ImageVerifierCode 换一换
格式:DOCX , 页数:8 ,大小:18.29KB ,
资源ID:9078173      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/9078173.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(入侵检测规则基础知识.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

入侵检测规则基础知识.docx

1、入侵检测规则基础知识入侵检测规则基础知识(Basic knowledge of intrusion detection rules)Basic knowledge of intrusion detection rulesNetwork intrusion detection system rule refers to a pattern that we need to find in network communication. In order for you to be different from each otherThe rules of the type have a basic

2、concept, so lets look at some examples and methods that can be used to identify.A connection request sent from a fixed IP. This can be easily identified by the original address area in the IP header file.A collection with an illegal TCP tag package. This can be done through known legal and illegal c

3、ollection of tags and TCP header filesThe markers compare and draw conclusions.Contains the special virus E-mail. IDS can be associated with a known virus message by the name of the mail or the name of the attachmentThe title of guan is compared and concluded.The DNS buffer overflow attempt is inclu

4、ded in the queue payload. You can analyze the DNS domain and check the length of each queueDegrees, so that IDS can tell if there is a buffer overflow attempt in the DNS domain. Or another way,To find out if there is an overflow program in the payload queue.A denial of service attack on a POP3 serve

5、r is implemented by committing thousands of identical commands. The way to deal with this attackIt is the number of times that the command is committed, and the alarm will be issued once more than the number of times it is set.File access attacks on FTP servers by submitting files or directories to

6、try to skip the previous login process. You can openSend a tracking system to monitor the successful landing of FTP communications if you find someone trying to advance through the systemIncoming, the alarm will be issued.As you can see from above, the scope of the rule is very broad, from the simpl

7、est check header to highly complex, for exampleTrue tracking of connection status or extensive protocol analysis. In this article, well look at some simple rules, and thenDiscuss their complexity in development. Note that the ability of the rule changes in different IDS, so this articleThe technique

8、s described may not be applicable in the firewall you use. For example, some network IDS products are provided to customersThe ability to write rules or configure existing rules is weak, and there are products that almost allow you to customize all the existing rulesAnd define all the rules that you

9、 can think of in the system. Another important factor to consider is some IDS productsYou can check the payload properties of a specific header file, and some products can give you data on any part of any package.What are the functional services of the ruleWhat is the purpose of intrusion detection

10、rules? The answer is that different rules have different purposes. The results we needWhen an intrusion occurs, the system alerts you. But lets think again, why do we need to customize or modify our own rulesThen? You may see some single communication on the network, and you want to alert the next t

11、ime such a communication occurs.You may have noticed that it has a special header file, and you want to define a rule to match this knownMark; Maybe you want to configure IDS to detect those things that are not normal or suspicious,Rather than detecting attacks and attacksDetection. Some rules can t

12、ell you which specific attacks are being carried out, or if an attacker is trying to target a vulnerabilityWhile other rules merely indicate that there is an abnormal behavior, rather than pointing out which attacks are specific. The former is bound to flowerSpend more time and resources, but can gi

13、ve you more information, such as why are you attacked or the attackers purposeYao.Header file attributeWe have quickly described the types of rules, and then lets look at a simple rule feature: header file properties. aSome header file attributes are clearly abnormal, so we have to make a lot of opt

14、ions in the rules. The classic example of this rule is the beltTCP package Settings with SYN and FIN flags. There is one in RFC793 (used to define the TCP standard)A loophole that allows many tools to try to bypass the firewall, router, and intrusion detection system. veryThe multi-attack program in

15、cludes header file attributes whose purpose is to violate RFCs because many operating systems and applications are basedCompliance with RFCs assumptions and errors in communication based on this are not corrected. There are a lot of kits out thereContains errors or incomplete code, and packages made

16、 from these tools contain the header file attributes that violate RFCs.Those poorly written tools and various intrusion techniques provide discernible attributes for writing rules.This sounds good, but note that not all operating systems and applications are fully inherited from RFCs. thingsIn fact,

17、 many systems or programs violate RFC at least on the one hand. So, with the passage of time, the agreement is possibleNew attributes are not included in the RFC, and then new standards emerge, turning previously unjustified standards into the presentThe method. RFC3168 is a good example. So, the ru

18、les of IDS are completely dependent on the RFCThat leads to a lot of positive errors. Of course, RFC is still a significant part of the rule development because of a lot of maliceThe attacks were all aimed at RFCs. Due to the RFC upgrade and other factors (which we will discuss later),So you need to

19、 review and upgrade existing rules periodically.While an illegal header file attribute is a basic component of the rule, it is also important to have legitimate but suspect header properties. For example,For connection suspicious ports such as 31337 or 27374 (these are often associated with Trojan p

20、orts), if this is the caseThe link warns that the Trojan horse can be quickly identified. Unfortunately, some normal and benign communication may also be used the sameThe port. If you dont use more detailed rules to define the other features of the communication, you will find it difficult to determ

21、ine the true nature of the communicationSex. Suspicious but legal properties, such as some port Numbers, are best considered with other attributes.Identify possible rule componentsThe best way to develop rules based on the header file attributes is through an instance. Synscan is a widely used sweep

22、Trace and probe system tools.It was active in early 2001 because its code was often used to make itThe first stage of building Ramen worms. This activity provides a good example, because the package contains a lot of knowledgeDont characteristics. Here are some of the IP and TCP header files that ex

23、ist in the early worm propagation in the Ramen worm packetSex. (note that my IDS is configured to cancel unrequested communication by default, so I can only see each attemptInitial package)1 various source IP addresses2 TCP source port 21, target port 21The service type is 04 IP identification numbe

24、r 394265 SYN and FIN tag Settings6 various serial number SettingsVarious confirmation number Settings8 TCP Windows size is 1028Now that we know the features of the Synscan packages header file, we can start thinking about how to make a good oneThe rules. Lets look for illegal, abnormal, and suspect

25、attributes that are in many casesThe corresponding attacker tries to exploit vulnerabilities or a special technique used by the attacker. Although normal package properties are includedIt often includes restrictions on some communications, but this restriction does not make for good rule characteris

26、tics. For example, we will make the agreementThe normal IP protocol attribute is defined as 6, so we can only look at the TCP packet. But others are perfectly normalFeatures, such as setting the service type to 0, are very detrimental to the development of the rules.Some unusual features of the Syns

27、can package can be identified using the following rules:Only the SYN and FIN markers are clearly marked for malicious behavior.2 another feature is that these packets have different properties but the ACK flag is not set. If you dont have SettingsThe ACK mark, the confirmation number should be set t

28、o 0.There is also a suspicious feature that both source and target ports are set to 21, which is an abnormal FTP serverThe agent is associated. If the two port Numbers are the same, we call them reflexive. In addition to some special communications (such as specific NeTBIOS communications, usually s

29、hould not exist. The anti-body port does not violate the TCP standard, but is mostlyThe number of events is abnormal. In normal FTP communication, we will see a high end (greater than 1023)As the source port, the target port is 21.In this way, we found three features that can be used to make the rul

30、es: SYN and FIN markers, and the confirmation number is not0 and no ACK tags are set, and the reflexive port is set to 21. Two things to note here: TCP wThe indows size is often set to 1028 and the IP identification number sets all packages 39426. Usually, weThe expected TCP Windows size is greater

31、than 1028, although this value is not very abnormal, but it is alsoShould be noticed. In the same way,IP RFC defines IP identification Numbers that should have different values in different packages, soFixed values are highly questionable.Choose a ruleSince we have found five elements that can be a

32、rule, we have a number of different options to develop based on headersThe rules of a file, and a good rule should include more than one feature. If you just want to set the simplest rules, thenYou can use packages of SYN and FIN tags to set up. Although this is a better way to identify bad behavior, it cantGive a reason why this happens. Remember that SYN and FIN are usually used to bypass firewalls and other devicesThey can act as a scanner, information collection or attack. So, the

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1