3 research outputs found

    A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems

    Get PDF
    Examining payload content is an important aspect of network security, particularly in today\u27s volatile computing environment. An Intrusion Detection System (IDS) that simply analyzes packet header information cannot adequately secure a network from malicious attacks. The alternative is to perform deep-packet analysis using n-gram language parsing and neural network technology. Self Organizing Map (SOM), PAYL over Self-Organizing Maps for Intrusion Detection (POSEIDON), Anomalous Payload-based Network Intrusion Detection (PAYL), and Anagram are next-generation unsupervised payload anomaly-based IDSs. This study examines the efficacy of each system using the design-science research methodology. A collection of quantitative data and qualitative features exposes their strengths and weaknesses

    Intrusion prevention systems: How do they prevent intrusion?

    No full text
    Intrusion Prevention Systems (IPS) are the latest in a line of products created to counter network attacks. This thesis has explored the history of products manufactured to protect network systems from attacks. An experiment was conducted to find out what an attack on a systems looked like and to gauge the success of current IPS software. Results indicated that current IPS were reasonably effective and that the methodology of attacking a system was predictable, allowing administrators scope for putting methods in place to counter attacks.UnpublishedAdomavicius, Gedas, 2003, Information Security, University of Minnesota, Website accessed 28 April 2004. http://ids.csom.umn.edu/faculty/gedas/6452/slides/IT5-6pp.pdf. Al-Shaer, Ehab, 2003, Why Network Security, DePaul. University, Website accessed 12 August 2004, http://www.mnlab.cs.depaul.edu/-ehab/Courses/TDC572/PDF/1-motive&attack.pdf. Alvarez, Sergio, 2004, Intro to Win32 Exploits, Hack3rs.org, Website accessed 14 September 2004, http://hack3rs.org/-shadown/Twister/papers/Intro%20to%20Win32%20Exploits.pdf Anderson, James P, 1980, Computer Security Threat Monitoring and Surveillance, Website accessed 23 April 2004, http://csrc.nist.gov/publications/history/ande80.pdf. Anon, 1997, IT security policies dated Computer Fraud & Security, 12, December p. 3. Anon, 2001, Microsoft make anti-hacker film Network Security, 6, 1st June, p.2. Anon, 2002, Where do all the hackers come from? Computer Fraud & Security, 3, 1st March, p. 2. Anon, 2002a, Italian police arrest hacker group Computer Fraud & Security, 2, 1st February, p.4. Anon, 2002c, Microsoft calls on hacker expert Computer Fraud & Security, 3, 1st March, pp. 3-4. Anon, 2003a, Computer security and operating system updates Information and Software Technology, 45 (8), pp. 461-467. Anon, 2003b, Hacker breaches 8 million credit card accounts Computer Fraud & Security, 3, March, p.l. Anon, 2003c, Hacker group - cracked Network Security, 2, February, p.3. Anon, 2003d, Hackers control 3 million servers Network Security, 7, July, pp. 1-2. Anon, 2003e, Black. Hat Conference: Not Just Hackers, Network Security, 9, September, pp. 5-6. Anon, A Hacker's Ethics and Hacking Methods, Virgina Tech, Website accessed 17th August 2004, http://courses.cs.vt.edut-cs3604/support/Assignments/Final.Assmt.F99/Hacking/handoutl.htm. Anti-Hack, 2001, History of Firewalls, Website accessed 2 May 2004. http://dmsweb.badm.sc.edu/mgsc890/firewalls/fire2.htm. Argus Systems Group, 2004, Data Sheet, Website accessed 20 July 2004, http://www.argussystems. com/product/overview/lx/#PitBull_LX Austen, J. 1997, Can the laws really cut down hacking? Information Security Technical Report, 2, (1), p.5. Boran, Sean, 2003, IT Security Cookbook, boran.com, Website accessed 3 May 2004. http://www.boran.com/security/index.html. Caswell, Brian and Marty Roesch, 2004, What is Snort?. Snort.org. Website. Accessed 31 May 2004. http://www.snort.org/about.html Cisco Systems, 2002, Evolution of the Firewall, Cisco Systems (28 September 2002), Website accessed 13 May 2004. http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ch3. htm. Citadel Security, 2003, Data Sheet, Citadel Security, Website accessed 20 July 2004, http://www.citadel.com/Downloads/Hercules_Datasheet.pdf Clark, Mark H. 2003, Hacker Culture. Isis, Philadelphia, 4, Dec, (4), pp. 776 - 7. Collett, Stacy, 2002, Manage Those Patches!, ComputerWorld Inc, Website accessed 6 September 2004 http://www.stbemard.com/products/updateexpert/reviews/CompWorld-Jul02.pdf Computer Advisory Incident Capability, 2004, NID Introduction, US Department of Energy, Website accessed 7 April 2004, http://ciac.11nl.gov/cstc/nid/intro.html Connolly, P. J., 2002, Why we hack, Info World, 12, Aug. 24 (32); p. 28. Conway, Maura, 2003, Hackers as terrorists? Why it doesn't compute, Computer Fraud & Security, 12 December, pp 10-13. Corbitt, Terry, 2003, Tracking the hacker, Management Services, 47, April, (4); pp. 20 - 21. Crosbie, Mark J. and Benjamin A. Kuperman, 2001, A Building Block Approach to Intrusion Detection, Recent Advances in Intrusion Detection. Website accessed 20 May 2004. http://www.raidsymposium. org/raid2001/papers/crosbie_kupeiman_raid2001.pdf. David, Jon, 2001, The Ins and Outs of Intrusion Detection, Network Security, 10, 31st October, pp. 13-15. David, Jon, 2002, Policy enforcement in the workplace, Computers & Security, 21, (6), 1 October, pp. 506- 513. Denning, Dorothy, E. 1987, An Intrusion Detection Model, IEEE Transactions on Software Engineering, Number 2, February, p. 222 Dictionary.com, 2005, Dictionag.com/patch, Lexico Publishing, Website accessed 6 September 2004, http://dictionary.reference.com/search?q-patch Dictionary.com, 2005, Dictionary.com/policy, Lexico Publishing, Website accessed 3 August 2004, http://dictionary.reference.com/search?q=policy Dictionary.com. 2004, Dictionary.com/firewall, Lexico Publishing Group, Website. Accessed 2 May 2004. http://clictionaryseference.com/searchArfirewall Dreyfus, Suelett, 2002, Cracking the hackers' code, August 20, http://smh.corn.au/articles/2002/08/20/1029114072039.html Durst, Robert, Terrence Champion, Brian Witten, Eric Miller, and Luigi Spagnuolo, 1999, Testing and evaluating computer intrusion detection systems, Communications of the ACM, 42 (7), July, pp. 53- 61. Entercept Security, 2001, Attackers And Their Tools: How Entercept Protects Servers, Entecept Security, Website accessed 1. 3 July 2004, http://www.nai.com/us/_tier2/productsLmedia/mcafee/wp_attackerstools.pdf Fitzgerald, Michael, 2004, Hackers, Crackers and Script Kiddies, ExtremeTech.com, January 8, p. 1. FreeBSD, FreeBSD Handbook, freebsd.org, 2004. Website accessed 2 May 2004. http://www.freebsd.org/doc/en_US.IS08859-1/books/handbook/firewalls.html. Furnell, S. M., and M. J. Warren, 1999, Computer hacking and cyber terrorism: the real threats in the new millennium? Computers & Security, 18 (1), pp. 28-34. Gordon, Lawrence A, Martin P. Loeb, William Lucyshyn and Robert Richardson, 2004, CSI/FBI Computer Crime and Security Survey, Computer Security Institute. Website accessed 13 July 2004, http://www.usdoj.gov/criminal/cybercrime/CSI_FBI.htm Govinda, S., 2002, Hacking and Intrusion Detection Management, University of Montana, Website accessed 17 August 2004, ncb.intnet.mu/ncb/events/cyber/pres4. ppt Grover, Sandeep, 2003, Buffer Overflow Attacks and Their Countermeasures, SSC Publications, Website accessed 12 August 2004, http://www.linuxjoumal.com/article.php?sid=6701 Hagopian, Stephanie, 2004, Network-Based Intrusion Prevention System Technology, SANS Institute, 7 April 2004, www.giac.org/practical/GSEC/Stephanie_Hagopian_GSEC.pdf Hancock, Bill, 1999, A unique Canadian approach Invite the hacker to nail your networks, Computers & Security, 18 (2), pp. 103-104. Hancock, Bill, 1999, Hackers attack US Government web sites in protest of Chinese embassy bombing, Computers & Security, 18 (4), p.279. Hancock, Bill, 2000, NASA Hacker Pleads Guilty, Computers & Security, 19 (8), 1 December, pp. 668- 669. Henning, Ronda, and Richard Caliari, 2003, Behavior-Based Intrusion Prevention, Harris Corporation, Website accessed 7 May 2004, http://www.stat.harris.com/solutions/bbip.asp HighTower Software, 2004, Towerview, HighTower Software, Website accessed 20 July 2004, http://www.hightowersecurity.com/ProdOverview.html Hunt, R. and T. Verwoerd, 2003, Reactive firewalls—a new technique, Computer Communications, 26, pp. 1302-1317. Hunter, Philip, 2003, Distributed Intrusion Detection Systems (DWS) can make security more adaptive, Network Security, 3, March, pp. 16-18. ICSA Labs. Online Firewall Buyer's Guide, ICSAlabs.com, 2004. Website accessed 28 April 2004. http://www.icsalabs.com/html/communities/firewalls/buyers_guide/index.shtml. Innella, Paul, 2001, The Evolution of Intrusion Detection Systems, Tetrad Digital Integrity, Website accessed 7 April 2004, http://www.securityfocus.com/infocus/1514. Internet Security Systems, 2004, Methods, Internet Security Systems, Website accessed 18 August 2004 http://www.iss.net/security_center/advice/Underground/Hacking/Methods/default.htm IT Security, 2002, Computer Security Dictionary, ITsecurity.com, Website accessed 2 May 2004, http://www.itsecurity.com/dictionary/dictionary.htm. ITsecurity.com, 2004, Attack, ITsecurity.com, Website accessed 31 August 2004 http://www.itsecurity.com/dictionary/attack.htm ITsecurity.com, 2004, Black Hats/White Hats, ITsecurity.com, Website accessed 6 August 2004, http://www.itsecurity.com/dictionary/black.htm Jackson, Jeromie, 1997, Making distinctions between firewall technologies, Computer Technology Review; Winter, p. 38. Johnson, Mark Webb, nd., Intrusion Detection & Prevention, Network Box Corporation. www.hkcert.org/ppt/event096/idp.pdf. Kovacich, Geald, L., 1995, Local Area Networks Security: Establishing Policies and Procedures, Network Security, 1, January, pp. 13-16. Krull, Joseph E., 2003, What to expect from your 1PS, Communications News, 40, October, (10), p. 19. Lim, Jeanee, 2003, Intrusion detection & prevention systems, Asia Computer Weekly June 30th, p. 1. Lindstrom, Pete, 2004, Intrusion Prevention Systems (IPS): Next Generation Firewalls, Website accessed 26 May 2004, www.forum-intrusion.com/SpireIPS_Whitepaper.pdf McAfee Security, 2004, McAfee IntruShield Security Management, McAfee Security, Website accessed 20 July 2004 http://www.networkassociates.com/us/products/sniffer/network ips/global_manager.htm McHugh, John, Christie, A., and Allen, J., 2000, The Role of Intrusion Detection Systems, IEEE Software, October 2000, Website accessed 28 May 2004. http://www.computer.org/software/so2000/pdf/s5042.pdf. Meyer, Helen, 1997, A History of Firewall Technology, Computers & Security, 16 (4), p. 331. Meyer, Helen, 1998, Is network intrusion detection software being used correctly?, Computers & Security, 17 (6), p.521. Microsoft Corporation, 2004, Microsoft Guide to Security Patch Management, Microsoft Corporation, Website accessed 6 September 2004, http://netsecurity.about.com/library/Microsoft_Guide_to_Security_Patch_Management_vl.exe Mogul, Jeffery C., 1989, Simple and Flexible Datagram Access Controls for Unix-based Gateways, USENIX Conference Proceedings, pp. 203-221. Najmi, 2002, Types of Attacks on Web Servers, AgMAY Inc, Website accessed 12 August 2004, http://www.techiwarehouse.com/Articles/2002-06-24.html Napier, Duncan, 2001, IPTables/NetFilter - Linux's next-generation stateful packet filter, Sys Admin, 10 (12), December, pp. 8-13. Netmaster, 2002, Dynamic Packet Filtering (DPF), NetMaster Digital Security, Website accessed 2 May 2004. http://www.netmaster.com/products/ggos-dpf.pdf. Netscreen Technologies, 2003, Comparison of Firewall, Intrusion Prevention and Antivirus Technologies, Netscreen. Technologies, website accessed 7 April 2004, http://www.ncs.cz-novinky/seminar/fw_idp.pdf. Network Associates, 2003, Intrusion Prevention: Myths, Challenges, and Requirements, Network Associates, Website accessed 5 April 2004, www.networkassociates.com/us/tier2/productsLmedia/sniffer/wp intrusionprevention.pdf Novell, 2000, Fundamentals of Packet Filtering, Novell.com,. Website accessed 28 April 2004. http://developer.novell.com/research/appnotes/2000/septembe/02/a0009023.htm. NSS Group, 2004, Intrusion Prevention Systems (IPS), The NSS Group Ltd, Website accessed 26 May 2004, http://www.nss.co.uk/WhitePapers/intrusion_prevention_systems.htm Okena Security, 2004, Storm Watch, UK Security focus, Website accessed 20 July 2004 http://www.uksecurityfocus.com/products/okena/ O'Rourke, Morgan, 2004, Cyber-Extortion. Evolves, Risk Management, 51, April, (4); p. 10. Packer, Ryon, 2001, Protecting the Network: NIDS: the logical first step in intrusion detection deployment, Network Security, 12, December, pp. 10-11. PC Help, 1999, What is a Firewall, PC Help, Website. Accessed 13 May 2004, http://www.pchelp. org/www.nwinternet.com/pchelp/security/firewalls.htm Philippsohn, Steven, 2002, Hacker attacks, Management Today, December, p. 42. Pierce, Barry. How Firewalls Work, San Jose State University, 2003. Website accessed 2 May 2004. http://www.cob.sjsu.edu/wong_r/b118/presentation/firewall-bp.html. Raikow, David, 2000, Grey Hats, Black Hats, and Script Kiddies, CNET Networks Inc, Website accessed 6 Spetember 2004 http://news.zdnet.co.uk/software/0,39020381,2078226,00.htm Red Hat Inc, 2004, Attackers and Vulnerabilities, Red Hat Inc, Website accessed 12 August 2004, http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/ch-risk.html Ronnau, Lou, 1999, Securing Routers Against Hackers and Denial of Service Attacks, Cisco Systems, Website accessed 17 August 2004, http://net-services.ufl.edu/security/itsa/attacks-ronnau.ppt. Roy Troxel, 2003, Social Engineering and other Low-Tech Hacking Methods, eDevCafe, Website accessed 12 August 2004 http://www.edevcafe.com/viewdoc.php?eid=472 Sana Security, 2004, Pre-empt and Defeat Automated Malware Attacks with Primary Response, Sana Security, Website accessed 20 July 2004, http://www.sanasecurity.com/products/index.php Schepers, F. 1998, Network- Versus Host-based Intrusion Detection, Information Security Technical Report, 3 (4), pp. 32-42. Schmidt, Charles and Tom Darby. The What, Why, and How of the 1988 Internet Worm, Snowplow.com, 2001. Website accessed 13 May 2004. Secure Computing, 2003, Intrusion Prevention Systems (IPS), Secure Computing Corporation, Website accessed March 2004, http://www.condyn.net/download/Intru-Preven-WP1-Aug03-vF.pdf Sheldon, Tom, 2002, General firewall Paper, WindowSecurity.com, Website accessed 28 April 2004. http://www.secinfnet/firewalls_and_VPN/GeneralFirewall_White_Paper.html Sonic WALL, 2004, SonicWALL Intrusion Prevention Service, SonicWALL, Website accessed 20 July 2004 http://www.sonicwall.corn/products/ips.html Sourcefire, 2003, Snort 2.0: Detection revisited, Snort. org, 1 February 2003, Website accessed 31 May 2004, http://www.sourcefire.com/technology/whitepapers/sfsnort20_detection_rvstd. pdf. Sundaram, Aurobindo, 1996, An Introduction to Intrusion Detection, Associates of Computer Machinery, Website accessed 9 April 2004. http://www.acm.org/crossroads/xrds2-4/intrus.html. Surfcontrol, 2004, Surfcontrol Resource Center , Surfcontrol, Website accessed 3 August 2004, http://www.surfcontrol.com/resources/aup/ Symantec Corporation, 2003, Knowledge Base Document, Symantec Corporation, Website accessed 20 July 2004 www.symantec.com Symantec Corporation, 2004, Symantec Internet Security Threat Report, Symantec Corporation, Website accessed 6 September 2004, https://enterprisesecurity.symantec.com/Content/displaypdf.cfm?SSL=YES&PDFID-1034 SysUpdate, 2002, Patch Management Best Practices Summary, SecurityProfiling.com, Website accessed 6 September 2004, www.securityprofiling.com/pdf/Patch_ Management_ Best_ Practices Summary.pdf. Talley, Brooks and Mark Pace, 2000, Choosing a firewall requires good advice, thorough knowledge of proxies and states, InfoWorld, 22, Jan. 10, p. 52. TechRepublic. Strengthen your network defences with these four steps, ZDnet.com, 2003. Website accessed 28 April 2004. http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2913584,00.html. Techtarget. Dynamic Packet Filter, Techtarget.com, 2001. Website accessed 2 May 2004. http://searchnetworking.techtarget.com/sDefinition/0„sid7_gci212023,00.html. Unisys, 2004, Security Patch Management, Townsend & Taphouse, Website accessed 6 September 2004, http://www.itsecurity.com/papers/unisysl.htm University of Otago, 2004, Security Patching, Univerisity of Otago, Website accessed 6 September 2004, http://policy01.otago.ac.nz/policies/Verwoerd, Theuns and Ray Hunt, 2002a, usion Detection Techniques and approaches, Computer Communications, 24, pp. 1356-1365. Verwoerd, Theuns and Ray Hunt, 2002b, Security architecture testing using IDS a case study, Computer Communications, 25 (15), pp. 1402-1412. Von Solms, Basie and Rossouw von Solms, 2004, The 10 deadly sins of information security management, Computers & Security, 23 (5), pp. 371 – 376. Webopedia, 2004, What is a Firewall?, Jupitermedia Corporation, 2004. Website accessed 28 April 2004 http://www.webopedia.com/TERM/f/firewall.html. Webopedia, 2004, What is a Patch?, Jupitermedia Corporation, Website accessed 6 September 2004 http://www.webopedia.com/TERM/P/patch.html Whitman, Michael E and Herbert J Mattord, 2003, Principles of Information Security, Thomson Publishing. Wood, Charles Cresson, 1995, Writing InfoSec Policies, Computers & Security, 14, pp. 667-674

    Intrusion prevention systems: How do they prevent intrusion?

    Get PDF
    Intrusion Prevention Systems (IPS) are the latest in a line of products created to counter network attacks. This thesis has explored the history of products manufactured to protect network systems from attacks. An experiment was conducted to find out what an attack on a systems looked like and to gauge the success of current IPS software. Results indicated that current IPS were reasonably effective and that the methodology of attacking a system was predictable, allowing administrators scope for putting methods in place to counter attacks.UnpublishedAdomavicius, Gedas, 2003, Information Security, University of Minnesota, Website accessed 28 April 2004. http://ids.csom.umn.edu/faculty/gedas/6452/slides/IT5-6pp.pdf. Al-Shaer, Ehab, 2003, Why Network Security, DePaul. University, Website accessed 12 August 2004, http://www.mnlab.cs.depaul.edu/-ehab/Courses/TDC572/PDF/1-motive&attack.pdf. Alvarez, Sergio, 2004, Intro to Win32 Exploits, Hack3rs.org, Website accessed 14 September 2004, http://hack3rs.org/-shadown/Twister/papers/Intro%20to%20Win32%20Exploits.pdf Anderson, James P, 1980, Computer Security Threat Monitoring and Surveillance, Website accessed 23 April 2004, http://csrc.nist.gov/publications/history/ande80.pdf. Anon, 1997, IT security policies dated Computer Fraud & Security, 12, December p. 3. Anon, 2001, Microsoft make anti-hacker film Network Security, 6, 1st June, p.2. Anon, 2002, Where do all the hackers come from? Computer Fraud & Security, 3, 1st March, p. 2. Anon, 2002a, Italian police arrest hacker group Computer Fraud & Security, 2, 1st February, p.4. Anon, 2002c, Microsoft calls on hacker expert Computer Fraud & Security, 3, 1st March, pp. 3-4. Anon, 2003a, Computer security and operating system updates Information and Software Technology, 45 (8), pp. 461-467. Anon, 2003b, Hacker breaches 8 million credit card accounts Computer Fraud & Security, 3, March, p.l. Anon, 2003c, Hacker group - cracked Network Security, 2, February, p.3. Anon, 2003d, Hackers control 3 million servers Network Security, 7, July, pp. 1-2. Anon, 2003e, Black. Hat Conference: Not Just Hackers, Network Security, 9, September, pp. 5-6. Anon, A Hacker's Ethics and Hacking Methods, Virgina Tech, Website accessed 17th August 2004, http://courses.cs.vt.edut-cs3604/support/Assignments/Final.Assmt.F99/Hacking/handoutl.htm. Anti-Hack, 2001, History of Firewalls, Website accessed 2 May 2004. http://dmsweb.badm.sc.edu/mgsc890/firewalls/fire2.htm. Argus Systems Group, 2004, Data Sheet, Website accessed 20 July 2004, http://www.argussystems. com/product/overview/lx/#PitBull_LX Austen, J. 1997, Can the laws really cut down hacking? Information Security Technical Report, 2, (1), p.5. Boran, Sean, 2003, IT Security Cookbook, boran.com, Website accessed 3 May 2004. http://www.boran.com/security/index.html. Caswell, Brian and Marty Roesch, 2004, What is Snort?. Snort.org. Website. Accessed 31 May 2004. http://www.snort.org/about.html Cisco Systems, 2002, Evolution of the Firewall, Cisco Systems (28 September 2002), Website accessed 13 May 2004. http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ch3. htm. Citadel Security, 2003, Data Sheet, Citadel Security, Website accessed 20 July 2004, http://www.citadel.com/Downloads/Hercules_Datasheet.pdf Clark, Mark H. 2003, Hacker Culture. Isis, Philadelphia, 4, Dec, (4), pp. 776 - 7. Collett, Stacy, 2002, Manage Those Patches!, ComputerWorld Inc, Website accessed 6 September 2004 http://www.stbemard.com/products/updateexpert/reviews/CompWorld-Jul02.pdf Computer Advisory Incident Capability, 2004, NID Introduction, US Department of Energy, Website accessed 7 April 2004, http://ciac.11nl.gov/cstc/nid/intro.html Connolly, P. J., 2002, Why we hack, Info World, 12, Aug. 24 (32); p. 28. Conway, Maura, 2003, Hackers as terrorists? Why it doesn't compute, Computer Fraud & Security, 12 December, pp 10-13. Corbitt, Terry, 2003, Tracking the hacker, Management Services, 47, April, (4); pp. 20 - 21. Crosbie, Mark J. and Benjamin A. Kuperman, 2001, A Building Block Approach to Intrusion Detection, Recent Advances in Intrusion Detection. Website accessed 20 May 2004. http://www.raidsymposium. org/raid2001/papers/crosbie_kupeiman_raid2001.pdf. David, Jon, 2001, The Ins and Outs of Intrusion Detection, Network Security, 10, 31st October, pp. 13-15. David, Jon, 2002, Policy enforcement in the workplace, Computers & Security, 21, (6), 1 October, pp. 506- 513. Denning, Dorothy, E. 1987, An Intrusion Detection Model, IEEE Transactions on Software Engineering, Number 2, February, p. 222 Dictionary.com, 2005, Dictionag.com/patch, Lexico Publishing, Website accessed 6 September 2004, http://dictionary.reference.com/search?q-patch Dictionary.com, 2005, Dictionary.com/policy, Lexico Publishing, Website accessed 3 August 2004, http://dictionary.reference.com/search?q=policy Dictionary.com. 2004, Dictionary.com/firewall, Lexico Publishing Group, Website. Accessed 2 May 2004. http://clictionaryseference.com/searchArfirewall Dreyfus, Suelett, 2002, Cracking the hackers' code, August 20, http://smh.corn.au/articles/2002/08/20/1029114072039.html Durst, Robert, Terrence Champion, Brian Witten, Eric Miller, and Luigi Spagnuolo, 1999, Testing and evaluating computer intrusion detection systems, Communications of the ACM, 42 (7), July, pp. 53- 61. Entercept Security, 2001, Attackers And Their Tools: How Entercept Protects Servers, Entecept Security, Website accessed 1. 3 July 2004, http://www.nai.com/us/_tier2/productsLmedia/mcafee/wp_attackerstools.pdf Fitzgerald, Michael, 2004, Hackers, Crackers and Script Kiddies, ExtremeTech.com, January 8, p. 1. FreeBSD, FreeBSD Handbook, freebsd.org, 2004. Website accessed 2 May 2004. http://www.freebsd.org/doc/en_US.IS08859-1/books/handbook/firewalls.html. Furnell, S. M., and M. J. Warren, 1999, Computer hacking and cyber terrorism: the real threats in the new millennium? Computers & Security, 18 (1), pp. 28-34. Gordon, Lawrence A, Martin P. Loeb, William Lucyshyn and Robert Richardson, 2004, CSI/FBI Computer Crime and Security Survey, Computer Security Institute. Website accessed 13 July 2004, http://www.usdoj.gov/criminal/cybercrime/CSI_FBI.htm Govinda, S., 2002, Hacking and Intrusion Detection Management, University of Montana, Website accessed 17 August 2004, ncb.intnet.mu/ncb/events/cyber/pres4. ppt Grover, Sandeep, 2003, Buffer Overflow Attacks and Their Countermeasures, SSC Publications, Website accessed 12 August 2004, http://www.linuxjoumal.com/article.php?sid=6701 Hagopian, Stephanie, 2004, Network-Based Intrusion Prevention System Technology, SANS Institute, 7 April 2004, www.giac.org/practical/GSEC/Stephanie_Hagopian_GSEC.pdf Hancock, Bill, 1999, A unique Canadian approach Invite the hacker to nail your networks, Computers & Security, 18 (2), pp. 103-104. Hancock, Bill, 1999, Hackers attack US Government web sites in protest of Chinese embassy bombing, Computers & Security, 18 (4), p.279. Hancock, Bill, 2000, NASA Hacker Pleads Guilty, Computers & Security, 19 (8), 1 December, pp. 668- 669. Henning, Ronda, and Richard Caliari, 2003, Behavior-Based Intrusion Prevention, Harris Corporation, Website accessed 7 May 2004, http://www.stat.harris.com/solutions/bbip.asp HighTower Software, 2004, Towerview, HighTower Software, Website accessed 20 July 2004, http://www.hightowersecurity.com/ProdOverview.html Hunt, R. and T. Verwoerd, 2003, Reactive firewalls—a new technique, Computer Communications, 26, pp. 1302-1317. Hunter, Philip, 2003, Distributed Intrusion Detection Systems (DWS) can make security more adaptive, Network Security, 3, March, pp. 16-18. ICSA Labs. Online Firewall Buyer's Guide, ICSAlabs.com, 2004. Website accessed 28 April 2004. http://www.icsalabs.com/html/communities/firewalls/buyers_guide/index.shtml. Innella, Paul, 2001, The Evolution of Intrusion Detection Systems, Tetrad Digital Integrity, Website accessed 7 April 2004, http://www.securityfocus.com/infocus/1514. Internet Security Systems, 2004, Methods, Internet Security Systems, Website accessed 18 August 2004 http://www.iss.net/security_center/advice/Underground/Hacking/Methods/default.htm IT Security, 2002, Computer Security Dictionary, ITsecurity.com, Website accessed 2 May 2004, http://www.itsecurity.com/dictionary/dictionary.htm. ITsecurity.com, 