Sumários

Intrusion Detection Systems

8 Outubro 2015, 11:00 Ricardo Chaves

Attack profile
Common Intrusion Detection Framework
Detection method
Data source


Implementation and Analysis of a Virtual Computer Network

5 Outubro 2015, 15:00 Naercio David Pedro Magaia

  • Implement and test a virtual computer network.
  • Perform a simple TCP/IP packet analysis.


Firewalls

5 Outubro 2015, 12:00 Miguel Filipe Leitão Pardal

Goals and Functionality

Types: Packet filters, application-level gateway, circuit gateway

Core topologies: dual-homed (bastion host), screened hosts, screened subnet

IPTables


Implementation and Analysis of a Virtual Computer Network

5 Outubro 2015, 10:30 Naercio David Pedro Magaia

  • Implement and test a virtual computer network.
  • Perform a simple TCP/IP packet analysis.


Network transport and naming vulnerabilities

1 Outubro 2015, 11:00 Miguel Filipe Leitão Pardal

Network transport layer vulnerabilities

  • TCP hijacking
  • SYN flooding
  • SMURF, CHARGEN&ECHO, Ping-of-Death, Teardrop, Land

Naming vulnerabilities

  • DNS architecture threats
  • Kaminsky attack on DNS