427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet170/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   166   167   168   169   170   171   172   173   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
209
427_Botnet_05.qxd 1/9/07 9:59 AM Page 209


Layer 2 could suffer various forms of attack, including ARP spoofing,
which can lead to MITM attacks.
Layer 2 can suffer from switch forwarding table overflow attacks,
which can lead to password-guessing attacks.
Layer 2 could suffer from fake DHCP servers, which can lead to
MITM attacks.
Layer 2 switch features can include various security measures such as
port security, DHCP snooping, IP Source Guard, and dynamic ARP
inspection, especially on recent Cisco switches.
The number of hosts in a broadcast domain should be limited to
prevent fan-out attacks.
The routing table ARP timeout time and switch forwarding table
timeout might be set to be the same time.This helps if a hacker’s
toolkit has installed a password sniffer, since it improves the odds that
they will not see anything useful.
Intrusion Detection
Intrusion detection systems (IDSes) are either host or network based.
A NIDS should focus on local and outgoing traffic flows as well as
incoming Internet traffic, whereas a HIDS can pick up symptoms of
bot activity at a local level that can’t be seen over the network.
At either level, an IDS can focus on either anomaly detection or
signature detection, though some are more or less hybrid.
IDS is important, but it should be considered part of an Internet
prevention system strategy, whether it’s part of a full-blown
commercial system or one element of a multilayered defense.
Virus detection is, or should be, an understatement: It should sit at all
levels of the network, from the perimeter to the desktop, and include
preventative and recovery controls, not just detection.
Antivirus is capable of detecting a great deal more than simple viruses
and is not reliant on simple detection of static strings. Scanners can

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   166   167   168   169   170   171   172   173   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish