TAILIEUCHUNG - Indications and Warnings Correlation

Welcome to the second half of the network based intrusion detection tutorial, where we will discuss more advanced analysis techniques based on Indications and Warnings as well as correlation. For every attack that really gets our attention, there are twenty or thirty probes or mapping attempts. Some of the common efforts are DNS zone transfers, DNS queries, SNMP queries, portmapper access attempts, and NetBIOS name lookups. | Network Based Intrusion Detection Tutorial 2 Indications and Warnings Correlation IDIC - SANS GIAC LevelTwo 2000 2001 1 In planning never a useless move in strategy no step taken in vain. Chen Hao Welcome to the second half of the network based intrusion detection tutorial where we will discuss more advanced analysis techniques based on Indications and Warnings as well as correlation. For every attack that really gets our attention there are twenty or thirty probes or mapping attempts. Some of the common efforts are DNS zone transfers DNS queries SNMP queries portmapper access attempts and NetBIOS name lookups. In this section we will be examining indications and warnings signs of reconnaissance activity and of a likely impending attack. By paying proper attention to indications and warnings we can take proactive steps toward reducing the chances of a successful attack. 1 I W Schematic Warnings Information includes computing non-computing based Interaction is adaptive feedback loop Not all indications produce warnings many many IDIC - SANS GIAC LevelTwo 2000 2001 2 In this diagram we see a method for categorizing information both computing and noncomputing based. The outermost oval includes all information the middle oval shows that we can only collect some of the relevant information. The innermost oval shows the indications that have been identified from the collected information. One or more indications may produce a warning. So what are indications and warnings Mapping attempts are clearly warnings of what will follow. Very often they are simply used to create shopping lists the list of internet addresses fed to exploit scripts. Again the pattern of these lists has meaning and is an indication. Every once in a while our adversaries select a specific target a system that has information they want. This is an indication we are giving away vital tactical information. 2 I W Semantic Models Adversary Reconnaissance Pre-Attack Attack and Planning Post-Attack .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.