|
|
Network attacks and network intrusion detection systems
Prof. Evgeny Abramov
IT-Security Department, Taganrog Institute of Technology, Southern Federal University, Taganrog, Russia
22 hours, 5 credits
June 6 - June 10, 2011
Dipartimento di Ingegneria dell'Informazione: Elettronica, Informatica, Telecomunicazioni, via Caruso, meeting room, ground floor
Contacts: Prof. Michele Pagano
Summary
This series of lessons examines some of the most dangerous types of network attacks (buffer overflow, format string vulnerabilities, SQL-injection, XSS), methods for their detection and countermeasures. A classification of vulnerabilities based on CVE, CWE is presented. The most popular DDoS attacks and protection technologies are discussed, and some types of attacks that exploit buffer overflows and are part of many types of malicious scripts are considered.
Methods for detection and reaction are analyzed with reference to the use of personal firewalls and the Snort network intrusion detection systems (NIDS). We shall examine countermeasures to personal firewall bypass attempts, as are used by hackers to capture host control and install covert channels. An approach to develop effective Snort rules is illustrated, and a generalized method of testing NIDS effectiveness is presented.
Contents
- Introduction
- Terminology
- Network attacks ontology
- Practical classification
- Signatures and anomalies
- DoS, DDoS attacks
- The use of design errors for DoS
- Goals and scenarios for DDoS (bot-nets, etc)
- Protection against DDoS
- Remote access attacks
- Buffer overflow
- Format string vulnerabilities
- SQL injection
- XSS
- Protection and detection
- Personal security in the network
- Personal firewalls
- Anti-rootkit
- Covert channels and their detection
- Leak-tests of personal firewalls
- Network intrusion detection systems (NIDS)
- Analysis of NIDS approaches, their classification and vulnerabilities
- Using Snort
- Signature analysis of network attacks, development of effective rules for Snort
- Testing NIDS effectiveness
|