How ddos attacks may be detected and alerted using snort

Assignment Help Computer Engineering
Reference no: EM131744091

Assignment

1. Describe how Distributed Denial-of-service (DDoS) attacks such as smurf attack may be detected and alerted using Snort.

2. Explain the following Snort rule. What sort of attack is it intended to detect? What network traffic pattern information is it looking for?

3. Write a rule using Snort syntax to detect an internal user executing a Windows "tracert" command to identify the network path to an external destination. What changes, if any, would you need to make to this rule to make it also work for a Unix/Linux "traceroute"?

4. Most network IDS tools are designed to optimize performance analyzing traffic using a variety of protocols specific to TCP/IP wired networks. Describe at least two intrusion detection scenarios where specialized types of monitoring and analysis are called for, explaining what limitations exist in conventional NIDS that make them insufficient to provide effective intrusion detection in the environments corresponding to these scenarios.

5. What is a multi-event signature? Provide at least two examples of multi-event signature activities or patterns that might be monitored with an intrusion detection system.

6. Snort rule has a metadata field, with zero or more policy values. Describe currently available policy values along with explanations.

7. Describe what the "fast_pattern" modifier means in Snort rules. Also, explain the differences between "fast_pattern" and "fast_pattern:only" modifiers with examples.

8. Describe the meaning of the following content options used in a Snort rule with matching and unmatching examples:

content:"GET"; depth:3; content:"downloads"; distance:10; within:9;

9. Define and differentiate false positive and false negative. Which is worse, and why? Give one example of each, drawn from any context that demonstrates your understanding of the terms.

Reference no: EM131744091

Questions Cloud

Statements regarding the classroom management : statements regarding the classroom management as a whole
Describe the products sold by the company to consumers : Select a business involved in e-commerce and create a written report addressing the following about the company's business model.
How the inventory process relates to the revenue : Describe how the inventory process relates to the revenue and purchasing processes
Discuss the organizations internal strength and weaknesses : Your observation of the organization's Internal Strength and Weaknesses, External Opportunities and Threats
How ddos attacks may be detected and alerted using snort : Describe how Distributed Denial-of-service (DDoS) attacks such as smurf attack may be detected and alerted using Snort.
3d printing in the supply chain : List three opportunities for 3D printing in the supply chain. List three threats for 3D printing in the supply chain.
What is the future value on december : What is the future value on December 31, 2022, of 6 annual cash flows of $50,000 with the first cash flow being made on December 31, 2016
Discuss security implications and provide a brief overview : Discuss security implications, and provide a brief overview of the HIPAA Privacy Rule in your presentation
One of the barriers of communication : Describe an example of a time when you experienced one of the barriers of communication. For example, have you tried to communicate with someone

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is a dont care condition

Explain how don't care conditions can be used to build a circuit using OR gates, AND gates, and inverters that produces an output of 1.

  Discuss information security related to the use of website

Evaluate the challenges in information security related to the use of website

  What extent should these measures go?

Focus in network security centers upon measures in preventing network intrusions and handling security events.

  Discuss the hacker group known as anonymous

Discuss the hacker group known as ‘Anonymous' and based on open source research

  Write an instruction sequence to subtract

Write an instruction sequence to subtract the 6-byte numbers stored at $1000~$1012 and $1013~$1015 and save the sum at $1100~$1102.

  How to create a script in knoppix 4.02

I am also using Knoppix 4.02 to , make the file below but I can not turn on vim text editor on . When I open up kWrite or Kate I get nothing and Konsole leave me lost when insert the following text below .

  Why java is currently a popular programming language

Why do you think that Java is currently a famous programming language? Do you think Java will continue to be as widely received as it has been, or do you think it will experience an eventual decline.

  Complexity of the human brain

Discuss the major strengths, weaknesses, and ethical issues on developing computing chips based off the human brain.

  Explain how businesses apply cryptography

Explain how businesses apply cryptography in maintaining information security.

  Http frame

Assume an HTTPS page links to an HTTP iframe where two are loaded from several origins. Should the browser display a warning dialog? If so describe why. If not, describe why not.

  How can one protect against virus outbreaks in organization

How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend? Use your textbook, internet, and other publications to research this topic.

  Explain the z-transform of the following system transfer

Discrete Time Systems, 1. a) Find the z-transform of the following system transfer function assuming the input is a unit staircase (i.e. zero order held). The sampling rate is T=0.2.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd