Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Chapter 18

Chapter 18

Ratings: (0)|Views: 10|Likes:
Published by hemaccna

More info:

Published by: hemaccna on Jan 03, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

01/02/2010

pdf

text

original

 
C
HAPTER
18I
NTRUDERS
18.1 Masquerader:
An individual who is not authorized to use the computer and whopenetrates a system's access controls to exploit a legitimate user's account.
Misfeasor:
A legitimate user who accesses data, programs, or resources for whichsuch access is not authorized, or who is authorized for such access but misuseshis or her privileges.
Clandestine user:
An individual who seizes supervisorycontrol of the system and uses this control to evade auditing and access controlsor to suppress audit collection.
18.2 One-way encryption:
 The system stores only an encrypted form of the user'spassword. When the user presents a password, the system encrypts thatpassword and compares it with the stored value. In practice, the system usuallyperforms a one-way transformation (not reversible) in which the password isused to generate a key for the encryption function and in which a fixed-lengthoutput is produced.
Access control:
Access to the password file is limited to oneor a very few accounts.
18.3 1.
If an intrusion is detected quickly enough, the intruder can be identified andejected from the system before any damage is done or any data are compromised.Even if the detection is not sufficiently timely to preempt the intruder, the soonerthat the intrusion is detected, the less the amount of damage and the morequickly that recovery can be achieved.
2.
An effective intrusion detection systemcan serve as a deterrent, so acting to prevent intrusions.
3.
Intrusion detectionenables the collection of information about intrusion techniques that can be usedto strengthen the intrusion prevention facility.
18.4 Statistical anomaly detection
involves the collection of data relating to thebehavior of legitimate users over a period of time. Then statistical tests areapplied to observed behavior to determine with a high level of confidencewhether that behavior is not legitimate user behavior.
Rule-Based Detection
involves an attempt to define a set of rules that can be used to decide that a givenbehavior is that of an intruder.
18.5 Counter:
A nonnegative integer that may be incremented but not decrementeduntil it is reset by management action. Typically, a count of certain event types iskept over a particular period of time.
Gauge:
A nonnegative integer that may beincremented or decremented. Typically, a gauge is used to measure the currentvalue of some entity.
Interval timer:
 The length of time between two relateevents.
Resource utilization:
Quantity of resources consumed during a specifiedperiod.
18.6
With
rule-based anomaly detection
, historical audit records are analyzed toidentify usage patterns and to generate automatically rules that describe thosepatterns. Rules may represent past behavior patterns of users, programs,privileges, time slots, terminals, and so on. Current behavior is then observed,and each transaction is matched against the set of rules to determine if itconforms to any historically observed pattern of behavior.
Rule-basedpenetration identification
uses rules for identifying known penetrations orpenetrations that would exploit known weaknesses. Rules can also be definedthat identify suspicious behavior, even when the behavior is within the bounds of established patterns of usage. Typically, the rules used in these systems arespecific to the machine and operating system. Also, such rules are generated by"experts" rather than by means of an automated analysis of audit records.
18.7
Honeypots are decoy systems that are designed to lure a potential attacker away

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->