427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet127/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   123   124   125   126   127   128   129   130   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
154
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 154


the fan-out attack can be reduced.This design idea simply limits
exposure to possible Layer 2 problems from both from the redun-
dancy point of view and the “your neighbors might be dangerous”
point of view.
2. The default ARP cache timeout value on Cisco routers is 4 hours.
The default forwarding table timeout on switches is likely to be 5
minutes. Ironically, adaptive learning in Layer 2 switches is typically a
side effect of an ARP broadcast. As a result, the switch learns where
the sender lives and stops flooding Unicast packets to it in the direc-
tion of other hosts. If, however, the flooding is happening because the
switch does not know where the host is to be found and a hacker
installs a password sniffer on another host, the hacker could see
Unicast packets you would very much like for them to not see.The
hacker does not need to attack the switch with a forwarding table
overflow attack. All he or she needs to do is wait, and, of course, pro-
grams are very good at waiting.You might set the switch forwarding
table time to match the router or choose a compromise time with
the forwarding table time set higher and the router time set lower. In
any case, setting them to be the same to minimize Unicast segmenta-
tion failure seems a good idea.
3. It can be useful to combine VLANs on switches and router ACLs to
simply make IP addresses assigned to network infrastructure devices
such as wireless access points and Ethernet switches unreachable by
ordinary hosts. For example, all the switch ports might be “findable”
on private net 10/8 and made reachable by a VLAN (or two). As a
result, we can hope that the local malware infection cannot launch an
attack against infrastructure boxes.
One final point is that switches can have logging as well. Logging based
on various Layer 2 isolation violations can thus alert you to a hacked system.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   123   124   125   126   127   128   129   130   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish