Sorry! The paper Passive Application Mapping could not be found.
Featuring 123 Papers as of April 17, 2014
Rootkit Detection with OSSEC
Sally Vandeven - April 17, 2014
Most malware consists of a malicious application that gets installed on a victims computer.
Integrating Wired and Wireless IDS Data
Michael D. Stanton - February 11, 2014
According to Gartner, smart phones and other mobile computing devices are rapidly replacing personal computers.
An Early Malware Detection, Correlation, and Incident Response System with Case Studies
Yaser Mansour - January 20, 2014
"The complexity of software is an essential property, not an accidental one" (Brooks, 1987).
An Approach to Detect Malware Call-Home Activities
Tyler (Tianqiang) Cui - January 17, 2014
In the internal network of a large organization, there may be a number of security measures or products in place, such as anti-virus, security patch management, Intrusion Prevention Systems (IPS), Firewalls, etc., and there is still some malware that goes undetected.
HTTP header heuristics for malware detection
Tobias Lewis - January 2, 2014
Signature based detection is one of the most fundamental techniques for identifying malicious activity on your network.
How Can You Build and Leverage SNORT IDS Metrics to Reduce Risk? Masters
Tim Proffitt - September 19, 2013
Metrics are used in many facets of a person's life and can be quite beneficial to the decision making process.
The Security Onion Cloud Client Network Security Monitoring for the Cloud Masters
Joshua Brower - September 17, 2013
Network Security Monitoring (NSM) is the "collection, analysis, and escalation of indications and warnings to detect and respond to intrusions."
60 Seconds on the Wire: A Look at Malicious Traffic Masters
Kiel Wadner - August 22, 2013
Malware depends on its communication network to receive commands, extract information and infect systems.
Implementing Active Defense Systems on Private Networks Masters
Josh Johnson - August 20, 2013
As attacks become increasingly complex due to the sophistication, organization and motivation of adversaries, defensive strategies must mature in order to remain effective.
Event Monitoring and Incident Response
Ryan Boyle - May 15, 2013
System security policies can still have security holes after implementation and may even introduce unintended consequences.
Joaquin Moreno - May 1, 2013
During the analysis of all the available data that are logged, organizations must be able to identify which portions of this information are actionable and pertinent.
AirNIDS: The Need for Intrusion Detection on the Wireless Ether
Thomas Hoffecker - March 19, 2013
The inherent insecurities and vulnerabilities of wireless 802.11b networks are well known. The benefit of being wireless is the greatest drawback.
Monitoring Network Traffic for Android Devices
Angel Alonso-Parrizas - January 25, 2013
In order to detect possible intrusions or any unusual patterns, several techniques have been used in the past.
What's Running on Your Network?
Francois Begin - January 25, 2013
Now more than ever, IT infrastructures are targeted by malicious outsiders, ranging from ideologically motivated groups such as Anonymous (Norton, 2012) to corporations and governments utilizing highly sophisticated Advanced Persistent Threats (Juels & Yen, 2012).
How to identify malicious HTTP Requests
Niklas Sarokaari - January 21, 2013
Hypertext transfer protocol (HTTP) is a stateless protocol and it uses a message-based model.
Using Watermarks to Prevent Leaks
Allison Nixon - January 21, 2013
In a world of general purpose computing, the person that possesses a piece of data has complete control over it.
Host-Based Detection and Data Loss Prevention Using Open Source Tools
Chris Hoke - December 26, 2012
Defending connected networks has been a challenge for as long as there have been connected networks.
Web Application Attack Analysis Using Bro IDS
Ganesh Kumar - November 27, 2012
Bro is an open-source, Unix-based Network Intrusion Detection System (NIDS) that passively monitors network traffic and looks for suspicious activity.
An Analysis of the Snort Data Acquisition Modules
Christopher Murphy - November 8, 2012
Snort is an open-source Intrusion Detection System (IDS) that runs on Linux, UNIX, BSD variants and Windows.
Surfing the Web Anonymously - The Good and Evil of the Anonymizer
Peter Chow - October 8, 2012
Companies of all sizes spend large amounts of time, resources, and money to ensure that their network resources and Internet connections are not being misused.
Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment
Sunil Gupta - August 8, 2012
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.
Using and Configuring Security Onion to detect and prevent Web Application Attacks
Ashley Deuble - July 12, 2012
Security Onion contains software used for installing, configuring, and testing Intrusion Detection Systems. Security Onion contains Snort, Suricata, Sguil, Xplico, nmap, scapy, hping, netcat, and tcpreplay (Burks, 2012).
IP Fragment Reassembly with Scapy Masters
Mark Baggett - July 5, 2012
Overlapping IP fragments can be used by attackers to hide their nefarious intentions from intrusion detection system and analysts.
A Complete Guide on IPv6 Attack and Defense
Atik Pilihanto - March 19, 2012
Based on RFC 791, the internet protocol is designed for use in interconnected systems of packet switched computer communication networks.
Using SNORT® for intrusion detection in MODBUS TCP/IP communications
Javier Jimenez Diaz - December 19, 2011
Not long ago, analog and purpose built communications systems use to be prevalent technologies on industrial plants. It wasnt common to find either interoperability or compatibility among them. In the 70s communication Networking began to be used in Direct Digital Control (Berge Jonas, 2004).
An Experimental Study of Detecting and Correlating Different Intrusions
Ratna Deepika Kannan - September 12, 2011
With the ubiquitous growth of the Internet, retaining its security is a difficult task. Two decades ago, computer systems were generally not connected to the Internet or were simply a part of a small network.
Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis
Subramani Rao - September 12, 2011
Amongst various security threats that have evolved lately, Denial of service (DoS) attack is the most destructive according to the security experts. A Denial of Service attack is a method of blocking service from its intended users.
Base64 Can Get You Pwned
Kevin Fiscus - September 12, 2011
Helix Pharmaceuticals is worried about security. In the cutthroat world of multi-billion dollar pharmaceutical companies, industrial espionage is a significant concern. In addition, political and social activists continually attempt to disrupt business as retribution for perceived injustices.
Chad Robertson - July 6, 2011
"OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response" (Trend Micro, 2010).
Reducing Organizational Risk Through Virtual Patching Masters
Joseph Faust - January 11, 2011
Software patching for IT Departments across the organizational landscape has always been an integral part of maintaining functional, usable and stable software. Historically the traditional patch cycle has been focused on fixing or resolving issues which affect functionality. In recent years, with the advancement of more sophisticated and targeted threats which are occurring in quicker cycles, this focus is dramatically changing. (Risk Assessment Cisco, n.d.; Executive Office of The United States, 2005) . Corporations and Government now have a greater understanding of potential losses and expenses incurred by not maintaining application security and are moving towards an increased focus on patching and security (Epstein, Grow & Tschang, 2008). With organizations reputations, consumer confidence and corporate secrets at risk, corporations and government are recognizing the need to shift and address vulnerabilities at a much faster pace than they historically have done so (Chan, 2004). Over roughly the last ten years, the length of time between the documentation of a given vulnerability in a piece of software and the development of an actual exploit that can take advantage of the weakness in the application, has decreased tremendously. According to Andrew Jaquith, senior analyst at Yankee Group, the average time between vulnerability discovery and the release of exploit code is less than one week. (Shrinking time from, 2006). It has also been identified that 99% of intrusions result from exploitation of known vulnerabilities or configuration errors where countermeasures were available ("Risk reduction and.," 2010) . Clearly these statistics alone can prove daunting for many businesses trying to keep pace and maintain proper defenses against the bad guys.
Detecting and Responding to Data Link Layer Attacks Masters
TJ OConnor - October 15, 2010
In this paper, we examine techniques for identifying signatures and anomalies associated with attacks against the data link layer on both wired and wireless networks. Methods for signature-based detection and anomaly-based detection are not new. Intrusion detection systems such as SNORT are quite capable of detecting some of the known data link layer attacks and include a mechanism for integrating Intrusion Prevention System (IPS) solutions. This paper does not advocate against the use of these solutions in organizations. What we present can augment your existing capabilities by detecting attacks that may be blind to your IDS.
Using OSSEC with NETinVM Masters
Jon Mark Allen - September 17, 2010
The days of installing a firewall at the edge of the network and monitoring traffic from a single point have long vanished into the history books. Today's security edge has collapsed all the way to the desktop and traffic from practically every system in the network must be monitored, analyzed, and acted on to maintain a secure posture (Cummings, 2004). This type of intense monitoring requires a combination of intrusion detection systems (IDS), event correlation, and analysis.
Covert Channels Masters
Erik Couture - August 19, 2010
Historically, the expression covert channel has broadly encompassed all communications that are hidden and communicate stealthily between endpoints. The goal of such a channel is not necessarily to obscure the data flowing through the channel, but to obscure the very fact that a channel exists. Often this data may be passed in plain sight of possible observers, but if properly engineered, may remain nearly impossible to detect. Covert channels represent a pure example of security through obscurity.
Detecting Torrents Using Snort Masters
Richard Wanner - April 5, 2010
This paper decomposes BitTorrent and the associated protocols used in conjunction with BitTorrent downloads to devise a number of different ways to detect the aspects of this traffic. This research is then used to create Snort signatures which can be implemented to detect the BitTorrent traffic in your environment.
Effective Use Case Modeling for Security Information & Event Management
Daniel Frye - March 10, 2010
With todays technology there exist many methods to subvert an information system which could compromise the confidentiality, integrity, or availability of the resource. Due to the abstract nature of modern computing, the only way to be reliably alerted of a system compromise is by reviewing the systems actions at both the host and network layers and then correlating those two layers to develop a thorough view into the systems actions. In most instances, the computer user often has no indication of the existence of the malicious software and therefore cannot be relied upon to determine if their system is indeed compromised.
SIEM Based Intrusion Detection with Q1Labs Qradar Masters
Jim Beechey - February 18, 2010
Attackers continue to find new methods for penetrating networks and compromising hosts. Therefore, defenders need to look for indications of compromise from as many sources as possible. Collecting and analyzing log data across the enterprise can be a challenging endeavor. However, the wealth of information for intrusion detection analysts is well worth the effort. SIEM solutions can help intrusion detection by collecting all relevant data in a central location and providing customizable altering and reporting. In addition, SIEM solutions can provide significant value by helping to determine whether or not an incident occurred. The challenge for analysts is creating effective alerts in order to catch todays sophisticated and well funded attackers.
Capturing and Analyzing Packets with Perl Masters
John Brozycki - January 28, 2010
The steps in setting up a Windows system with Perl and the necessary add-ons to be able to run and create packet capturing Perl scripts.
Smart IDS - Hybrid LaBrea Tarpit
Cristian Ruvalcaba - December 28, 2009
The importance of IDS in corporate defense is seen as an ever growing necessity. Major strides have been made for numerous IDS tools, but some have seen a stalemate. The next evolutionary step in IDS would involve the concept of a 'Smart Intrusion Detection System (IDS)', one that generates signatures. The question of how to generate these signatures becomes instrumental, and can involve a number of different components. In this case, it could involve a tool that uses a hybrid LaBrea concept.
A Multi-Perspective View of PHP Remote File Include Attacks
Dennis Schwarz - November 10, 2009
This paper describes the mechanics of a RFI (remote file include) attack by doing a code analysis and an attack walk through on a vulnerable application. Detecting an attack is discussed by writing sample IDS signatures and looking at related log files.
Efficiently Deducing IDS False Positives Using System Profiling
Michael Karwaski - November 9, 2009
Security Whitepaper: How to create a simple, static inventory database and compare security alerts to see if they relate to the host in question. This will allow for greater visibility into which alerts are actually relevant to the end users network.
Harness the Power of SIEM
Dereck Haye - October 6, 2009
Defend against the Conficker worm and other viruses. How it is possible to take individual security updates and, in Siem architecture combine them with other metrics to enhance and tune detection capabilities.
An Inexpensive Wireless IDS using Kismet and OpenWRT
Jason Murray - May 4, 2009
The discipline of network security has as one of its goals the protection of critical business network traffic. There are a number of preventative methods that can be employed to ensure that a network is designed well, but attackers will still attempt to exploit weaknesses to gain access to important business data and systems.
Snort 3.0 Beta 3 for Analysts
Doug Burks - April 15, 2009
This paper will demonstrate how analysts can begin experimenting with Snort 3.0 today by manually compiling the source code or by simply downloading a preconfigured bootable CD. This paper will also discuss the design of Snort 3.0 and its new features, such as multithreading, native inline bridging, dynamic reconfiguration, and native IPv6 support.
Capturing 10G versus 1G Traffic Using Correct Settings! Masters
Emilio Valente - March 17, 2009
In this paper, I will describe the steps needed to tune the host TCP/IP stack for optimal throughput for use with 1 GigE network interfaces and 10 GigE network interfaces.
Detecting and Preventing Anonymous Proxy Usage Masters
John Brozycki - November 6, 2008
This paper explores methods organizations may use to detect and prevent anonymous proxy usage.
Intrusion Detection Likelihood: A Risk-Based Approach
Blake Hartstein - November 5, 2008
The goal of this paper is to highlight the useful aspects of Network Intrusion Detection System (NIDS) and Network Intrusion Prevention System (NIPS).
Intel IXP Network Processor Based Intrusion Detection
Greg Pangrazio - October 16, 2008
This paper will introduce the IXP series processors as well as outline the steps to create a functioning Snort based IDS on the IXP 425.
Network IDS & IPS Deployment Strategies
Nicholas Pappas - April 11, 2008
Information systems are more capable today than ever before. Society increasingly relies on computing environments ranging from simple home networks, commonly attached to high speed Internet connections, to the largest enterprise networks spanning the entire globe. Filling one's tax return, shopping online, banking online, or even reading news headlines posted on the Internet are all so convenient. This increased reliance and convenience, coupled with the fact that attacks are concurrently becoming more prevalent has consequently elevated the need to have security controls in place to minimize risk as much as possible.
Challenges of Managing an Intrusion Detection System (IDS) in the Enterprise Masters
Russell Meyer - March 28, 2008
While every enterprise is unique, there are common challenges in managing, monitoring and reacting to network IDS alerts. These include: managing the flood of alerts, creating actionable reports, and following-up on the reported alerts. This paper will explore the IDS challenges of a large organization with examples of specific lessons learned in monitoring the internal network.
Justin Mitchell - January 7, 2008
Generally, honeypots accomplish the detection and collection of nefarious activity via emulating a given service or vulnerability then log the corresponding action or download the malicious code accordingly. Among other places, honeypots may reside within the LAN, DMZ, or external network (Internet).
Detecting and Preventing Unauthorized Outbound Traffic
Brian Wippich - October 29, 2007
This paper will describe some of the risks associated with outbound traffic, methods for securing this traffic, techniques for circumventing these controls, and methods for detecting and preventing these techniques. There is no way to eliminate all risk associated with outbound traffic short of closing all ports. However, a good understanding of these risks should allow you to make informed decisions on securing this traffic.
Distilling Data in a SIM: A Strategy for the Analysis of Events in the ArcSight ESM Masters
James Voorhees - October 12, 2007
The ArcSight Enterprise Security Manager (ArcSight ESM, hereafter, simply ArcSight) collects and normalizes network data. It can include data from intrusion detection or protection systems (IDS/IPS), firewalls, servers, web servers, and other kinds of devices, including routers and switches. The data can comprise millions of events. This dataset must be reduced so that analysts can make sense of it and find the events of interest that indicate that action must be taken. This is no simple task. Nor can it be done in a day. It must be planned, then carried out with painstaking care. There is, however, no guide readily available that will tell you how to do this.
Tuning an IDS/IPS From The Ground UP
Brandon Greenwood - September 27, 2007
This paper examines one of the many different methodologies to configuring or tuning an Intrusion Detection System or Intrusion Prevention System (IDS/IPS). The proper configuration of an IDS is a bit of an art because there are so many different ways to do it. I have seen and listened to many people explain the best way to configure a detection engine and while I dont subscribe to a best way, I have taken bits and pieces from some of these methodologies and combined them into a system that has worked for me.
Detecting and Preventing Rogue Devices on the Network Masters
Ibrahim Halil Saruhan - August 13, 2007
The main approach of this paper is to show how to use site survey to detect rogue devices in a wireless network. Site survey, if used correctly is extremely beneficial for detecting rogue devices. Rogue device detection can be considered the initial phase of wireless intrusion detection, in case it is not feasible to install sensors to cover all the wireless network area.
Assumptions in Intrusion Detection - Blind Spots in Analysis Masters
Rodney Caudle - March 28, 2007
This paper examines one of the assumptions that form the foundations of packet analysis. A discussion of an approach to analyzing protocol stacks is presented. This approach can be used to determine gaps in the protocol stack where an analyst can be misled.
Enhancing IDS using, Tiny Honeypot Masters
Richard Hammer - November 13, 2006
This paper will describe how to install, use, and deploy Tiny Honeypot (THP), written by George Bakos [Bakos, 2002], and then use the data returned by THP to write custom IDS rules. THP completes the incoming connection, records data received, can return custom responses, and simulate any application layer protocol. Completing the TCP connections allows the IDS to see the data payload instead of just the connection attempt.
Passive Application Mapping
Benjamin Small - October 27, 2006
Passive Application Mapping (PAM) is a solution for this problem. In this paper I cover the topics that are vital to understanding and utilizing PAM. I also cover the commercial and public efforts that incorporate PAM to better aid in Intrusion Analysis and network maintenance.
A Framework to Collect Security Events for Intrusion Analysis
Jim Chrisos - April 3, 2006
This paper describes a framework to help security personnel have a starting point with which to collect and view security events from devices capable of reporting via syslog. Ideally, the reader will be able to follow along and use this paper in a way similar to a how-to reference guide.
Solaris 10 Filesystem Integrity Protection Using Radmind
Sam Wilson - May 17, 2005
This report is intended to provide information of value to security engineers who are choosing among various solutions to protect their Solaris systems from undesirable changes. In particular, the open-source product "Radmind" is described so it may be effectively compared to other, perhaps more well-known, commercial and open-source filesystem integrity applications.
Understanding Wireless Attacks and Detection
Christopher Low - May 17, 2005
This paper introduces wireless attacks from a OSI layer 2 perspective and attempts to understand how wireless attacks can be detected by looking at wireless frames at these layers.
A Honeypot Based Worm Alerting System
Jeff Kloet - May 5, 2005
Network administrators are always looking for simple and effective ways to make their company networks more secure and resilient from worms and viruses.
Building a tripwire System for SQL Server
Frank Ress - May 5, 2005
Tripwire is a well known host-based Intrusion Detection System (IDS) that is available for a wide range of operating systems in both commercial and noncommercial versions.
Maintaining a Secure Network
Robert Droppleman - August 15, 2004
Maintaining a secure network connected to the Internet is becoming more difficult as time goes on. New viruses are released daily, higher machine speeds and more sophisticated and automated tools mean that hackers can scan and attack wide sections of the Internet at a time
Enforcing Policy at the Perimeter
Derek Buelna - July 25, 2004
The rapid deployment of security patches and anti-virus updates has become a basic need within most IT organizations. The time between the disclosure of a vulnerability and its exploitation continues to decrease while vulnerabilities are becoming easier to exploit and are increasingly severe. Locally enforcing security policy on a large number of computers can be a challenge but keeping remote (VPN or dial-up connected) computers up to date can prove even more difficult.
Algorithm-based Approaches to Intrusion Detection and Response
Alexis Cort - June 9, 2004
Computer and network intrusions have been with us since the introduction of the computer, but intrusion detection systems are still somewhat new to the market (first implementations started in the early 90's).
Running a World Class Intrusion Detection Program: More Than Just Picking the Right Tool
JD Aupperle - May 2, 2004
In today's security landscape, Intrusion detection systems have joined firewalls as "must have" tools, but getting the greatest benefit from these devices requires much more than a deploy and move on strategy.
Understanding IPS and IDS: Using IPS and IDS together for Defense in Depth
Ted Holland - May 2, 2004
Over the past few years many papers and books have included articles explaining and supporting either Intrusion Detection Systems (IDS) or the newer technology on the security block, Intrusion Prevention Systems (IPS).
Enterprise Security Management Reducing the Pain of Managing Multiple IDS Systems
David Leadston - March 25, 2004
ESM is an emerging market space within the security technology arena that consists of several vendors who provide a holistic view of all your security device information.
IDS Burglar Alarms: A How-To Guide
Mark Embrich - March 2, 2004
The goal of this paper is to make the task of building Intrusion Detection burglar alarms less daunting and incorporates modular "how-to" guides.
Intrusion detection evasion: How Attackers get past the burglar alarm
Corbin Carlo - December 13, 2003
The purpose of this paper is to show methods that attackers can use to fool IDS systems into thinking their attack is legitimate traffic.
Wanted Dead or Alive: Snort Intrusion Detection System
Mark Eanes - December 13, 2003
A review of IDS deployment strategies using hubs, switches, or taps and a brief discussion on IDS implementation on the network is presented in this paper.
Secure Setup of a Corporate Detection and Scanning Environment
Dieter Sarrazyn - December 13, 2003
This paper covers the secure deployment of a distributed intrusion detection environment as well as the secure deployment of a distributed vulnerability scanning environment.
Snort Alert Collection and Analysis Suite
Chip Calhoun - November 6, 2003
This document outlines separating Snort IDS Collection and Analysis Suite duties across a minimum of three servers (Snort sensor, MySQL database and an ACID web server) to gain optimal coverage and performance.
Distributed NIDS: A HOW-TO Guide
Alan McCarty - November 6, 2003
This paper discusses the design, installation, configuration and monitoring of an NIDS, and provides the reader with a fully functional and powerfully distributed NIDS as a result.
Intrusion Detection Is Dead. Long Live Intrusion Prevention!
Timothy Wickham - October 31, 2003
This practical will demonstrate the limitations and drawbacks of intrusion detection as well as the reasons why intrusion prevention is a vastly better method of securing a network
An Overview of PureSecureTM
Jeffrey Slonaker - October 31, 2003
This paper's objective was to examine the role of the Intrusion Detection System (IDS) in modern security strategies, establish a set of criteria for IDS evaluation, investigate the functionality of PureSecureTM, an application developed and marketed by Demarc Security, and present conclusions concerning its desirability as a working IDS.
Installing, Configuring, and Testing The Deception Tool Kit on Mac OS X
Jon Lucenius - October 31, 2003
This paper will introduce a Honey Pot known as the Deception Tool Kit (DTK) written by Fred Cohen. It will give an overview of what the DTK is, where to obtain it, how it works, and offers advice about when it should be deployed.
Intrusion Prevention - Part of Your Defense in Depth Architecture?
Roberta Spitzberg - October 31, 2003
This paper will explore Intrusion Protection Systems (IPS) from the perspective of using IPS as part of a Defense in Depth strategy.
Securing a Windows Snort Sensor for Hostile Environments
Michael Wunsch - October 31, 2003
This white paper documents how to secure a Windows' Snort sensor for deployment into extremely hostile environments.
IDMEF "Lingua Franca" for Security Incident Management
Douglas Corner - October 31, 2003
This paper examines the relationship of the Intrusion Detection Working Group specifications to transfer protocols well as an overview of the specifications themselves.
Intelligent Correlator for NIDS
Marco Bove - October 31, 2003
The goal of this work is the realization of a prototype of a system that reduces the number of false positives of a NIDS by triggering a real time collects for information upon alert reception.
Logfile Analysis: Identifying a Network Attack
Michael Fleming - October 31, 2003
Although all parts of the backup strategy are equally important, this paper will focus on the backup script and will detail a flexible backup script that uses built-in Solaris software tools which create a reliable local backup of a Solaris machine running Oracle.
How to Choose Intrusion Detection Solution
Baiju Shah - October 31, 2003
This paper discues how Intrusion detection systems are crucial in securing any system but the effectiveness comes only from proper planning, deploying, monitoring, and responding to intrusions.
Using Snort v1.8 with SnortSnarf on a RedHat Linux System
Richard Greene - October 31, 2003
This analysis concentrates on several ways of getting the log file information from an open source IDS system called Snort. The tool that is explored for that purpose is SnortSnarf.
Application of Neural Networks to Intrusion Detection
Jean-Philippe Planquart - October 31, 2003
This paper presents a "state of the art" of Intrusion Detection Systems, developing commercial and research tools, and a new way to improve false-alarm detection using Neural Network approach.
Understanding Intrusion Detection Systems
Danny Rozenblum - October 31, 2003
The paper is designed to: outline the necessity of the implementation of Intrusion Detection systems in the enterprise environment; clarify the steps that need to be taken in order to efficiently implement your Intrusion Detection System; and, describe the necessary components.
Selecting an Intrusion Detection System
Kathleen Buonocore - October 31, 2003
This paper examines five steps to follow when selecting an intrusion detection system (IDS): identify the need, gain a general understanding of intrusion detection systems, gain a detailed understanding of the network, evaluate various IDS systems, and determine policy and procedures.
Anti-IDS Tools and Tactics
Steve Martin - October 31, 2003
This paper focuses on Network ID Systems, and discusses the technical detail behind techniques that can be employed to counteract the utility of these systems and identifies tools that actually use the techniques described.
Building and Maintaining a NIDS Cluster Using FreeBSD and Snort
Michael Boman - October 31, 2003
This paper describes how to build a NIDS cluster with central logging and maintenance facilities.
Intrusion Detection - Systems for Today and Tomorrow
George Ho - October 31, 2003
This paper will examine the intrusion detection systems, one of the relative new technologies in information security. It aims to explore, in high level, the intrusion detection systems available today, as well as new developments in the technology.
Intrusion Detection Systems: An Overview of RealSecure
Darrin Wassom - October 31, 2003
This paper reviews one IDS, RealSecure, to describe its plusses and minuses with special emphasis on filtering out false positives.
Intrusion Detection Systems: Definition, Need and Challenges
Abhijit Sarmah - October 31, 2003
This paper defines Intrusion Detection Systems and examines the need for such tools as well as the challenges of IDS implementation.
The History and Evolution of Intrusion Detection
Guy Bruneau - October 31, 2003
The aim of this paper is to examine the origins of detecting, analysing and reporting of malicious activity, where it is today and where it appears to be heading in the future. Some of the many techniques and tools presently used in Network defence will be explored as well.
An Informal Analysis of One Site's Attempts to Contact Host Owners
Laurie Zirkle - October 31, 2003
This paper will look at one system administrator's attempts to contact host owners of machines that scan or probe her network. After a brief discussion of various ways to identify possible contacts, this person's data will be used to show how different sites may respond and how probes have multiplied over a definitive period of time. The paper concludes by mentioning two projects that might help the overburdened system/network/security administrator to simplify the whole process of contacting a host owner.
Black ICE 2.5 Events, False Positives and Custom Attack Signatures
Alan Mercer - October 31, 2003
This paper aims to help BlackICE IDS administrators by identifying and classifying some events frequently seen by IDS agents in two common deployments - on a DMZ web server and on systems within an internal (mainly Microsoft) network.
Network Intrusion Detection - Keeping Up With Increasing Information Volume
Timothy Weber - October 31, 2003
This paper will detail ways to help a network-based IDS cope with the ever increasing volume of information that threatens its ability to fulfill its role in a defense-in-depth strategy.
Host-Based Intrusion Systems for Solaris
Lynn Bogovich - October 31, 2003
This paper presents requirements for an Intrusion Detection System (IDS), as well as an analysis of currently available IDS software packages and a recommendation of the best HIDS package to manage a suite of Solaris machines.
Protocol Anomaly Detection for Network-based Intrusion Detection
Kumar Das - October 31, 2003
This paper describes Intrusion Detection Systems (IDS) and compares the two main categories of detection principles, signature detection and anomaly detection; also described is a new type of anomaly detection based on protocol standards.
Do I Need to Be Concerned About These Firewall Log Entries?
Arvid Soderberg - October 31, 2003
In this paper, I'll highlight certain entries from the firewall log file and attempt to determine the level of concern that should be associated with them.
IDS - Today and Tomorrow
Thomas Goeldenitz - October 31, 2003
This paper is not intended to predict the future, but bring to light emerging technologies and trends in the field of IDS that could make the life of the security specialist easier (if there is such a thing).
Using Snort For a Distributed Intrusion Detection System
Michael Brennan - October 31, 2003
This document will provide an option for setting up a distributed network intrusion detection system using open source tools including the intrusion detection software Snort.
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
Allison Hrivnak - October 31, 2003
Choosing the right software for an intrusion detection system can be a challenging task that often requires extensive research. While there are many different products available, Tripwire from Tripwire Inc. and Symantec's Intruder Alert offer two possible solutions for a host-based intrusion detection system.
Suspicious Unix Log File Entries and Reporting Considerations
Cathy Gresham - October 31, 2003
In my Kickstart paper I covered basic Unix log files with a configuration file that gathered everything. I would like to expand on that and now cover messages found in those log files that would cause concern and require further investigation.
A Tool for Running Snort in Dynamic IP Address Assignment Environment
Shin Ishikawa - October 31, 2003
The purpose of this paper is to detail the creation of a small tool program which aids the operation of the Snort IDS in dynamically assigned IP address environment.
Intrusion Detection Interoperability and Standardization
Pravin Kothari - October 31, 2003
This paper presents the motivation for such standardization efforts and an overview of a potential standard - IDMEF along with its communication protocol IDXP.
Network IDS: To Tailor, or Not to Tailor
Jon-Michael Brook - October 31, 2003
The following discussion centers on the benefits and detractors of rule-based Intrusion Detection Tailoring, and how, overall, it is best to leave tailoring for Network IDS systems to the product vendors.
SSH and Intrusion Detection
Heather Larrieu - October 31, 2003
This paper outlines the role and issues with the use of the SSH protocol, types and methods of intrusion detection, and proposes techniques and an architecture for an intrusion detection system that uses the SSH daemon as a sensor.
The Design and Theory of Data Visualization Tools and Techniques
Brian Sheffler - October 31, 2003
The purpose of this paper is to inform and educate security professionals about the analytical potential of using a tool or technique that renders visual representations of the data/traffic that traverses a given network. The emphasis is on the design and theory behind such tools. Included are examples of data visualization products that are commercially available.
Intrusion Detection with MOM - Going Above the Wire
Don Murdoch - October 31, 2003
In this paper, Microsoft Operations Manager 2000 (hence, MOM) will be discussed as a tool to aid the analyst in understanding what occurs within the operating system and the application level.
A Practical Guide to Running SNORT on Red Hat Linux 7.2 and Management Using IDS Policy Manger MySQL
William Metcalf - October 31, 2003
This paper demonstrates how to setup snort on Red Hat 7.2 and how to manage your sensor and view alerts from your windows 2000 workstation.
A Thousand Heads Are Better Than One - The Present and Future of Distributed Intrusion Detection
Robert Zuver - October 31, 2003
This paper will focus on intrusion detection systems in general, and specifically on two examples of the most promising new weapon in the battle against Internet hackers and worms: distributed intrusion detection.
Snort Install on Win2000/XP with Acid, and MySQL
Christina Neal - October 31, 2003
This paper is designed with as much detail as possible to help "newbies" easily install and configure Snort 1.8.6 on Windows 2000/XP.
A Single IDS Console Please: ManHunt 2.1 Pilot Test
Scott Reynolds - October 31, 2003
The paper discusses the implementation of ManHunt, the pilot version protocol anomaly based NIDS offered by Recourse Technologies that were evaluated against high level functional requirements detailed in the following case study.
Doing My Part - Sending Data to the Internet Storm Center
Sydney Jensen - October 31, 2003
This paper documents the procedure that I set up to automate collecting and sending intrusion attempt information to Incidents.org and the Internet Storm Center, then discusses my results and some possible next steps.
Hands in the Honeypot
Kecia Gubbels - October 31, 2003
This paper focuses on the description and analysis of honeypots as well as how and where they are used. I describe the process of setting up and running a honeypot.
Intrusion Prevention Systems- Security's Silver Bullet?
Dinesh Sequeira - October 31, 2003
This paper takes a look at Intrusion Prevention Systems (IPS), the technology behind these systems, why we need them, how they function, their pros and cons, and lists some highly rated products.
Distributed Intrusion Detection Systems: An Introduction and Review
Royce Robbins - October 31, 2003
A number of dIDS with global scope have been active for several years, and five of these are discussed and compared with each other in terms of focus, data source, notification tools, available agents, statistical reporting tools and linkage to security and vulnerability information.
The Human Factor - Adding Intelligence and Action to Intrusion Detection
Daniel Hill - October 31, 2003
This paper explores the current state of Intrusion Detection Systems (IDS) technology, identifies system requirements and essential elements in the context of an overall architecture; and it highlights several systems, available today, that fit nicely into the suggested architecture.
Turning the tables: Loadable Kernel Module Rootkits deployed in a honeypot environment
Jonathan Rose - October 31, 2003
This paper addresses the topic of honeypots, which are one of the latest technologies available to track and monitor hackers and Internet attackers.
Archiving Event Logs
Jim Stansbury - October 31, 2003
Archived event logs often play an important role in the detection, investigation, and prosecution of a computer crime or other computer misuse.
The Keep Within the Castle Walls - An Experiment in Home Network Intrusion Detection
Gary Wallin - October 31, 2003
The author describes how to set up snort 1.9.1 on a virtual Linux machine, including before and after scenarios.
Choosing an Intrusion Detection System that Best Suits your Organization
Dennis Mathew - September 16, 2002
A discussion on the nature of an IDS as well as a review of the various types of IDS' on the market with their varied approaches taken to detect intruders.
Using Decision Tree Analysis for Intrusion Detection: A How-To Guide
As the volume and sophistication of computer network attacks increase, it becomes increasingly difficult to detect and counter intrusions into a network of interest.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.