Create a blacklist file and put it in the proper directory

Assignment Help Computer Engineering
Reference no: EM13313739

Homework Assignment #3

This homework assignment builds on the "unacceptable site" detection we worked on in assignment #2 (see attached file). In this exercise we will attempt to accomplish the same goal using the new reputation preprocessor in Snort. The documentation on the reputation preprocessor and the available configuration options are in section 2.2.19 of the Snort Manual (see attached file). The basic function of the reputation preprocessor is similar in many ways to basic firewall operation: the preprocessor evaluates source and destination IP addresses in network packets to see if they appear on either a "whitelist" of approved/acceptable addresses or a "blacklist" of prohibited addresses. Packets containing IP addresses on the blacklist are dropped. The overall intent for this assignment is to block access to the "bad" site you selected for HW#2 by adding the site to a blacklist and enabling the reputation preprocessor in in snort.conf.

To complete this assignment successfully, you will need to first edit the snort.conf file as follows:

• At the end of Step #1, either set the path to the reputation preprocessor file location or comment out these two lines (you can declare the blacklist file directly in the preprocessor configuration settings if you don't want to use a variable reference).

• At the end of Step #5, configure the reputation preprocessor. Look at the first configuration example on page 119 of the Snort Manual as a guide, which simply includes the preprocessor declaration and the specification of the blacklist and whitelist files. You can run the preprocessor with either or both of these files, so for our purposes you might just specify a blacklist file. The configuration could be as simple as: "preprocessor reputation: blacklist /etc/snort/black.list"

• Save the snort.conf file.

Now, create a blacklist file and put it in the proper directory (such as /etc/snort/rules on Linux or C:\Snort\etc\rules on Windows). A blacklist file is just a plain text file with one IP address (or address range, using CIDR notation) per line. The blacklist file name and file location should of course match what you specified in the preprocessor configuration in snort.conf. Then startup Snort as you would normally, open a browser, and visit the site corresponding to the IP address(es) in the blacklist file.

For this assignment, compose a short writeup for submission to your Assignments folder that includes the following:

1. The "unacceptable" site you selected in Homework #2 (you can pick a new one for this assignment if you prefer).

2. The IP address (individual, multiple, or a range) associated with that site. If you don't know the IP address, you can either open a command shell and ping the site (e.g. "ping www.facebook.com"), which will return the primary IP address on screen, or you can look up the site on Netcraft.com to find one or more IP addresses used by the site.

3. The contents of the blacklist file the reputation preprocessor references.

4. A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.

5. If you are able to get Snort to run successfully with the reputation preprocessor active, include the output produced (a copy of the ASCII log file is sufficient).

As in Homework Assignment #2, the successful completion of this exercise does not require you to use an actual inappropriate site. The primary purpose of this exercise is not to make you an expert in the reputation preprocessor, but to illustrate the point that there are often multiple viable approaches to accomplishing the same intrusion detection objectives.


Attachment:- ASSIGNMENT.rar

Reference no: EM13313739

Questions Cloud

What are the legal ways of doing disposal in the valley : A tank with a volume of 5,000 gal contains salt solution at an initial concentration (C0*) of 70,000 mg/L, but the concentration in the tank (C) needs to be reduced to 500 mg/L. Two approaches are being considered
Explain the frequency of the light given off by the flame : When a strontium salt is ignited, it burns with a red flame. The frequency of the light given off by this flame is greater than
Explain the decomposition of so3 to so2 : The decomposition of SO3 to SO2 and O2 , 24 Kcal/mole of heat is absorbed by the system.
Compute the distances nh3 gas and hcl gas : Calculate the distances NH3 gas and HCl gas would travel in this experiment if a 100.0-cm tube were used, based on the accepted molar masses for the two gases
Create a blacklist file and put it in the proper directory : A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.
Create a gantt chart for the rockiest project : Create a Gantt Chart for the Rockiest project that shows the beginning and end of the project, all the tasks that must be undertaken and who is responsible for them.
Explain how many g of pcl3 will be produced : Given the following reaction, if 32.5 g of Cl2 reacts completely with excess P, how many g of PCl3 will be produced. 2 P + 3 Cl2 --> 2 PCl3
Determine what is the standard deviation of the average time : The viscosity of a fluid can be measured in an experiment by dropping a small ball into a calibrated tube containing the fluid and observing the random variable X, the time it takes for the ball to drop the measured distance.
Explain how many joules of heat energy : Suppose you pick up a 15-pound ball of iron (such as a "shot-put" ball at a track event). The iron ball has the same temperature as the atmosphere (26 °C). How many joules of heat energy must the iron ball absorb to reach the temperature of your b..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd