Intrusion DetectionPrevention Systems.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Intrusion DetectionPrevention Systems.ppt

Example of Vulnerability Signatures At least 75% vulnerabilities are due to buffer overflow Sample vulnerability signature Field length corresponding to vulnerable buffer certain threshold Intrinsic to buffer overflow vulnerability and hard to evade Counting Zero-Day Attacks Security Information Fusion Internet Storm Center (aka, DShield) has the largest IDS log repository Sensors covering over 500,000 IP addresses in over 50 countries More w/ DShield slides In the first 30 minutes of Sapphire’s spread, we recorded nearly 75,000 unique infections. As we will detail later, most of these infections actually occurred within 10 minutes. This graphic is more for effect rather than technical detail: We couldn’t determine a detailed location for all infections, and the diameter of each circle is proportional to the lg() of the number of infections, underrepresenting larger infections. Nevertheless, it gives a good feel for where Sapphire spread. We monitored the spread using several “Network Telescopes”, address ranges where we had sampled or complete packet traces at single sources. We also used the D-shield distributed intrusion detection system to determine IPs of infected machines, but we couldn’t use this data for calculating the scanning rate. * Problems: mainly accuracy * * Protection is not free/cheap. For example, an intrusion detection system (IDS) needs to analyze each packet. This requires a lot of computing power, usually a dedicated high-end workstation. If the IDS is real-time then its response time must be short. When there is insufficient resources, some protection mechanisms will simply not let data in (fail-close). For example, a firewall, which filters each packet, will simply drop packets when it is overloaded. The dropped packet will not be able to reach beyond the firewall into the internal network. The user experience may not be a happy one because of data loss. However, other protection mechanisms will check/analyze as much as they can but

文档评论(0)

gshshxx + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档