Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Homework Assignment #3

This homework assignment builds on the "unacceptable site" detection we worked on in assignment #2 (see attached file). In this exercise we will attempt to accomplish the same goal using the new reputation preprocessor in Snort. The documentation on the reputation preprocessor and the available configuration options are in section 2.2.19 of the Snort Manual (see attached file). The basic function of the reputation preprocessor is similar in many ways to basic firewall operation: the preprocessor evaluates source and destination IP addresses in network packets to see if they appear on either a "whitelist" of approved/acceptable addresses or a "blacklist" of prohibited addresses. Packets containing IP addresses on the blacklist are dropped. The overall intent for this assignment is to block access to the "bad" site you selected for HW#2 by adding the site to a blacklist and enabling the reputation preprocessor in in snort.conf.

To complete this assignment successfully, you will need to first edit the snort.conf file as follows:

• At the end of Step #1, either set the path to the reputation preprocessor file location or comment out these two lines (you can declare the blacklist file directly in the preprocessor configuration settings if you don't want to use a variable reference).

• At the end of Step #5, configure the reputation preprocessor. Look at the first configuration example on page 119 of the Snort Manual as a guide, which simply includes the preprocessor declaration and the specification of the blacklist and whitelist files. You can run the preprocessor with either or both of these files, so for our purposes you might just specify a blacklist file. The configuration could be as simple as: "preprocessor reputation: blacklist /etc/snort/black.list"

• Save the snort.conf file.

Now, create a blacklist file and put it in the proper directory (such as /etc/snort/rules on Linux or C:\Snort\etc\rules on Windows). A blacklist file is just a plain text file with one IP address (or address range, using CIDR notation) per line. The blacklist file name and file location should of course match what you specified in the preprocessor configuration in snort.conf. Then startup Snort as you would normally, open a browser, and visit the site corresponding to the IP address(es) in the blacklist file.

For this assignment, compose a short writeup for submission to your Assignments folder that includes the following:

1. The "unacceptable" site you selected in Homework #2 (you can pick a new one for this assignment if you prefer).

2. The IP address (individual, multiple, or a range) associated with that site. If you don't know the IP address, you can either open a command shell and ping the site (e.g. "ping www.facebook.com"), which will return the primary IP address on screen, or you can look up the site on Netcraft.com to find one or more IP addresses used by the site.

3. The contents of the blacklist file the reputation preprocessor references.

4. A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.

5. If you are able to get Snort to run successfully with the reputation preprocessor active, include the output produced (a copy of the ASCII log file is sufficient).

As in Homework Assignment #2, the successful completion of this exercise does not require you to use an actual inappropriate site. The primary purpose of this exercise is not to make you an expert in the reputation preprocessor, but to illustrate the point that there are often multiple viable approaches to accomplishing the same intrusion detection objectives.


Attachment:- ASSIGNMENT.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9893051
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question consider a problem that you think can be addressed

Question: Consider a problem that you think can be addressed using AI/ML. Provide a detailed 1200-1500 words report that explains the problem and solution. And then explains the challenges associated with adoption of tha ...

Recall that the cpu execution time of a program is given by

Recall that the CPU execution time of a program is given by CPU time = IC times CPI times T. Suppose two different processors P 1 and P 2 execute the same number of instructions for a given benchmark. If P 1 is a 2 Ghz p ...

We can sort a given set of n numbers by first building a

We can sort a given set of n numbers by first building a BST containing these numbers (using insertion operations on each element one by one), and then printing the numbers by an inorder traversal. What are the worst cas ...

Command to mail only the process id of running java program

Command to mail only the process ID of running Java program test to the email address (single line Unix)

As the school year begins what trends are taking place with

As the school year begins, what trends are taking place with Educational Technology in schools?

Question individual project - submit to the unit 3 ip

Question: Individual Project - Submit to the Unit 3 IP Area This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual dro ...

Question write a 2 page briefing paper in which you present

Question: Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research int ...

1 what would be the purpose for a user to protect a

1. What would be the purpose for a user to protect a file from "read" or "write" access by other users? 2. Is there a reason why it would be safer for administrators to use two different accounts when working with a comp ...

What is the broadcast domain and ports for hubs and

What is the Broadcast Domain and Ports for hubs and bridges?

Questionsuppose we are comparing implementations of

Question Suppose we are comparing implementations of insertion sort and merge sort on the same machine. For inputs of size n, insertion sort runs in 8n2 steps, while merge sort runs in 64nlgn steps. For which values of n ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As