Create a blacklist file and put it in the proper directory

Assignment Help Computer Engineering
Reference no: EM13313739

Homework Assignment #3

This homework assignment builds on the "unacceptable site" detection we worked on in assignment #2 (see attached file). In this exercise we will attempt to accomplish the same goal using the new reputation preprocessor in Snort. The documentation on the reputation preprocessor and the available configuration options are in section 2.2.19 of the Snort Manual (see attached file). The basic function of the reputation preprocessor is similar in many ways to basic firewall operation: the preprocessor evaluates source and destination IP addresses in network packets to see if they appear on either a "whitelist" of approved/acceptable addresses or a "blacklist" of prohibited addresses. Packets containing IP addresses on the blacklist are dropped. The overall intent for this assignment is to block access to the "bad" site you selected for HW#2 by adding the site to a blacklist and enabling the reputation preprocessor in in snort.conf.

To complete this assignment successfully, you will need to first edit the snort.conf file as follows:

• At the end of Step #1, either set the path to the reputation preprocessor file location or comment out these two lines (you can declare the blacklist file directly in the preprocessor configuration settings if you don't want to use a variable reference).

• At the end of Step #5, configure the reputation preprocessor. Look at the first configuration example on page 119 of the Snort Manual as a guide, which simply includes the preprocessor declaration and the specification of the blacklist and whitelist files. You can run the preprocessor with either or both of these files, so for our purposes you might just specify a blacklist file. The configuration could be as simple as: "preprocessor reputation: blacklist /etc/snort/black.list"

• Save the snort.conf file.

Now, create a blacklist file and put it in the proper directory (such as /etc/snort/rules on Linux or C:\Snort\etc\rules on Windows). A blacklist file is just a plain text file with one IP address (or address range, using CIDR notation) per line. The blacklist file name and file location should of course match what you specified in the preprocessor configuration in snort.conf. Then startup Snort as you would normally, open a browser, and visit the site corresponding to the IP address(es) in the blacklist file.

For this assignment, compose a short writeup for submission to your Assignments folder that includes the following:

1. The "unacceptable" site you selected in Homework #2 (you can pick a new one for this assignment if you prefer).

2. The IP address (individual, multiple, or a range) associated with that site. If you don't know the IP address, you can either open a command shell and ping the site (e.g. "ping www.facebook.com"), which will return the primary IP address on screen, or you can look up the site on Netcraft.com to find one or more IP addresses used by the site.

3. The contents of the blacklist file the reputation preprocessor references.

4. A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.

5. If you are able to get Snort to run successfully with the reputation preprocessor active, include the output produced (a copy of the ASCII log file is sufficient).

As in Homework Assignment #2, the successful completion of this exercise does not require you to use an actual inappropriate site. The primary purpose of this exercise is not to make you an expert in the reputation preprocessor, but to illustrate the point that there are often multiple viable approaches to accomplishing the same intrusion detection objectives.


Attachment:- ASSIGNMENT.rar

Reference no: EM13313739

Questions Cloud

What are the legal ways of doing disposal in the valley : A tank with a volume of 5,000 gal contains salt solution at an initial concentration (C0*) of 70,000 mg/L, but the concentration in the tank (C) needs to be reduced to 500 mg/L. Two approaches are being considered
Explain the frequency of the light given off by the flame : When a strontium salt is ignited, it burns with a red flame. The frequency of the light given off by this flame is greater than
Explain the decomposition of so3 to so2 : The decomposition of SO3 to SO2 and O2 , 24 Kcal/mole of heat is absorbed by the system.
Compute the distances nh3 gas and hcl gas : Calculate the distances NH3 gas and HCl gas would travel in this experiment if a 100.0-cm tube were used, based on the accepted molar masses for the two gases
Create a blacklist file and put it in the proper directory : A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.
Create a gantt chart for the rockiest project : Create a Gantt Chart for the Rockiest project that shows the beginning and end of the project, all the tasks that must be undertaken and who is responsible for them.
Explain how many g of pcl3 will be produced : Given the following reaction, if 32.5 g of Cl2 reacts completely with excess P, how many g of PCl3 will be produced. 2 P + 3 Cl2 --> 2 PCl3
Determine what is the standard deviation of the average time : The viscosity of a fluid can be measured in an experiment by dropping a small ball into a calibrated tube containing the fluid and observing the random variable X, the time it takes for the ball to drop the measured distance.
Explain how many joules of heat energy : Suppose you pick up a 15-pound ball of iron (such as a "shot-put" ball at a track event). The iron ball has the same temperature as the atmosphere (26 °C). How many joules of heat energy must the iron ball absorb to reach the temperature of your b..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determining the companys checkbook or ledger

The subcontractor says that original check was for only $10,750. Jonathan looks around office however was not able to determine the company checkbook or ledger.

  Point-to-point communication links

Suppose there is the wide-area network with N nodes, where N ≥ 2. Find out the smallest number of the point-to-point communication links such that each node within the network is able to talk to one another node?

  The purchase of hardware for the organization

What are important considerations for an organization to make while disposing of old computer equipment.

  Give an example of a program where consistency has caused

Can you give an example of a program where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Design a simple web-page designed to meet

design a simple web-page designed to meet the following requirements:

  What are the legal and regulatory ramifications

explain one e-Business failure. Explain what happened and what you would have done differently. Explain whether or not the e-Business practiced sound financial planning.

  Write proper sequence in design of a video rental database

Write proper sequence in design of a video rental database

  What is the dissimilatries between rfp and rfq

What is the dissimilatries between an RFP and an RFQ? Are they different, or the same? How does RFI associated to them

  Huffman coding for compression

Huffman coding for compression - Starting from the beginning of the bit sequence, convert each sequence of 8 consecutive bits into 1 byte. If the number of bits is not a multiple of 8, pad the end of the bit sequence with 0s.

  Wda wireless device application business models

Write down a 2.5 - 3 page paper comparing the WDA wireless device application business models utilized by Sprint, Verizon, and AT&T Wireless.

  What is the role in object-oriented programming

What is the difference between functional and imperative programming language?

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd