第九章 Intruders 电子商务信息安全与管理教学课件
合集下载
相关主题
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Two Approaches:
Statistical Anomaly(异常) Detection
Collection of data over a period of time about legitimate user behavior Statistical tests are applied to observe behavior to determine non-legitimate use
Intrusion Techniques
Fra Baidu bibliotek
Objective: Gain access to a system Frequent Goal: Acquiring a user password Most systems have a file that maps a password to each user
Password failures at login.
Password file protection:
one-way encryption access control
Password Learning Techniques
g u e s s a t t a c k
1.
Try default passwords used with standard accounts shipped with the system
Rule-based Detection
Attempt to define set of rules that determine intruder’s behavior
Measures used for Intrusion Detection
Login frequency by day and time. Frequency of login at different locations. Time since last login.
Recommended Reading and WEB Sites
Intruders
Three classes of intruders (hackers or crackers): Masquerader(假冒用户)- unauthorized individual who exploits legitimate user’s account (outsider) Misfeasor(违法用户)- legitimate user, who misuses his or her privileges (insider) Clandestine(隐秘用户) user- individual who seizes(获 取) supervisory control and uses it to evade(躲避) auditing or access controls (insider or outsider) Techniques used for intrusion → examine ways to detect intrusion → password-based approaches to intrusion prevention
2. Exhaustive try of all short passwords 3. Try words in system’s dictionary or list of likely passwords (hacker bulletin boards) 4. Collect information about users (full names, names of spouses and children, pictures and books in their office, related hobbies) 5. Try users’ phone numbers, social security numbers, room numbers 6. Try all legitimate license plate numbers
网络与信息安全
戎 玫 2008-3
Outline
Intruders
Intrusion Detection Techniques
Statistical Anomaly
Rule Based Detection
Password management
Password Protection
Password Selection Strategies
Basic Assumption: Behavior of the intruder differs from
Intruder & Authorized User Behavior
False Positive – authorized users identified as intruders
False Negative – real intruders not identified as intruders
7. Use a trojan horse
8. Tap(分接) the line between a remote user and the system
Intrusion Detection
Second line of defense (firewall is 1st)
Quick detection - minimize damage and quicker recovery Deterrent(威慑) - an effective intrusion detection system helps to prevent intrusions Collection of techniques - information about intrusion techniques leads to stronger prevention facility legitimate user in quantifiable ways