Firewalls & Detection Evasions Flashcards

1
Q

stateless firewall

A

packet filter: examine packet at network layer (L4)
decision based on packet header IP, port, flags
+ application independent, performance and scalability
- no state or application context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

stateful firewall

A

decision also based on session state
+more powerful rules
- state for udp?, state explosion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

next gen. firewall

A
  • NGFW
  • deep packet inspection
  • take application and protocol state into account for security decision
    + application and protocol awareness
  • need to support many application protocols
  • perf. and scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

accuracy vs. precision

A

precision: values of repeated mes. are clustered
accuracy: how close measured values are to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

multiple detectors

A

parallel composition: either A or B triggers allert (A or B) -> inc. false positive
serical composition: both A and B must trigger for alert (A and B) -> inc. false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

signatures

A

use information of previous attacks to detect suspicious behaviour

1d: blacklist/whitelist
2d: regular expression functions and string matching
nd: threshold of good or bad activities classifies behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sandboxing

A

run suspicious program in isolated environment and check behaviour
+proactive, no signature updates
-resource intensive, high latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

machine learning

A

supervised: analyze labeled data (good/bad)
unsupervised: classify unlabeled data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall Attacks

A
  • IP Source Spoofing: spoof source IP address to bypass filters (ineff. for TCP)
  • artificial fragmentation: fragment packets to bypass rules
  • Dos: provoke state explosion at FW
  • Tunneling: data in ICMP ping packets or DNS requests / VPN channel
  • encodings: different encodings or addition of noise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protectors

A
  • detect use of debuggers or virtualization

- if seen, malware causes different operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Crypter

A
  • encrypt malware so that signature detection systems and static analysis are ineffectual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

packers

A
  • make malware smaller and more portable

- binary is structurally different every time packed version is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

polymorphism techniques

A
  • swap equivalent code
  • change order of code
  • insert noise
  • compiler modulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

binder

A

embed maleware into other software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

why was stuxnet not detected by antivirus

A

AV only detects known malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly