monitoring and Forensics
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper
Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Journal of Advances in Computer Research Quarterly ISSN: 2008-6148 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 3, No. 1, February 2012), Pages: 65-79 www.jacr.iausari.ac.ir Avoiding Cyber-attacks
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
NSFOCUS Web Vulnerability Scanning System
NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
