How to set a rule that used by snort to detect an ack scan

Assignment Help Computer Engineering
Reference no: EM132265

Question

An ACK scan does not provide in order about whether a target machine's ports are open or closed, except rather whether or not access to those ports is being blocked by a firewall. If there is no response or an ICMP "destination unreachable" packet is received as a response, then port is blocked by a firewall. If scanned port replies with a RST packet, then ACK packet reached its intended host. So end port is not being filtered by a firewall. Note, though, that port itself may be open or closed.

Describe a rule or a set of rules that might be used by Snort to detect an ACK scan. Cleary express your assumption and explain your rules. What do you think Bro can do a better job detecting an ACK scan? Describe your answer in details.

 

Reference no: EM132265

Questions Cloud

Explain the method to find cost of sorting the relation : Explain the method to find cost of sorting the relation In each case, how many combine passes are required?
Analytical methods commonly used in industrial hygiene : Name two analytical methods commonly used in Industrial Hygiene. Illustrate your answer with two typical examples What are the four significant physical parameters that you would use to assess the thermal comfort of employees working in a hot and..
What is the specialization of Dottie's Tax facility : What is the specialization of Dottie's Tax facility At least 6 returns? (Round z-score computation to 2 decimal places and your final answer to 4 decimal places.)
What security measures required to address vulnerabilities : What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company.
How to set a rule that used by snort to detect an ack scan : How to set a rule that used by snort to detect an ACK scan What do you think Bro can do a better job detecting an ACK scan?
How to create program that performs arithmetic function : How to create program that performs arithmetic function Prompt a user for values for the variables. Pass both variables to methods named sum() and difference().
What does ld 50 mean in industrial toxicology : What are the units commonly used in occupational exposure limits for quantifying the concentration of dust particles, vapours or gases and fibres? What does LD 50 mean in Industrial Toxicology
How to create program that performs arithmetic function : How to create program that performs arithmetic function Prompt a user for values for the variables. Pass both variables to methods named sum() and difference().
How to create the clients by service rep report : How to create the clients by service rep report create mailing label for client table

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain interval and arithmetic coding

Evaluate the cumulative distribution function and the binary intervals

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Speed routing protocol

Following question is related to SPEED routing protocol-Multiple speeds are computed in MAC layer. The forwarder with highest speed is selected on MAC layer feedback. This selection could not produce a shortest path.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

  How many tasks real-time application contain

How many tasks real-time application contain In this particular real-time application, there are many tasks; each runs exact same code except with different data each time.

  How a box of caramel delites girl scout cookies

How to a box of Caramel deLites Girl Scout cookies Every spring you looking forward to buying a box of Caramel deLites Girl Scout cookies

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Implement needham-schroeder protocol using python

Implement Needham-Schroeder protocol using python

  How to create program that performs arithmetic function

How to create program that performs arithmetic function Prompt a user for values for the variables. Pass both variables to methods named sum() and difference().

  What is a backup strategy or active directory?

What is a backup strategy or Active Directory? The small business that you created new domain controllers for now wants you to develop a backup and recovery plan for Active Directory.

  Encipher a message using a keyword

The first program will encipher a message using a keyword and second program will decipher a message using a keyword.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd