Your SlideShare is downloading. ×
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Chapter 12
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Chapter 12

546

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
546
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Linux Networking and Security Chapter 12 Network Intrusion Detection
  • 2. Network Intrusion Detection
    • Use network scanning and packet-sniffing utilities
    • Understand basic intrusion detection systems
    • Perform automated security audits of your Linux system
  • 3. Scanners and Sniffers
    • Cracker can employ the following techniques in order to gain access to a Linux system:
      • Port scanning, in which packets are sent to a host to gain information about it based on its response
      • Packet sniffing, in which every packet on the network has its header and data examined
    • Network administrators also use these techniques to check for security weaknesses, and though some feel their use is illegitimate, it is important to stay ahead of crackers
  • 4. Port Scanning
    • A port scan enables someone to identify a network’s operating system and any services that could potentially allow greater access
    • Port scans typically use the TCP protocol and its associated flags to gather information about the host and its network services
    • Some port scanners use ICMP and UDP packets, which do not provide as much data as TCP, but can offer some information that TCP cannot
  • 5. Port Scanning
  • 6. Port Scanning
    • The most widely used port-scanning utility is nmap, the network mapper
    • nmap is a command-line utility that uses a variety of scanning methods
    • nmap allows for fingerprinting hosts, greater output, and configuration of timing policy
    • nmap can also perform a Ping scan, which reports hosts that are reachable using ICMP echo packets
  • 7. Port Scanning
  • 8. Port Scanning
  • 9. Port Scanning
  • 10. Packet Sniffing
    • A packet sniffer allows for the examination of any or all of the traffic passing through a network cable or wireless space
    • An Ethernet card can enable packet sniffing only if it is operating in promiscuous mode
    • Users must be logged in as root to use this mode, so packet sniffers require root access
    • If encryption technologies such as SSH, GPG, and stunnel are used, packet data is more secure
  • 11. Packet Sniffing
    • Three popular Linux utilities are:
      • IPTraf displays individual network connections, with protocol and other data for each one, and it also displays statistics by protocols, certain host names, or certain IP addresses
      • tcpdump provides information similar to IPTraf, but it also includes more detailed information about network packets
      • Ethereal takes tcpdump a step farther in that it is a graphical network analysis tool
  • 12. Packet Sniffing
  • 13. Packet Sniffing
  • 14. Packet Sniffing
  • 15. Packet Sniffing
  • 16. Packet Sniffing
  • 17. Packet Sniffing
  • 18. Packet Sniffing
  • 19. Packet Sniffing
  • 20. Packet Sniffing
  • 21. Packet Sniffing
  • 22. Using Intrusion Detection Software
    • Intrusion detection is the process of noticing when someone is trying to break into (or has already broken into) a system
    • This category of software is called intrusion detection systems (IDS)
    • PortSentry, by Psionic, watches network ports for packets that appear to be port scans
    • A more complex tool than PortSentry is Linux IDS, or LIDS, which can alter the Linux kernel
  • 23. Using Intrusion Detection Software
    • Big Brother provides a different level of intrusion detection than LIDS and it uses a client/server model similar to SNMP
    • Big Brother includes a server that gathers data from clients on each network host and displays that data as a Web page
    • Some of the 26 standard services Big Brother will manage are DNS, FTP, HTTP, POP3, SSH, Telnet, disk space and memory usage
  • 24. Using Intrusion Detection Software
  • 25. Using Intrusion Detection Software
    • Suggested use of intrusion detection tools:
      • Use nmap to scan the system after configuration to check for security holes
      • Next use PortSentry to watch for outside hosts trying to port scan the server
      • Use LIDS to secure your file system and processes so that anyone who is able to gain unauthorized access will have very limited power
      • Use Big Brother to keep a constant eye on services that are provided on network servers
  • 26. System Security Audits
    • The best way to test confidence in the security of a Linux system is to perform a security audit
    • Security audits are reviews or tests of how secure the system is and what needs to be done to improve its security
    • A security audit could take the form of:
      • A careful review of the security policy
      • Use of special security-auditing software
  • 27. System Security Audits
    • One of the first security-auditing programs was called Security Administrator Tool for Analyzing Networks (SATAN)
    • The Security Administrator’s Integrated Network Tool (SAINT) replaced SATAN
    • SAINT uses a Web browser interface to manage an “attack” on a network and report vulnerabilities found
    • Other security audit tools are Tiger and SARA
  • 28. System Security Audits
  • 29. System Security Audits
  • 30. System Security Audits
  • 31. Chapter Summary
    • Port-scanning software lets anyone learn about the potentially vulnerable network access points on any networked computer
    • Port scanners use various combinations of TCP flags, UDP packets, and Ping packets to elicit responses that inform the scanner about the services running on the targeted host
    • When a host detects that someone is using a port scanner, software such as PortSentry can take action to prevent the completion of the port scan and block all future access by the host performing the scan
  • 32. Chapter Summary
    • The most used port-scanning software is nmap and graphical utilities are available as nmap front ends
    • Packet sniffers use the promiscuous mode of a NIC to capture all data passing through that node of the network, including all headers and payloads; Ethereal is a powerful and popular graphical packet sniffer
    • Packet sniffing is just one type - though the most comprehensive - of network traffic analysis; other programs such as IPTraf help network administrators analyze network traffic patterns based on protocol, point of origin or destination, and other factors
  • 33. Chapter Summary
    • The tcpdump program is a very popular network traffic analysis program that captures detailed information about network packets
    • Intrusion detection systems (IDS) are an important part of modern network security and they watch for signs of intruders trying to access your servers and help you respond appropriately
    • PortSentry is one piece of IDS software that detects port scans from programs like nmap; A more comprehensive package is LIDS, which alters the Linux kernel so that the root user has limited access
  • 34. Chapter Summary
    • Big Brother is a simpler IDS that watches the status of network services on multiple servers through a Web page interface
    • Security audits using security policies or specialized software can help network administrators see potential security problems and fix them before someone else finds them
    • One popular security-auditing software tool is SAINT and many others are available

×