### How to set a rule that used by snort to detect an ack scan

Assignment Help Computer Engineering
##### Reference no: EM132265

Question

An ACK scan does not provide in order about whether a target machine's ports are open or closed, except rather whether or not access to those ports is being blocked by a firewall. If there is no response or an ICMP "destination unreachable" packet is received as a response, then port is blocked by a firewall. If scanned port replies with a RST packet, then ACK packet reached its intended host. So end port is not being filtered by a firewall. Note, though, that port itself may be open or closed.

Describe a rule or a set of rules that might be used by Snort to detect an ACK scan. Cleary express your assumption and explain your rules. What do you think Bro can do a better job detecting an ACK scan? Describe your answer in details.

#### Questions Cloud

 Explain the method to find cost of sorting the relation : Explain the method to find cost of sorting the relation In each case, how many combine passes are required? Analytical methods commonly used in industrial hygiene : Name two analytical methods commonly used in Industrial Hygiene. Illustrate your answer with two typical examples What are the four significant physical parameters that you would use to assess the thermal comfort of employees working in a hot and.. What is the specialization of Dottie's Tax facility : What is the specialization of Dottie's Tax facility At least 6 returns? (Round z-score computation to 2 decimal places and your final answer to 4 decimal places.) What security measures required to address vulnerabilities : What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company. How to set a rule that used by snort to detect an ack scan : How to set a rule that used by snort to detect an ACK scan What do you think Bro can do a better job detecting an ACK scan? How to create program that performs arithmetic function : How to create program that performs arithmetic function Prompt a user for values for the variables. Pass both variables to methods named sum() and difference(). What does ld 50 mean in industrial toxicology : What are the units commonly used in occupational exposure limits for quantifying the concentration of dust particles, vapours or gases and fibres? What does LD 50 mean in Industrial Toxicology How to create program that performs arithmetic function : How to create program that performs arithmetic function Prompt a user for values for the variables. Pass both variables to methods named sum() and difference(). How to create the clients by service rep report : How to create the clients by service rep report create mailing label for client table

### Write a Review

#### Can you suggest process for choosing appropriate data-mining

Consider on how you would know if a computer were thinking like a human.

#### Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

#### How to enlarge the size of the array

How to enlarge the size of the array? Enlarge the size of the array to 25. Driver will start with 10 objects in it other than has provision for up to 15 new objects. You can use java any API.

#### What is a backup strategy or active directory?

What is a backup strategy or Active Directory? The small business that you created new domain controllers for now wants you to develop a backup and recovery plan for Active Directory.

#### Intermediate programming

Design a program that reads in a text file with drawing commands and then outputs a bitmap with all the items drawn correctly

#### Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

#### How to illustrate a memory map for a system

Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

#### Write a recursive implementation of euclids algorithm

Write a recursive implementation of Euclids algorithm

#### Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

#### Implement needham-schroeder protocol using python

Implement Needham-Schroeder protocol using python

#### Calculate the component voltages

Input voltage will be a step voltage that is 0 volt before time t = 0 and V in

#### Write an essay on wifi performance

Write an essay on WiFi performance