Cyber Security Expo
 
Network Devices, Protocols & Traffic
Click here to return to the library index
Title Contributor Date Description Rating
What is SOCKS? B. Scott Wilson 22/02/03 An explanation of the SOCKS protocol (functions, features & benefits) and application proxy gateway systems. 7
8 steps to protect your Cisco router Daniel B. Cid 06/11/03 Gives eight easy-to-follow steps to minimize a Cisco router exposure - turning off some unused services, applying some access control, applying some available security options, etc. 9
Using a Compromised Router to Capture Network Traffic David Taylor 07/09/02 This document details the approach, methodology and results of recent experimentation into the use of a captured perimeter router as a tool for network traffic capture. 8
Networking and PPP with OpenBSD 3.4 Dazzed 18/04/04 Brief overview of setting up a OpenBSD system as a NAT server with firewall capabilities using Packet Filter. 9
A Security Transfer Model based on Active Defense Strategy Hu Hanping, Zheng Ying, Hou Chengshuai, Guo Wenxuan 21/05/04 This model not only attempts to improve the security of data transfer on the web, but also to enhance the effectiveness of the network management and switching efficiency of routers. 10
Exposing the Underground: Adventures of an Open Proxy Server Joe Stewart 11/10/02 This paper discusses the abuse of misconfigured HTTP proxy servers, taking a detailed look at the types of traffic that flow through this underground network. Also discussed is the use of a 'honeyproxy', a server designed to look like a misconfigured HTTP proxy. Such a tool can be used to spy on the Internet underground without the need for a full-blown honeypot. 8
Improving Passive Packet Capture: Beyond Device Polling Luca Deri 13/01/04 Proposes a new approach to passive packet capture that combined with device polling allows packets to be captured and analyzed using the NetFlow protocol at (almost) wire speed on Gbit networks using a commodity PC. 10
Practical Domain Name System Security: A Survey of Common Hazards and Preventative Measures Nicholas A. Plante 25/05/04 Examines some of the most basic threats to the domain name system and the best practices to eliminate, or at worst, lessen the impact. 8
Predictability of Windows DNS resolver Roberto Larcher 20/03/04 Explains how it is often possible to predict the “Transaction ID” and the “UDP port number” used by Windows’ DNS Resolver. With this information it will be shown how it is possible, under certain conditions, to win the race against the regular DNS server and hijack, for example, a TCP/IP session. 9
Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler 22/12/03 Shows several methods of sniffing on (Layer 2) switched networks, and how they can be prevented. 6
Domain Footprinting for Web Applications and Web Services Shreeraj Shah 19/05/05 This paper, written by Shreeraj Shah, discusses Domain Fingerprinting, Whois, and other methods. 5
 
Network Devices, Protocols & Traffic - Community Contributions
Title Contributor Date Description Rating
Cookies Revealed Abhishek Bhuyan 20/06/03 A guide to what 'cookies' are and what websites use them for. 6
Demystifying - IPSec VPN’s Abhishek Singh 06/12/05 Abhishek Singh has written a paper on the innerworkings of IPSec VPNs. Abhishek discusses the different modes and phases and gives good illustrations. 9
Demystifying Layer 2 Attacks Abhishek Singh 20/02/06 Abhishek Singh submits this paper on Layer 2 attacks, and mitigation steps. 8
Exploiting JSON Framework : 7 Attack Shots Aditya Sood 07/02/07 This article, contributed by Aditya Sood, defines the layout of the exploiting factors of web attacks ie where the JSON framework is compromised. No votes
Security Issues with Address Resolution Protocol Akash Shrivastava 24/09/08 Akash Shrivastava submits this paper which discusses ARP attacks with a focus on spoofing. No votes
A New Fast Flexible Cryptographic Function Ashish Sharma 07/03/06 Ahsish Sharma contributes this paper on FastFlex (pronounced efflex) which is a New Cryptographic Function which can be used to construct Stream Ciphers, Hash Functions, Message Authentication Codes and Block Ciphers which perform considerably well in both hardware and software environments on Processors of varying word lengths. 8
ActiveX vs. Java Blake Stockslager 24/05/06 In the following paper, Blake Stockslager explains what ActiveX and Java is, what risks are involved when using them, and ways to safely use these technologies. 6
A Comparison of SNMP v1, v2 and v3 Brandon Matt 05/06/06 Eddie Bibbs and Brandon Matt submit this paper which discusses the evolution of SNMP from a security perspective. 9
Network Security Threats and Mitigation Techniques on Cisco Powered Service Provider Networks Brian Floyd 04/01/06 Brian Floyd submits this paper which discusses the basics of different security and network threats and discusses the use of mitigation techniques as well as and routing configurations the cable industry uses in hardening its networks against today’s threats from head-end to customer premise. No votes
The Changing Face of Network Security Threats Brian Floyd 16/05/06 This paper, contributed by Brian Floyd, discusses the basics of different security and network threats and discusses new ways to mitigate changing threats against today’s networks. 6
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson 16/12/07 This paper, written by Christopher Johnson, should help to provide a basic understanding of MPLS technology, its advantages and limitations, and its application as an IP VPN. 7
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson 16/12/07 This paper, written by Christopher Johnson, should help to provide a basic understanding of MPLS technology, its advantages and limitations, and its application as an IP VPN. No votes
An overview of raw sockets programming with FreeBSD Chapter I: Transport Control Protocol clau & burebista 23/07/03 Raw socket coding is vital to compromising a system. It is a skill useful to both hackers and network admins. 10
Web Access Management and Single Sign-On Dale Huggins 16/04/10 Dale Huggins takes a look at Single Sign On solutions for web aaplications. 9
Tracking Data over Bit Torrent Dan Morrill 22/02/06 Dan Morrill discusses discovering whom by IP and geographic location is downloading a particular file or files across the Bit Torrent networks and what you should know. 9
Securing Amazon Web Services (AWS) and Simple Storage Service (Amazon S3) Security David Borland 11/05/12 David Borland submits this paper on Amazon AWS security basics. A very good overvie wif you are considering Amazon as a cloud provider and want to know more about the security they provide. No votes
Common Denial of Service Attacks David Slee 08/10/07 David Slee presents this paper which will examine various denial of service attacks and network defense measures taken against them, as well as a historical look at the evolution of these attacks from different flood attacks to zombie driven botnet attacks will shed light on their increasingly more sophisticated design and the networking community efforts to combat them. The current technology, motivation and future trends of distributed denial of service botnet attacks will be also be presented. No votes
Arp poisoning in practice DiabloHorn 07/10/04 Testing the theory of ARP Poisoning. 9
Latency, Packet Loss and Encryption using DES with a VPN Ed Sutton 03/08/05 A case study presented by Ed Sutton that demonstrates the impact of using high end encryption within VPN solutions. 9
Defense Against DoS/DDoS Attacks Hang Chau 16/09/04 A well written paper that defines, describes and outlines defending against Denial of Service and Distributed Denial of Service attacks. 8
Defense Against the DoS/DDoS Attacks on Cisco Routers Hang Chau 19/09/04 Cisco routers are said to have a market share of over 90% in the Internet. They are used widely by most large companies and agencies all over the world, and are considered as the most important building blocks of the Internet. But, Cisco routers have several vulnerabilities that could allow hackers to disrupt Internet traffic, intercept sensitive information such as passwords and credit card numbers or redirect traffic from web sites. Securing the router is the first thing that network administrators need to do. 8
Small Business Network Security 101 Ilana Nijnik 28/09/05 Ilana Nijnik submits this paper on protecting small companies best practices as well as a tool, CheckPoints Safe Office product, to help. This paper discusses the threats that face small businesses, as well as steps to they can take to protect themselves. 10
DNS Security and Threat Mitigation: An Overview of Domain Name System Threats and Strategies for Securing a BIND Name Server Jeff S. Drake 29/11/06 This document, written by Jeff Drake, will first present an overview of the DNS architecture and name resolution process as well as describe common threats to DNS. when we will outline some of the defensive configurations that can be implemented in BIND to help protect against some of these common threats. 7
Sound Choices for VOIP Security Jonathan Casteel 10/01/06 Jonathan Casteel writes about the security surrounding VOIP, possible attack scenarios, archetecture, and other security minded topics. No votes
An Analysis of Security Mechanisms in the OSI Model Karlo Rodriguez 06/12/07 Karlo Rodriguez submits this paper on security and the OSI model. No votes
Hardening Network Routing Kevin Brady 15/06/06 Kevin Brady submits this paper which discusses archetecture and design of a network and provides diagrams to illustrate. 9
Sniffing in a Switched Network - Arp Spoofing Using Ettercap and Ethereal Manu Garg 27/06/05 Manu Garg submits this presentation on the fine art of sniffing and spoofing in switched environments using Ettercap and Ethereal. 8
Virtual Private Networks: IPSec Vs. SSL Michael Daye Jr. 19/04/07 Michael Daye Jr. Submits this paper discussing the different VPN technologies out there such as IPSec, L2TP, and SSL. 10
IPv6 Security Considerations Mohammad Heidari 22/09/04 This paper discusses the Security problems surrounding IPv6. 9
HTTP: Doing What Your Browser Does For You Nekogaimasu 07/09/02 exploring HTTP through telnet; examples 8
Introducing a new idea of Routing via Novel Clustering Strategy for AdHoc Networks Priyanka Agrawal 05/02/07 Priyanka Agrawal presents this paper which discusses the ability to improve routing in wireless mobile adhoc networks. 10
Own your LAN with Arp Poison Routing Rorik Koster 02/06/06 Rorik Koster submits this paper on Arp poisoning, how it works, and a demonstration using Cain. 8
IPv6 Security Issues Samuel Sotillo 08/11/06 This paper, written by Samuel Sotillo, reviews some of the improvements associated with the new Internet Protocol version 6, with an emphasis on its security-related functionality. At the end, it concludes summarizing some of the most common security concerns the new suite of protocols creates. 9
Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo 09/03/08 This document, written by Samuel Sotillo, presents an overview on some security issues that affect the Extensible Authentication Protocol as defined by the IETF RFC 3748. 10
Analysis of Automated Network Attack Signature Generation Models Shray Kapoor 22/02/08 The aim of this research, conducted by Shray Kapoor, is to analyze various automated signature generation approaches, catering to generation of efficient signatures for polymorphic worms and networks attacks. 7
Securing a Converged Network Steve Sullivan 02/01/07 This paper will examine what is required to secure a converged network to provide the same type of worry –free communications that circuit-switched networks provided for years. 10
VoIP – Time to Make the Call? Steve Sullivan 25/04/07 This paper, written by Steve Sullivan, will examine some security concerns and defense approaches by looking at the threats to VoIP and how to deal with them from design, quality of service and management perspectives. 9
OpenVPN 101: Introduction to OpenVPN Stijn Huyghe 17/08/04 This document will introduce OpenVPN as a free, secure and easy to use and configure SSLbased VPN solution. The document will present some simple (and verified) scenario’s that might be useful for preparing security/networking labs with students, for creating a remote access solution or as a new project for the interested home user. 9
Push it into the Cloud; using a Service Provider to Provide 'Service' Todd Davidson Koonts 28/11/05 Todd Koonts submits this article on the vulnerabilities of Internet Protocols, and how to utilize your ISP to help protect yourself. 8
DNS Cache Poisoning: Definition and Prevention Tom Olzak 21/03/06 Tom Olzak discusses how the proper operation of DNS is fundamental to the maintenance and distribution of the addresses for the vast number of nodes around the globe. 5
Strengthen Data Protection with Network Access Controls Tom Olzak 09/05/06 Tom Olzak submits this paper on Network Access Controls best practices. 10

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.