Intrusion Detection and Response

Intrusion Detection and Response - 1 SECB 455 Intrusion...

Info icon This preview shows pages 1–22. Sign up to view the full content.

View Full Document Right Arrow Icon
Zouheir TRABELSI 1 SECB 455: Intrusion Detection and Responses Dr Zouheir TRABELSI Email: [email protected]
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 2 Course Plan Course: Introduction: Internet hacking Basics of TCP/IP protocols and Internet services: IP, TCP, UDP, ICMP, ARP/RARP protocols Services: HTTP, FTP, SMTP, POP3, DHCP, Telnet, DNS Advanced packet filtering: Stateful Firewall Firewall vs IDS Overview of network attacks: DoS, Email anonymous, Sniffing, MiM attack… DoS attacks detection in Juniper SSG 20 Wireless MiM attacks and Detection techniques Methodology of Network Penetration and Attacks Labs: Snort IDS, Juniper NetScreen IDS, DoS tools Packet generator, others
Image of page 2
Zouheir TRABELSI 3 Internet Hacking Dark Side of the Internet
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 4 Contents The Internet Hackers: Who they are? The Power of the Internet Hackers
Image of page 4
Zouheir TRABELSI 5 Internet Hacking Important and Serious Problem Dark S ide of the Internet
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 6 Examples of Hacked WebSites
Image of page 6
Zouheir TRABELSI 7 www.onething.com/archive
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 8 xamples of Hacked WebSites ww.onething.com/archive ommercial sites : Yahoo, BMW, Motorola, New York Times, Telia Value Jet, etc. olitical sites: Amnesty International, UK Conservative Party, etc. dministrative sites: CIA, American Justice Department, Los Angeles Police Department, etc. edia sites: Spice Girls, Janet Jackson, Leonardo di Caprio, etc.
Image of page 8
Zouheir TRABELSI 9 Al-Jazeera.net, March 25 2003
Image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 10 Central Intelligence Agency (CIA), September 20th, 1996
Image of page 10
Zouheir TRABELSI 11 United States Department of Justice, August 18th, 1996
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 12 United States Department of Justice, August 18th, 1996 Next page
Image of page 12
Zouheir TRABELSI 13 The New York Times: September 13, 1998 The main page of the New York Times was hacked by a group called HFG
Image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 14 United Nations Children’s Fund (Unicef) January 7th, 1998
Image of page 14
Zouheir TRABELSI 15 UK Conservative Party, April 27th, 1997
Image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 16 Los Angeles Police Department, May 29th, 1997
Image of page 16
Zouheir TRABELSI 17 Spice Girls Group, November 14th, 1997
Image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 18 Janet Jackson, January 2, 1998
Image of page 18
Zouheir TRABELSI 19 BMW, January 2nd, 1998
Image of page 19

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Zouheir TRABELSI 20 In 1995, a Russian computer engineer, who had some relation with the local mafia, had succeeded, from Saint-Petersburg, to access the system of Citibank of New York City and send 11 million dollars to an account in the UK. Other Attacks After the American military attack on the Chinese embassy in Belgrade, some Chinese hackers forced a number of American governmental systems
Image of page 20
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern