Preface |
|
xiii | |
About The Authors |
|
xvii | |
Chapter 1 The Fundamental Concepts |
|
1 | (24) |
|
|
1 | (21) |
|
1.1.1 Network Security Concepts |
|
|
1 | (19) |
|
1.1.2 Automated Signature Generation for Zero-day Polymorphic Worms |
|
|
20 | (2) |
|
1.2 Our Experience and This Book's Objective |
|
|
22 | (1) |
|
|
23 | (2) |
Chapter 2 Computer Networking |
|
25 | (22) |
|
2.1 Computer Technologies |
|
|
25 | (1) |
|
|
26 | (8) |
|
2.2.1 Point-to-Point Topology |
|
|
26 | (1) |
|
2.2.2 Daisy-Chain Topology |
|
|
27 | (1) |
|
2.2.3 Bus (Point-to-Multipoint) Topology |
|
|
27 | (1) |
|
2.2.4 Distributed Bus Topology |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
2.2.8 Star-Wired Bus Topology |
|
|
30 | (1) |
|
2.2.9 Star-Wired Ring Topology |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.2.11 Hierarchical or Tree Topology |
|
|
32 | (1) |
|
2.2.12 Dual-Homing Topology |
|
|
32 | (2) |
|
|
34 | (1) |
|
2.4 Transmission Control Protocol |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
2.7 IP Routing and Routing Table |
|
|
36 | (1) |
|
|
37 | (5) |
|
2.8.1 Access Mechanisms for Administrators |
|
|
37 | (1) |
|
2.8.2 Security Policy for a Router |
|
|
38 | (2) |
|
2.8.3 Router Security Policy Checklist |
|
|
40 | (2) |
|
2.9 Network Traffic Filtering |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
2.10 Tools Used for Traffic Filtering or Network Monitoring |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
Chapter 3 Intrusion Detection And Prevention Systems (IDPSs) |
|
47 | (38) |
|
|
47 | (7) |
|
3.2 IDPS Detection Methods |
|
|
54 | (5) |
|
3.2.1 Signature-Based Detection |
|
|
54 | (1) |
|
3.2.2 Anomaly-Based Detection |
|
|
55 | (2) |
|
3.2.3 Stateful Protocol Analysis |
|
|
57 | (2) |
|
|
59 | (1) |
|
3.4 IDPS Security Capabilities |
|
|
60 | (1) |
|
3.5 Types of IDPS Technologies |
|
|
61 | (16) |
|
3.5.1 Network-Based IDPSs |
|
|
62 | (4) |
|
|
66 | (4) |
|
|
70 | (3) |
|
|
73 | (4) |
|
3.6 Integration of Multiple IDPSs |
|
|
77 | (1) |
|
3.6.1 Multiple IDPS Technologies |
|
|
77 | (1) |
|
3.6.2 Integration of Different IDPS Products |
|
|
78 | (1) |
|
|
78 | (5) |
|
3.7.1 Common Enterprise Network-Based IDPSs |
|
|
78 | (1) |
|
3.7.2 Common Enterprise Wireless IDPSs |
|
|
78 | (1) |
|
3.7.3 Common Enterprise NBA Systems |
|
|
78 | (1) |
|
3.7.4 Common Enterprise Host-Based IDPSs |
|
|
78 | (5) |
|
|
83 | (1) |
|
|
83 | (2) |
Chapter 4 Honeypots |
|
85 | (42) |
|
4.1 Definition and History of Honeypots |
|
|
85 | (11) |
|
4.1.1 Honeypot and Its Working Principle |
|
|
85 | (4) |
|
4.1.2 History of Honeypots |
|
|
89 | (6) |
|
|
95 | (1) |
|
|
96 | (5) |
|
4.2.1 Script Kiddies and Advanced Blackhat Attacks |
|
|
96 | (4) |
|
4.2.2 Attackers' Motivations |
|
|
100 | (1) |
|
4.3 The Value of Honeypots |
|
|
101 | (8) |
|
4.3.1 Advantages of Honeypots |
|
|
101 | (3) |
|
4.3.2 Disadvantages of Honeypots |
|
|
104 | (1) |
|
4.3.3 Roles of Honeypots in Network Security |
|
|
105 | (4) |
|
4.4 Honeypot Types Based on Interaction Level |
|
|
109 | (4) |
|
4.4.1 Low-Interaction Honeypots |
|
|
110 | (1) |
|
4.4.2 High-Interaction Honeypots |
|
|
111 | (1) |
|
4.4.3 Medium-Interaction Honeypots |
|
|
112 | (1) |
|
4.5 An Overview of Five Honeypots |
|
|
113 | (10) |
|
4.5.1 BackOfficer Friendly |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (8) |
|
|
123 | (1) |
|
|
124 | (3) |
Chapter 5 Internet Worms |
|
127 | (32) |
|
|
127 | (1) |
|
|
127 | (7) |
|
|
128 | (2) |
|
|
130 | (3) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
136 | (3) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
5.5.3 Communication Components |
|
|
139 | (1) |
|
|
140 | (1) |
|
5.5.5 Intelligence Capabilities |
|
|
140 | (1) |
|
|
140 | (3) |
|
|
141 | (1) |
|
5.6.2 Random Scanning Using Lists |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
5.7 Polymorphic Worms: Definition and Anatomy |
|
|
143 | (6) |
|
5.7.1 Polymorphic Worm Definition |
|
|
143 | (1) |
|
5.7.2 Polymorphic Worm Structure |
|
|
143 | (1) |
|
|
144 | (1) |
|
5.7.4 Polymorphic Worm Techniques |
|
|
144 | (4) |
|
5.7.5 Signature Classes for Polymorphic Worms |
|
|
148 | (1) |
|
5.8 Internet Worm Prevention Methods |
|
|
149 | (3) |
|
5.8.1 Prevention of Vulnerabilities |
|
|
149 | (2) |
|
5.8.2 Prevention of Exploits |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (6) |
Chapter 6 Reading Resources On Automated Signature Generation Systems |
|
159 | (10) |
|
|
159 | (6) |
|
6.1.1 Hybrid System (Network Based and Host Based) |
|
|
160 | (1) |
|
6.1.2 Network-Based Mechanisms |
|
|
161 | (3) |
|
6.1.3 Host-Based Mechanisms |
|
|
164 | (1) |
|
|
165 | (4) |
Chapter 7 Signature Generation Algorithms For Polymorphic Worms |
|
169 | (92) |
|
|
169 | (16) |
|
7.1.1 Exact String-Matching Algorithms |
|
|
170 | (9) |
|
7.1.2 Approximate String-Matching Algorithms |
|
|
179 | (6) |
|
|
185 | (27) |
|
7.2.1 Supervised Learning |
|
|
185 | (4) |
|
7.2.2 Algorithm Selection |
|
|
189 | (2) |
|
7.2.3 Logic-Based Algorithms |
|
|
191 | (4) |
|
7.2.4 Learning Set of Rules |
|
|
195 | (7) |
|
7.2.5 Statistical Learning Algorithms |
|
|
202 | (6) |
|
7.2.6 Support Vector Machines |
|
|
208 | (4) |
|
7.3 Unsupervised Learning |
|
|
212 | (42) |
|
7.3.1 A Brief Introduction to Unsupervised Learning |
|
|
212 | (7) |
|
7.3.2 Dimensionality Reduction and Clustering Models |
|
|
219 | (5) |
|
7.3.3 Expectation-Maximization Algorithm |
|
|
224 | (3) |
|
7.3.4 Modeling Time Series and Other Structured Data |
|
|
227 | (7) |
|
7.3.5 Nonlinear, Factorial, and Hierarchical Models |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (5) |
|
7.3.8 Exact Inference in Graphs |
|
|
241 | (7) |
|
7.3.9 Learning in Graphical Models |
|
|
248 | (4) |
|
7.3.10 Bayesian Model Comparison and Occam's Razor |
|
|
252 | (2) |
|
|
254 | (1) |
|
|
254 | (7) |
Chapter 8 Zero-Day Polymorphic Worm Collection Method |
|
261 | (16) |
|
|
261 | (1) |
|
8.2 Motivation for the Double-Honeynet System |
|
|
261 | (1) |
|
8.3 Double-Honeynet Architecture |
|
|
262 | (2) |
|
|
264 | (2) |
|
8.4.1 Honeywall Roo CD-ROM |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
8.5 Double-Honeynet System Configurations |
|
|
266 | (8) |
|
8.5.1 Implementation of Double-Honeynet Architecture |
|
|
266 | (1) |
|
8.5.2 Double-Honeynet Configurations |
|
|
267 | (7) |
|
|
274 | (1) |
|
|
274 | (3) |
Chapter 9 Developed Signature Generation Algorithms |
|
277 | (20) |
|
|
277 | (1) |
|
9.2 An Overview and Motivation for Using String Matching |
|
|
278 | (1) |
|
9.3 The Knuth-Morris-Pratt Algorithm |
|
|
279 | (4) |
|
9.3.1 Proposed Substring Extraction Algorithm |
|
|
280 | (2) |
|
9.3.2 A Modified Knuth-Morris-Pratt Algorithm |
|
|
282 | (1) |
|
9.3.3 Testing the Quality of the Generated Signature for Polymorphic Worm A |
|
|
282 | (1) |
|
9.4 Modified Principal Component Analysis |
|
|
283 | (4) |
|
9.4.1 An Overview of and Motivation for Using PCA in Our Work |
|
|
283 | (1) |
|
9.4.2 Our Contributions in the PCA |
|
|
283 | (1) |
|
9.4.3 Determination of Frequency Counts |
|
|
284 | (1) |
|
9.4.4 Using PCA to Determine the Most Significant Data for Polymorphic Worm Instances |
|
|
284 | (3) |
|
9.4.5 Testing the Quality of the Generated Signature for Polymorphic Worm A |
|
|
287 | (1) |
|
9.5 Clustering Method for Different Types of Polymorphic Worms |
|
|
287 | (1) |
|
9.6 Signature Generation Algorithm Pseudocodes |
|
|
288 | (7) |
|
9.6.1 Signature Generation Process |
|
|
288 | (6) |
|
9.6.2 Testing the Quality of the Generated Signature for Polymorphic Worm A |
|
|
294 | (1) |
|
|
295 | (1) |
|
9.8 Conclusion and Recommendations for Future Work |
|
|
295 | (1) |
|
|
296 | (1) |
Index |
|
297 | |