Features of the functioning of the corporate firewall and issues of interaction with the IDS system

Keywords: IDS, IPS, Firewall

Abstract

Offers a brief overview of the features of using a corporate firewall and the issues of interaction with the elements of the IDS system. Some important features of synthesis of the threat model are considered. Attention was drawn to the importance of correct IDS system setup (Snort). The basic stages of configuration and some features of the assessment of the level of protection of the corporate firewall are highlighted. Attention is drawn to the importance of network resource segmentation and IDS system sensor placement.

Downloads

Download data is not yet available.

Author Biographies

Денис Рондалєв, V. N. Karazin Kharkiv National University

Computer science student

Ольга Мелкозьорова, V. N. Karazin Kharkiv National University

Ph.D., Senior Lecturer

Олексій Нарєжній, V. N. Karazin Kharkiv National University

Ph.D., Associate Professor

References

О. Р. Лапонина, Межсетевое экранирование, Бином, 2014.

A. Sh.Ashoor, “Importance of Intrusion Detection System”, International Journal of Scientific Engineering Researc. – pp. 7.

J. P. Anderson, “Computer Security Threat Monitoring And Surveillance”, pp. 56, 1980.

T. F. Lunt et al., A Real-Time Intrusion-Detection Expert System (IDES), SRI International, pp. 166,1992.

National Information Systems Security '95, 1996

The Evolution of Intrusion Detection Systems, 2001.[Online]. Available: https://www.symantec.com/connect/articles/evolution-intrusion-detection-systems.

“Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems”, Independent Study, pp. 17, 2003.

Дж. Маллери и др., Безопасная сеть вашей компании, Москва: НТ Пресс, 2007.

О.С. Ріпний, О.О. Дьяченко, С.В. Малахов, “Особливості функціонування систем IDS та IPS при реалізації спроб несан-кціонованого доступу до корпоративних ресурсів”, Матеріали IX міжнародної НТК. 11-12.04.2019, Харків: НТУ "ХПІ", с.95, 2019.

В.В. Сербин, С.В. Малахов, “Захист від несанкціонованих дій в сучасних інформаційних системах”, Проблеми інфор-матизації: Матеріали VII міжнародній НТК. 13-15.11.2019, т.1: секції 1-3, Ч: ЧДТУ, 2019, с.119.

А.Тарасенко, Технология Honeypot, Ч.1: Назначение Honeypot. [Online]. Available: https://www.securitylab.ru/analytics /275420.php

“Global number of cyber security incidents from 2009 to 2015”, Statista Research Department. – 2015. [Online]. Available: https://www.statista.com/statistics/387857/number-cyber-security-incidents-worldwide/. Accessed on 24.12.2018.

Д. В.Чепмен-мл., Э. Фокс, Брандмауэры Cisco Secure PIX, Вильямс, 2003.

What is netfilter.org? [Online]. Available: https://www.netfilter.org/. Accessed on 21.12.2019.

Ethical Hacking and Countermeasures: Secure Network Infrastructures, 2009.

M. E. Whitman, Principles of Information Security, 2009.

E. Kirda et al., “Recent Advances in Intrusion Detection”, 12th International Symposium, 2009.

What is Snort? [Online]. Available: https://www.snort.org/faq/what-is-snort. Accessed on 27.11.2019.

Prelude Log Monitoring Lackey Manual. [Online]. Available: https://www.prelude-siem.org/projects/prelude/wiki/PreludeLml . Accessed on 12.11.2019.

Про затвердження Положення про державний контроль за станом технічного захисту інформації, 2007. [Online]. Available: https://zakon.rada.gov.ua/laws/show/z0785-07. Accessed on 12.08.2019.

Snort Users Manual. Node 29, 2019. [Online]. Available: http://manual-snort-org.s3-website-us-east-1.amazonaws.com/node29.html. Accessed on 12.11.2019.

Про затвердження Положення про порядок розроблення, виробництва та експлуатації засобів криптографічного захисту інформації, 2007. [Online]. Available: https://zakon.rada.gov.ua/laws/show/z0862-07. Accessed on 05.09.2019.

Snort IPS With NFQ (nfqueue) Routing on Ubuntu, 2017. [Online]. Available: http://sublimerobots.com/2017/06/snort-ips-with-nfq-routing-on-ubuntu/. Accessed on 16.09.2019.

“Encrypted Traffic Analytics with the New Cisco Network and Stealthwatch”, Cisco public, pp. 52, 2019.

“NIST Special Publication 800-30”, National Institute of Standards and Technology, pp. 95, 2012.

Patator Github page. [Online]. Available: https://github.com/lanjelot/patator. Accessed on 02.11.2019.

Hydra Github page. [Online]. Available: https://github.com/vanhauser-thc/thc-hydra. Accessed on 02.11.2019.

cURL Man Page. [Online]. Available: https://curl.haxx.se/docs/manpage.html. Accessed on 02.11.2019.

nslookup Man Page. [Online]. Available: https://manpages.debian.org/jessie/dnsutils/nslookup.1.en.html. Accessed on 02.11.2019.

Getting started with hping 3. [Online]. Available: http://wiki.hping.org/94. Accessed on 02.11.2019.

nmap Man Page. [Online]. Available: https://nmap.org/book/man.html#man-description. Accessed on 02.11.2019.

Published
2019-12-29
Cited
How to Cite
Рондалєв, Д., Мелкозьорова, О., & Нарєжній, О. (2019). Features of the functioning of the corporate firewall and issues of interaction with the IDS system. Computer Science and Cybersecurity, (3), 11-21. https://doi.org/10.26565/2519-2310-2019-3-02
Section
Статті