Network attacks and network intrusion detection systems

Prof. Evgeny Abramov
IT-Security Department, Taganrog Institute of Technology, Southern Federal University, Taganrog, Russia

22 hours, 5 credits

June 6 - June 10, 2011

Dipartimento di Ingegneria dell'Informazione: Elettronica, Informatica, Telecomunicazioni, via Caruso, meeting room, ground floor

Contacts: Prof. Michele Pagano

   

Summary

This series of lessons examines some of the most dangerous types of network attacks (buffer overflow, format string vulnerabilities, SQL-injection, XSS), methods for their detection and countermeasures. A classification of vulnerabilities based on CVE, CWE is presented. The most popular DDoS attacks and protection technologies are discussed, and some types of attacks that exploit buffer overflows and are part of many types of malicious scripts are considered.

Methods for detection and reaction are analyzed with reference to the use of personal firewalls and the Snort network intrusion detection systems (NIDS). We shall examine countermeasures to personal firewall bypass attempts, as are used by hackers to capture host control and install covert channels. An approach to develop effective Snort rules is illustrated, and a generalized method of testing NIDS effectiveness is presented.

Contents