Overview The Scenario Imagine you are a cybersecurity expert working for a company looking to overcome issues mentioned in Section 6 of A Comprehe
Overview
The Scenario
Imagine you are a cybersecurity expert working for a company looking to overcome issues mentioned in Section 6 of A Comprehensive Survey on Network Anomaly Detection (Please see an attached copy.). Choose one or more of the issues as your focus. Research and write a 2-3 page business brief about the network anomaly detection tools and methods that you propose as solutions to your chosen issue(s). Your audience for this brief is C-Suite (company leadership). They have some technical knowledge but will need your guidance to understand the need for new tools and methods.
Research
Search Internet resources, vendor pages, open-source projects, and GitHub pages for network anomaly detection tools and methods that address your issue(s). Identify the best ones for the issue(s) you chose.
Write
Include three sections: Introduction, body, and conclusion. Follow the general guidelines of this example (Please see attached Business Brief document.). Answer the kinds of questions your leadership is likely to ask:
- What’s the purpose of these tools? Isn’t a firewall enough protection? What problem are we trying to solve?
- What tools and methods are you recommending? Why these and not others?
- Explain specifically how the tools and methods you found overcome the challenges. Provide the names of the tool, developers, community, website, any other useful information.
Criteria
Read the assignment rubric to understand how your work will be assessed.
This assignment is also used to assess M.S. in Cybersecurity Program Learning Outcomes (PLOs) through the rubric. The PLO assessment will appear as separate rows within the rubric; they will not contribute points to the assignment.
For your information, the following PLOs are being assessed:
- PLO 5: Defend infrastructure against common threats and attacks.
Telecommunication Systems (2019) 70:447–489 https://doi.org/10.1007/s11235-018-0475-8
A comprehensive survey on network anomaly detection
Gilberto Fernandes Jr.1 · Joel J. P. C. Rodrigues1,2,3,4,6 · Luiz Fernando Carvalho5 · Jalal F. Al-Muhtadi6 · Mario Lemes Proença Jr.7
Published online: 2 July 2018 © Springer Science+Business Media, LLC, part of Springer Nature 2018
Abstract Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific community because any attack or anomaly in the network can greatly affect many domains such as national security, private data storage, social welfare, economic issues, and so on. Therefore, the anomaly detection domain is a broad research area, and many different techniques and approaches for this purpose have emerged through the years. In this study, the main objective is to review the most important aspects pertaining to anomaly detection, covering an overview of a background analysis as well as a core study on the most relevant techniques, methods, and systems within the area. Therefore, in order to ease the understanding of this survey’s structure, the anomaly detection domain was reviewed under five dimensions: (1) network traffic anomalies, (2) network data types, (3) intrusion detection systems categories, (4) detection methods and systems, and (5) open issues. The paper concludes with an open issues summary discussing presently unsolved problems, and final remarks.
Keywords Anomaly detection · Network security · Network management · Intrusion detection · Anomaly detection methods
1 Introduction
Nowadays, the scientific community has a constant worry about high-efficiency security and quality of service in large-scale networks. The expansion of new communication technologies and services, along with an increasing number of interconnected network devices, web users, services, and applications, contributes to making computer networks ever larger and more complex as systems. Moreover, there is the so called boundless communication paradigm, for next genera- tion networks, which envisages offering anytime, anywhere, anyhowcommunicationstoitsusersandrequiresthefullinte-
B Joel J. P. C. Rodrigues [email protected]
Gilberto Fernandes Jr. [email protected]
Luiz Fernando Carvalho [email protected]
Jalal F. Al-Muhtadi [email protected]
Mario Lemes Proença Jr. [email protected]
1 Instituto de Telecomunicações, Universidade da Beira Interior, Covilhã, Portugal
gration and interoperability of emergent technologies [1–4]. These issues make it even more complex and challenging to maintain precise network management and lead to seri- ous network vulnerabilities, as security incidents may occur more frequently [5,6].
Such security instances can be caused either by outsiders, as malicious attacks aiming to shut down services or steal private information, or by inside factors (operational prob- lems), such as configuration errors, server crashes, power outages, traffic congestion, or non-malicious large file trans- fers [7]. Regardless of the source, such threats, which are commonly called anomalies, can have a significant impact
2 National Institute of Telecommunications (Inatel), Av. João de Camargo, 510 – Center, Santa Rita do Sapucaì 37540-000, Brazil
3 ITMO University, St. Petersburg, Russia
4 University of Fortaleza (UNIFOR), Fortaleza, Brazil
5 State University of Campinas (UNICAMP), Campinas, Brazil
6 College of Computer and Information Sciences (CCIS), King Saud University (KSU), Riyadh 12372, Saudi Arabia
7 Computer Science Department, State University of Londrina (UEL), Londrina, Brazil
123
448 G. Fernandes Jr. et al.
on the network service and end-users and harm computer network operations and availability.
The term anomaly has several definitions. Barnett and Lewis define a data set anomaly as “observation (or a sub- set of observations) which appears to be inconsistent with the remainder of that set of data” [8]. Chandola et al. express this term as “patterns in data not conforming to a well-defined notion of normal behavior” [9]. According to Lakhina et al., “anomalies are unusual and significant changes in a network’s traffic levels, which can often span multiple links” [10]. Hoque et al. define it as “non-conforming inter- estingpatternscomparedtothewell-definednotionofnormal behavior” [11]. By these definitions, it is clear that the con- cept of normality is one of the main steps toward developing a solution to detect network anomalies.
Although apparently unpretentious, the problem of defin- ing a region denoting normal behavior and marking as an anomaly any occasion contrasting this normal pattern, is defiant. Faster diagnosis, lower complexity and suit- able corrections of the causes are the main objectives of the field. Every factor is vital to developing a bet- ter anomaly detection approach. The precision and speed factors, alongside with the correct identification of such abnormal events in a timely fashion are critical to reduc- ing significant service degradation, malicious damage, and cost. For this reason, the research community has been devel- oping a lot of models, algorithms, and mechanisms, over the years, to develop better solutions and approaches to guaranteeing the health of ever larger and complex network systems.
Researchers have been studying the anomaly detec- tion subject since the early 19th century, and so far, they have produced a multitude of papers, each using a vari- ety of techniques, from statistical models, up to evolu- tionary computation approaches. Nevertheless, it is not a straightforward task to identify and categorize all exist- ing anomaly detection techniques. Plenty of topics must be considered, such as anomaly types, system types, tech- niques and algorithms used, as well as technical dilemmas such as processing costs and network complexity. There- fore, this leads to the fragmented literature available today, in which many works try to summarize everything but are unable to show the bigger picture of the anomaly detection spectrum.
As in [12,13], the focus is just on the most popular tech- niques and methods, such as machine learning, clustering and statistical approaches. Still, surveys such as [14,15] briefly discuss the whole problem statement, setting aside relevant topics such as data set, challenges, and recommen- dations. Marnerides et al. [16] have a reviewed anomaly detection over backbone networks. Although each of those inspected surveys summarizes many important topics per- taining to anomaly detection, they are not entirely complete.
For instance, some of them emphasize anomaly types but do notcoverallkindsofmethodswhileothersresearchuponvast approaches but forget about the basis of intrusion detection systems and data input, and so on. For this reason, in this sur- vey, we present a systematic overview of the whole anomaly detection domain under five dimensions: (i) network anoma- lies, (ii) network data types, (iii) intrusion detection systems overview, (iv) detection methods and systems, and (v) open issues.Table1providesacomparisonbetweensomeanomaly detectionsurveyswithregardtothevarietyoftechniquesthey address.
At last, this survey aims to bring a complete and straight- forward review of state-of-the-art anomaly detection topic. Then, the main contributions of the paper are the following:
• Review the anomaly detection subject under five research directions;
• A detailed study of the most relevant techniques, meth- ods, and systems within the area;
• Address the main drawbacks found in the analyzed sur- veys extracted from the literature;
• Analysis of the four traffic anomaly types categorized by the causal aspect;
• Forward-looking discussion and comparative analysis of other surveys regarding open issues and future trends.
This paper is organized as follows. The introduction presents the overall motivation for developing this survey and a com- parison with other surveys in the literature. Section 2 defines, categorizes, explains, and provides examples of most com- mon types of network anomalies. Section 3 gives a brief explanation of network data types used as input in anomaly detection systems. Section 4 gives a complete overview of intrusion detection systems and the differences between each approach. Section 5 is the core section, which lists many anomaly detection methods and systems using a variety of techniques and algorithms of different nature and purpose. Section 6 summarizes everything discussed in previous sec- tions into some topics considered as open challenges in the anomaly detection domain. Finally, Sect. 7 concludes the survey. Figure 1 shows all contents presented and discussed within the paper.
2 Network traffic anomalies
One of the first tasks envisioned by researchers in creating an anomaly detection model is the correct identification and definition of the problem statement. It means that there must be prior knowledge about what type of anomaly researchers would deal with. There are several types of network traffic anomalies, and each author surveying this topic addresses them differently. For the sake of simplicity, and after analyz-
123
A comprehensive survey on network anomaly detection 449
Ta bl e 1
A co m pa ri so n be tw
ee n an om
al y de te ct io n su rv ey s
C on te nt
S ur ve ys
P at ch a an d
P ar k [1 3]
C ha nd ol a et
al .[ 9]
W ei yu
et al .[ 15
] T ho
tt an
et al .[ 12
] Y u et
al .[ 14
] B hu ya n et
al .[ 17
] M ar ne ri de s et
al .[ 16
] A hm
ed et
al .[ 18
] T hi s
su rv ey
Y ea r
20 07
20 09
20 09
20 10
20 12
20 14
20 14
20 16
20 18
T ra ffi c an om
al ie s by
na tu re
P oi nt
� �
� �
C ol le ct iv e
� �
� �
C on
te xt ua l
� �
� �
T ra ffi c an om
al ie s by
ca us al as pe ct
O pe ra ti on al
� F la sh
C ro w d
� M ea su re m en t
� N et w or k at ta ck
� �
� �
N et w or k da ta ty pe s
T C P du
m p
� S N M P
� �
IP fl ow
s �
� ID
S ov er vi ew
– �
� �
D et ec ti on
te ch ni qu
es ,
m et ho ds
an d sy st em
s S ta ti st ic al
� �
� �
� �
� �
� C lu st er in g
� �
� �
� C la ss ifi ca ti on
� �
� �
� F in it e st at e m ac hi ne s
� �
� In fo rm
at io n th eo ry
� �
� �
E vo lu ti on
ar y co m pu
ta ti on
� �
H yb ri d/ ot he rs
� �
123
450 G. Fernandes Jr. et al.
Fig. 1 Paper summary
ing and studying the anomaly context and its categorization, network anomalies can be categorized giving two relevant properties: according to their nature (grouped by how they are characterized, regardless of whether they are malicious or not); and according to their causal aspect (distinguished depending on their cause, regarding either their malicious or non-malicious aspect). Figures 2 and 3 illustrates this cate- gorization and all points that are covered in this section.
2.1 Anomaly categorization based on its nature
The nature of an anomaly is an important aspect of an anomaly detection technique. Depending on the context within which an abnormality is found, or on how it occurred, it can be or not be an abnormality. This aspect can direct how the system will handle and understand mined and detected anomalies. Based on their nature, there are three categories of anomalies: point anomalies, collective anomalies, and con- textual anomalies [9,17,18].
A point anomaly is the deviation of an individual data instance from the usual pattern/behavior. These anomalies are the simplest ones, and because of that, they are the focus of most researchers. For better understanding, suppose that the daily spending of a person is one hundred dollars; then, on aspecificday,theyspendthreehundreddollars.Thissituation characterizes a point anomaly [9,18].
A collective anomaly occurs when only a collection of similar data instances behaves anomalously with reference to the whole dataset. In a collective anomaly, individual anomalous behaviors themselves are not considered anoma- lies; however, their collective occurrence is considered an anomaly. A point anomaly occurring continuously for an extended period or in a cluster amid background data is a collective anomaly. Consider this example: in a sequence of actions in a computer like “…HTTP-web, buffer-overflow, HTTP-web, HTTP-web, FTP, HTTP-web, SSH, HTTP-web, SSH, buffer-overflow…”, the underlined sequence is a col- lective anomaly. The individual events occurring in other positions in the sequence are not anomalies; however, the
123
A comprehensive survey on network anomaly detection 451
Fig. 2 Traffic anomalies categorization
Fig. 3 Network data types categorization
underlined sequence matches a web-based attack by a remote machine followed by the copying of data from the host computer to a remote destination via FTP. Another com- mon example is the ECG exam output, in which low values observed over a long period indicate an anomaly, while one unique low value is not considered abnormal [17,18].
Contextual Anomalies, also called conditional anomalies, are events considered as anomalous depending on the context in which they are found. Two sets of attributes define a con- text (or the condition) for being an anomaly, both of which must be specified during problem formulation. Contextual attributes define the context (or environment); for instance, geographic coordinates in spatial data or time in time-series data specifies the location or position of an instance, respec- tively. On the other hand, behavioral attributes denote the non-contextual features of an instance, i.e., indicators deter- mining whether or not an instance is anomalous in the context [9,18,19]. Consider a time-series data set describing the average bits/s of network traffic in a set of days (contex- tual attribute), in which every day, at 0 h, the server does a regular backup (behavioral attribute). Although the backup generates an outlier in the traffic series, it may not be anoma- lous since it is normal behavior due to a regular backup. However, a similar traffic outlier at 12 h could be considered a contextual anomaly.
2.2 Anomaly categorization based on its causal aspect
The causal aspect distinguishes anomalies depending on their cause, regarding either their malicious or non-malicious
aspect. Anomalies are not always related to attacks intended to harm computer systems or steal information. They can be both events caused by human/hardware failure, bugs or private users when demanding heavy traffic usage, for instance. Thus, as found in Barford et al. [20] and Marnerides et al. [16], anomalies are grouped into four categories: operational/misconfiguration/failure events; flash crowd/legitimate but abnormal use; measurement anomalies; and network abuse anomalies/malicious attacks (or simply, network attacks) [20,21].
Operational events (also called Misconfiguration events or Failures) are non-malicious issues, which may occur in a network system mostly by hardware failures, software bugs or human mistakes. Server crashes, power outages, config- urations errors, traffic congestion, non-malicious large file transfers, inadequate resource configuration, or significant changes in network behavior caused by imposing rate limits or adding new equipment, are all examples of this category of anomaly [7]. Such problems can be perceived visually by nearly abrupt changes in bit rate, which appear steady but occur at a different level over a time period [21].
Legitimate but not abnormal use is commonly referred to as flash crowds. Flash crowds are large floods in traffic, which occur when rapid growth of users attempts to access a specific network resource, causing a dramatic surge in server load. Anomalies in this category consist of legitimate requests, which are usually an aftermath of mutual reaction to hot events but far bigger than the load which the system can handle. Flash crowds may occur when a contest result is pub- lished on a URL, or when an e-commerce website announces a big sale, or even due to software release. Although it is not malicious, if there is not enough time to react and provide the necessary resources to handle overload demand, these flash events can seriously flood or lead to complete web service failure [22,23]. Flash crowd behavior is related to the rapid growth of particular traffic flow types, such as FTP flows, or the gradual fall of a well-known destination over time.
Measurement anomalies are other issues, which are not network infrastructure problems, abnormal usage, or mali- cious attacks. These anomalies are related to collection
123
452 G. Fernandes Jr. et al.
infrastructure problems and problems during data collection. Examples are the loss of flow data caused by router overload, or when there is a collection of infrastructure problems and the UDP NetFlow transport to the collector becomes unread- able.
Network abuse anomalies (or network attacks) are a set of malicious actions aiming to disrupt, deny, degrade or destroy information and services from computer network systems, compromising their integrity, confidentiality or availability. Numerous types and classes of attacks currently existing may vary from simple email spam to intrusion attacks on critical network infrastructures. Worms, malicious resource abuse, bug exploits and unauthorized access are some examples of common computer attacks. According to Ghorbani et al. [24], attackers gain access to a system, or limit the availability of that system through some general approaches. These are:
• Social Engineering when an attacker manipulates people to obtain confidential information, making use of hostile persuasion or other interpersonal tactics [25]. Examples are email phishing and email Trojan horses;
• Masquerading thisisatypeofattackinwhichtheattacker uses a fake identity to gain unauthorized access or greater privileges in a system through official access identifica- tion. The attacker illegitimately poses or assumes the identity of another legitimate user, gener- ally by using stolen IDs and passwords [26].
• Implementation Vulnerabilities these are cases in which the attacker exploits software bugs in their targets, such as software, services or applications, in order to gain unauthorized access. Examples are the buffer overflow vulnerability or the mishandling of temporary files.
• Abuse of Functionality malicious activities performed by attackers excessively performing a legal action in order to congest a link or cause a system to fail. A denial-of- service performed on a web-login system by flooding it with valid usernames and arbitrary passwords in order to lock out authentic users, when the allowed login retry limit is exceeded, constitutes an abuse of functionality.
Based on those general approaches of network abuse anoma- lies (network attacks), there are various classes of attacks. Table 2 shows the main attack, which commonly harms com- puter networks and is the major target of anomaly detection mechanisms.
3 Network data types
Another essential step required for building an anomaly detection system is choosing the network data source. The nature of the selected data set may dictate which types of anomalies the system can detect. One needs to choose a data
source correctly depending on what kind of anomalies and IDS approaches are intended as the focus of the research. Because of that, accurate data characterization results in the better performance of the anomaly detection system. This section presents some of the most popular sources used in the anomaly detection subject.
3.1 TCP dump
Tcpdump is a packet analyzer tool used to monitor packets on a computer network. It shows the headers of TCP/IP packets passing through the network interface. It is a tool for network packet capturing and analysis and is recommended to pro- fessionals who need to perform monitoring and maintenance on computer networks, as well as to students who want to understand the operation of the TCP/IP protocol stack. Nev- ertheless, this type of data is not used as much nowadays due to its limited information.
3.2 SNMP
The Simple Network Management Protocol (SNMP) [34] is one of the widely used standards for managing IP net- work components. This protocol has a client-server structure (SNMP managers and SNMP agents) which runs through- out the UDP protocol [35]. SNMP data has been used on intrusion detection systems, since it is useful when it comes to collecting accurate network activity data at a single host level. All collected data are stored, as SNMP objects, in a hierarchical database called MIB (Management Information Base). SNMP objects are summary traffic data constructed by the aggregation of raw data (pcap records) collected mostly by TCP dump tools [16].
Although efficient in their proposals, the works by Cabr- era et al. [36] and Yu et al. [37] are limited to detecting only DoS/DDoS attacks, since these are volume anomalies and SNMP objects rely on volume attributes (bits and packet counts). As presented in Moises et al. [38] and Zarpelao et al. [39], the proposed alarm systems developed over SNMP data have shown high anomaly detection rates by combining clustering and parameterizing techniques. However, none of them had any other information about unknown anomalies, despite the alarms being triggered.
A significant advantage is that SNMP is still a widely deployed protocol with available fine-grained data. It is used in traditional network management tools for measuring per- formance parameters such as error counter interfaces and traffic volume. Packet and bit interface counters are useful; however, nowadays, understanding which IP addresses are the source and destination of traffic and which TCP/UDP ports are generating traffic is vital.
123
A comprehensive survey on network anomaly detection 453
Ta bl e 2
D et ai le d de sc ri pt io n of
m os t co m m on
ne tw or k ab us e an om
al ie s
A tt ac k
D efi
ni ti on
E xa m pl es
T a
V ir us
P ie ce
of co de
in se rt ed
in to
a fi le or
pr og
ra m
w hi ch
re pl ic at es
it se lf
w it ho ut
th e us er ’s pe rm
is si on
R oo tk it .S ir ef ef .G en ,T
ri vi al .8 8. D
H ar m fu l ac ti vi ti es : th ef t of
pr iv at e
in fo rm
at io n,
da ta co rr up ti on ,
sp am
m es sa ge s
N ee ds
hu m an
in te rv en ti on
to ab et
it s pr op
ag at io n [2 7]
W or m
S el f- re pl ic at in g so ft w ar e de si gn
ed to
sp re ad
th ro ug h th e ne tw or k
M or ri s, C od eR
ed ,N
im da
E xp
lo it se cu ri ty
or po
li cy
fl aw
s in
w id el y us ed
se rv ic es
[2 8]
T ro ja n
A pi ec e of
pr og ra m
m as qu er ad in g
as a be ni gn
ap pl ic at io n, w he n in
fa ct it se cr et ly
m al ic io us
ac ti vi ti es
Z er oA
cc es s R oo
tk i, B ea st ,Z
eu s
S E
T he y do
no t re pl ic at e as
vi ru se s
an d w or m s do
bu t ca n be
ju st as
de st ru ct iv e
B uf fe r ov er fl ow
T ak es
ov er
pr og ra m s th ro ug h
bu ff er
vu ln er ab il it ie s to
ex ec ut e
ar bi tr ar y co de
in or de r to
st or e
m or e da ta in
a bu ff er
th an
th e
bu ff er
ca n ho
ld
– IV
C an
co rr up t or
ov er w ri te va li d da ta
he ld
in a bu ff er
D en ia l of
se rv ic e (D
oS )
M al ic io us
at te m pt s to
de ny
ac ce ss
to sh ar ed
ne tw or k re so ur ce s or
se rv ic es
S Y N fl oo d,
H T T P fl oo d,
pi ng
of de at h (P oD
), R U D Y ,t ea rd ro p,
S lo w lo ri s
A F
G en er al ly ,i t us es
si gn
ifi ca nt
pa ck et
vo lu m e co nt ai ni ng
us el es s tr af fi c
to co ng
es t an d w as te re so ur ce s
se rv in g le gi ti m at e tr af fi c. It ca n
be a si ng le or
m ul ti -s ou rc e
at ta ck
[2 9]
123
454 G. Fernandes Jr. et al.
Ta bl e 2
co nt in ue d
A tt ac k
D efi
ni ti on
E xa m pl es
T a
D is tr ib ut ed
D oS
(D D oS
) D D oS
ar e D oS
at ta ck s; th ey
ar e
ea sy
to la un
ch an d di ffi cu lt to
lo ca te th ei r so ur ce
si nc e th ey
ar e
im pl em
en te d by
a gr ou p of
co m pu te rs (b ot ne t)
U D P fl oo d,
T C P fl oo d,
S lo w lo ri s, Z er o- da y D D oS
,N T P am
pl ifi ca ti on
A F
D ef ea t th e ta rg et se rv er
w hi le
ke ep in g th ei r id en ti ty
un kn
ow n
by us in g co m pr om
is ed
co m pu te rs
D is tr ib ut ed
re fl ec ti ve
D oS
(D R D oS
) A tt ac ks
th at ju st ca nn ot
be ad dr es se d by
tr ad it io na l
on -p re m is e so lu ti on s. T he se
us e
le gi ti m at e ho
st s (r efl
ec to rs ) to
fl oo d a la rg e nu m be r of
re sp on se
pa ck et s to
th e ta rg et sy st em
by us in g sp oo fe d IP
ad dr es se s
S m ur f at ta ck ,F
ra gg
le at ta ck
A F
T he
at ta ck er
se nd
s m an y re qu
es ts
w it h a sp oo fe d so ur ce
IP ad dr es s
(t he
ta rg et se rv er
ad dr es s) to
le gi ti m at e no
de s (r efl
ec to rs ),
w hi ch
re pl y w it h se ve ra l
vo lu m in ou s re sp on se s to
th e
sp oo fe d IP
(t ar ge t se rv er ), th us
fl oo di ng
th e vi ct im
[3 0]
S te al th y at ta ck
Q ui et ly
in tr od
uc ed
an d re m ai n
un de te ct ed
by hi di ng
th e
ev id en ce
of th e at ta ck er ’s ac ti on
s
S te al th y pa ck et dr op
pi ng
P hy si ca l at ta ck
A n en de av or
to ha rm
ph ys ic al
co m po ne nt s of
a co m pu te r or
ne tw or k
C ol d B oo
t at ta ck ,S
to ne d B oo
t, E vi l M ai d
A F
A tt ac ke rs w it h ph ys ic al ac ce ss
to a
co m pu
te r ca n re tr ie ve
en cr yp
ti on
ke ys
fr om
a ru nn in g op er at in g
sy st em
,f or
in st an ce
A s so on
as a co m pu te r is
ph ys ic al ly
co nt ro ll ed ,i t ca n be
de st ru ct iv e [3 1]
P as sw
or d at ta ck
A tt em
pt s to
ga in
pa ss w or ds
D ic ti on
ar y at ta ck ,p hi sh in g at ta ck
IV
T he y ar e sp ec ifi ed
by a se ri es
of un su cc es sf ul
lo gi ns
(b ru te fo rc e)
in a sh or t pe ri od
of ti m e [3 2]
123
A comprehensive survey on network anomaly detection 455
Ta bl e 2
co nt in ue d
A tt ac k
D efi
ni ti on
E xa m pl es
T a
C yb er
re co nn ai ss an ce
In fo rm
at io n ga th er in g at ta ck
P in g sw
ee ps ,P
or t sc an s, pa ck et sn if fe rs
IV
G at he rs in fo rm
at io n on
ne tw or k
sy st em
s an d se rv ic es
E xp
lo it s vu
ln er ab il it ie s or
w ea kn es se s by
sc an ni ng
or pr ob in g de vi ce s or
sy st em
s [3 3]
P ro be
It is ac co m pl is he d be fo re
an at ta ck er
la un
ch es
an at ta ck
on a
gi ve n ta rg et
IP sw
ee p,
po rt sw
ee p
IV
S ca ns
or pr ob es
th e ta rg et ’s
ne tw or k or
ho st by
se ar ch in g fo r
vu ln er ab il it ie s, op
en po
rt s, va li d
IP ad dr es se s, se rv ic es
of fe re d,
op er at in g sy st em
us ed ,e tc
U se r to
R oo
t (U
2R )
C on
si st s of
un au th or iz ed
ac ce ss
to lo ca l su pe ru se r pr iv il eg es
by st ar ti ng
as a re gu
la r un
pr iv il eg ed
us er
L oa dm
or e, pe rl ,X
te rm
M
U 2R
at ta ck s m ay
en d in
su bs ta nt ia l
lo ss
of ti m e an d m on ey
R em
ot e- to -L oc al (R
2L )
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.