2004, Attack, ITsecurity.com, Website accessed 31 August 2004 http://www.itsecurity.com/dictionary/attack.htm ITsecurity.com, 2004, Black Hats/White Hats, ITsecurity.com, Website accessed 6 August 2004, http://www.itsecurity.com/dictionary/black.htm Jackson, Jeromie, 1997, Making distinctions between firewall technologies, Computer Technology Review; Winter, p. 38. Johnson, Mark Webb, nd., Intrusion Detection & Prevention, Network Box Corporation. www.hkcert.org/ppt/event096/idp.pdf. Kovacich, Geald, L., 1995, Local Area Networks Security: Establishing Policies and Procedures, Network Security, 1, January, pp. 13-16. Krull, Joseph E., 2003, What to expect from your 1PS, Communications News, 40, October, (10), p. 19. Lim, Jeanee, 2003, Intrusion detection & prevention systems, Asia Computer Weekly June 30th, p. 1. Lindstrom, Pete, 2004, Intrusion Prevention Systems (IPS): Next Generation Firewalls, Website accessed 26 May 2004, www.forum-intrusion.com/SpireIPS_Whitepaper.pdf McAfee Security, 2004, McAfee IntruShield Security Management, McAfee Security, Website accessed 20 July 2004 http://www.networkassociates.com/us/products/sniffer/network ips/global_manager.htm McHugh, John, Christie, A., and Allen, J., 2000, The Role of Intrusion Detection Systems, IEEE Software, October 2000, Website accessed 28 May 2004. http://www.computer.org/software/so2000/pdf/s5042.pdf. Meyer, Helen, 1997, A History of Firewall Technology, Computers & Security, 16 (4), p. 331. Meyer, Helen, 1998, Is network intrusion detection software being used correctly?, Computers & Security, 17 (6), p.521. Microsoft Corporation, 2004, Microsoft Guide to Security Patch Management, Microsoft Corporation, Website accessed 6 September 2004, http://netsecurity.about.com/library/Microsoft_Guide_to_Security_Patch_Management_vl.exe Mogul, Jeffery C., 1989, Simple and Flexible Datagram Access Controls for Unix-based Gateways, USENIX Conference Proceedings, pp. 203-221. Najmi, 2002, Types of Attacks on Web Servers, AgMAY Inc, Website accessed 12 August 2004, http://www.techiwarehouse.com/Articles/2002-06-24.html Napier, Duncan, 2001, IPTables/NetFilter - Linux's next-generation stateful packet filter, Sys Admin, 10 (12), December, pp. 8-13. Netmaster, 2002, Dynamic Packet Filtering (DPF), NetMaster Digital Security, Website accessed 2 May 2004. http://www.netmaster.com/products/ggos-dpf.pdf. Netscreen Technologies, 2003, Comparison of Firewall, Intrusion Prevention and Antivirus Technologies, Netscreen. Technologies, website accessed 7 April 2004, http://www.ncs.cz-novinky/seminar/fw_idp.pdf. Network Associates, 2003, Intrusion Prevention: Myths, Challenges, and Requirements, Network Associates, Website accessed 5 April 2004, www.networkassociates.com/us/tier2/productsLmedia/sniffer/wp intrusionprevention.pdf Novell, 2000, Fundamentals of Packet Filtering, Novell.com,. Website accessed 28 April 2004. http://developer.novell.com/research/appnotes/2000/septembe/02/a0009023.htm. NSS Group, 2004, Intrusion Prevention Systems (IPS), The NSS Group Ltd, Website accessed 26 May 2004, http://www.nss.co.uk/WhitePapers/intrusion_prevention_systems.htm Okena Security, 2004, Storm Watch, UK Security focus, Website accessed 20 July 2004 http://www.uksecurityfocus.com/products/okena/ O'Rourke, Morgan, 2004, Cyber-Extortion. Evolves, Risk Management, 51, April, (4); p. 10. Packer, Ryon, 2001, Protecting the Network: NIDS: the logical first step in intrusion detection deployment, Network Security, 12, December, pp. 10-11. PC Help, 1999, What is a Firewall, PC Help, Website. Accessed 13 May 2004, http://www.pchelp. org/www.nwinternet.com/pchelp/security/firewalls.htm Philippsohn, Steven, 2002, Hacker attacks, Management Today, December, p. 42. Pierce, Barry. How Firewalls Work, San Jose State University, 2003. Website accessed 2 May 2004. http://www.cob.sjsu.edu/wong_r/b118/presentation/firewall-bp.html. Raikow, David, 2000, Grey Hats, Black Hats, and Script Kiddies, CNET Networks Inc, Website accessed 6 Spetember 2004 http://news.zdnet.co.uk/software/0,39020381,2078226,00.htm Red Hat Inc, 2004, Attackers and Vulnerabilities, Red Hat Inc, Website accessed 12 August 2004, http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/ch-risk.html Ronnau, Lou, 1999, Securing Routers Against Hackers and Denial of Service Attacks, Cisco Systems, Website accessed 17 August 2004, http://net-services.ufl.edu/security/itsa/attacks-ronnau.ppt. Roy Troxel, 2003, Social Engineering and other Low-Tech Hacking Methods, eDevCafe, Website accessed 12 August 2004 http://www.edevcafe.com/viewdoc.php?eid=472 Sana Security, 2004, Pre-empt and Defeat Automated Malware Attacks with Primary Response, Sana Security, Website accessed 20 July 2004, http://www.sanasecurity.com/products/index.php Schepers, F. 1998, Network- Versus Host-based Intrusion Detection, Information Security Technical Report, 3 (4), pp. 32-42. Schmidt, Charles and Tom Darby. The What, Why, and How of the 1988 Internet Worm, Snowplow.com, 2001. Website accessed 13 May 2004. Secure Computing, 2003, Intrusion Prevention Systems (IPS), Secure Computing Corporation, Website accessed March 2004, http://www.condyn.net/download/Intru-Preven-WP1-Aug03-vF.pdf Sheldon, Tom, 2002, General firewall Paper, WindowSecurity.com, Website accessed 28 April 2004. http://www.secinfnet/firewalls_and_VPN/GeneralFirewall_White_Paper.html Sonic WALL, 2004, SonicWALL Intrusion Prevention Service, SonicWALL, Website accessed 20 July 2004 http://www.sonicwall.corn/products/ips.html Sourcefire, 2003, Snort 2.0: Detection revisited, Snort. org, 1 February 2003, Website accessed 31 May 2004, http://www.sourcefire.com/technology/whitepapers/sfsnort20_detection_rvstd. pdf. Sundaram, Aurobindo, 1996, An Introduction to Intrusion Detection, Associates of Computer Machinery, Website accessed 9 April 2004. http://www.acm.org/crossroads/xrds2-4/intrus.html. Surfcontrol, 2004, Surfcontrol Resource Center , Surfcontrol, Website accessed 3 August 2004, http://www.surfcontrol.com/resources/aup/ Symantec Corporation, 2003, Knowledge Base Document, Symantec Corporation, Website accessed 20 July 2004 www.symantec.com Symantec Corporation, 2004, Symantec Internet Security Threat Report, Symantec Corporation, Website accessed 6 September 2004, https://enterprisesecurity.symantec.com/Content/displaypdf.cfm?SSL=YES&PDFID-1034 SysUpdate, 2002, Patch Management Best Practices Summary, SecurityProfiling.com, Website accessed 6 September 2004, www.securityprofiling.com/pdf/Patch_ Management_ Best_ Practices Summary.pdf. Talley, Brooks and Mark Pace, 2000, Choosing a firewall requires good advice, thorough knowledge of proxies and states, InfoWorld, 22, Jan. 10, p. 52. TechRepublic. Strengthen your network defences with these four steps, ZDnet.com, 2003. Website accessed 28 April 2004. http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2913584,00.html. Techtarget. Dynamic Packet Filter, Techtarget.com, 2001. Website accessed 2 May 2004. http://searchnetworking.techtarget.com/sDefinition/0„sid7_gci212023,00.html. Unisys, 2004, Security Patch Management, Townsend & Taphouse, Website accessed 6 September 2004, http://www.itsecurity.com/papers/unisysl.htm University of Otago, 2004, Security Patching, Univerisity of Otago, Website accessed 6 September 2004, http://policy01.otago.ac.nz/policies/Verwoerd, Theuns and Ray Hunt, 2002a, usion Detection Techniques and approaches, Computer Communications, 24, pp. 1356-1365. Verwoerd, Theuns and Ray Hunt, 2002b, Security architecture testing using IDS a case study, Computer Communications, 25 (15), pp. 1402-1412. Von Solms, Basie and Rossouw von Solms, 2004, The 10 deadly sins of information security management, Computers & Security, 23 (5), pp. 371 – 376. Webopedia, 2004, What is a Firewall?, Jupitermedia Corporation, 2004. Website accessed 28 April 2004 http://www.webopedia.com/TERM/f/firewall.html. Webopedia, 2004, What is a Patch?, Jupitermedia Corporation, Website accessed 6 September 2004 http://www.webopedia.com/TERM/P/patch.html Whitman, Michael E and Herbert J Mattord, 2003, Principles of Information Security, Thomson Publishing. Wood, Charles Cresson, 1995, Writing InfoSec Policies, Computers & Security, 14, pp. 667-674
    corecore