CH11 NetSec6e
CH11 NetSec6e
Essentials
Sixth Edition
by William Stallings
• Viewing sensitive data, including payroll records and medical information, without
authorization
• Running a packet sniffer on a workstation to capture usernames and passwords
• Using a permission error on an anonymous FTP server to distribute pirated software and
music files
• Dialing into an unsecured modem and gaining internal network access
• Posing as an executive, calling the help desk, resetting the executive’s e-mail password, and
learning the new password
• Using an unattended, logged-in workstation without permission
• CERTs
• Computer emergency response teams
• These cooperative ventures collect information about system vulnerabilities and
disseminate it to systems managers
• Hackers also routinely read CERT reports
• It is important for system administrators to quickly insert all software patches to
discovered vulnerabilities
• Countermeasures:
4. Collect information about users, such as their full names, the names of their
spouse and children, pictures in their office, and books in their office that are
related to hobbies.
5. Try users’ phone numbers, Social Security numbers, and room numbers.
8. Tap the line between a remote user and the host system.
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Intrusion Detection
• A system’s second line of defense
• Rule-based detection
• Involves an attempt to define a set of rules or attack patterns that can be used
to decide that a given behavior is that of an intruder
• Often referred to as signature detection
Measures
That
May
Be
Used
For
Intrusion
Detection
(This table can be found on
page 371 in the textbook.)
• USTAT
• A model independent of specific audit records
• Deals in general actions rather than the detailed specific actions
recorded by the UNIX auditing mechanism
• Implemented on a SunOS system that provides audit records on 239
events
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 11.2
USTAT Actions versus SunOS Event Types
• Because any attack against the honeypot is made to seem successful, administrators have
time to mobilize and log and track the attacker without ever exposing productive systems
• Recent research has focused on building entire honeypot networks that emulate an
enterprise, possible with actual or simulated traffic and data
• Bcrypt
• Developed for OpenBSD
• Probably the most secure version of the UNIX hash/salt scheme
• Uses a hash function based on the Blowfish symmetric block cipher
• Slow to execute
• Includes a cost variable
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 11.3
Passwords
Cracked
from a
Sample Set
of 13,797
Accounts
[KLEI90]
(This table can be found on page 386
in the textbook.)
* Computed as the number of matches divided by the search size. The more words that needed to be
© 2017 Pearson Education, Inc., Hoboken, NJ. tested for a match, the lower the cost/benefit ratio.
All rights reserved.
Password selection strategies
• The goal is to
eliminate guessable
passwords while
allowing the user to
select a password
that is memorable
• Four basic
techniques are in use: