電腦攻擊與防禦 The Attack and Defense of Computers

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

A Hybrid and Cross-Protocol Architecture with Semantics and Syntax Awareness to Improve Intrusion Detection Efficiency in Voice over IP Environments Department.
Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
現代作業系統核心 Modern Operating System Kernels
Welcome to EECS 354 Network Penetration and Security.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Linux作業系統核心 Linux Operating System
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last words on buffer overflows Overview.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
作業系統解譯器之計算理論 Computation Theory of Operating System Interpreter CE6114許富皓.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Cyber Intrusion Detection Algorithm Based on Bayes’ Theorem
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Firewalls.
Matching TCP/IP Packet to Detect Stepping-stone Intrusion Jianhua Yang TSYS School of Computer Science Edward Bosworth Center for Information Assurance.
TCP/IP Malicious Packet Detection (SQL Injection Detection) Ashok Parchuri.
23 rd Annual Computer Security Application Conference Miami, Florida 12/13/2007 Dongqing Yuan Department of Information Technology Management University.
1 How to Search, Read, Write, and Present a Paper.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Honeypot and Intrusion Detection System
Software Security Testing Vinay Srinivasan cell:
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction of Internet security Sui Wang IS300.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
CSCE 548 Secure Software Development Final Exam – Review.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
CIT 380: Securing Computer Systems
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Firewalls 1.What is a firewall? 2.Types of Firewalls 3.Packet Filtering.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Network Security Part III: Security Appliances Firewalls.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Changes in Computer Security Will You Be Better Off?
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
CSIRT Training Material Technical Issues Klaus Möller DFN-CERT May 2001.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
● Anonymous. ways - Casting the Establishment - System hacking - Infrastructure Hacking - Application and Data Hacking.
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
Epidemic spreading in complex networks with degree correlations
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
SEC 420 StrCompetitive Success/tutorialrank.com
Session Hijacking Tarun Lall.
CSC 382/582: Computer Security
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Presentation transcript:

電腦攻擊與防禦 The Attack and Defense of Computers CE6107 許富皓

Books Hacking Exposed, Fifth Edition Authors: Stuart McClure, Joel Scambray, and George Kurtz Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Authors: Simson Garfinkel and Gene Spafford Publisher: O Reilly

Contents: Footprinting Scanning Enumeration Port-Scanning OS fingerprinting. Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Format String Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks TCP session Hijacking Denial of Service Attacks/Distributed DoS

Important Security Conferences: http://www.cl.cam.ac.uk/Research/Security/conferences/all.html IEEE Symposium on Security and Privacy USENIX Security Symposium ACM Conference on Computer and Communications Security (CCS) International Symposium on Recent Advances in Intrusion Detection (RAID) Sigcomm (http://www.acm.org/sigs/sigcomm/) Infocom (http://www.ieee-infocom.org/)

Grading: Program & report 1 (30%) Report 2 (25%) Exam. (25%) Presentation (15%) Attendance (5%) ========================= Bonus (20%)