【文章內(nèi)容簡(jiǎn)介】
? ? ? 針對(duì)空白 IP 地址空間的異常訪問行為是真正威肋的早期預(yù)警信號(hào) Attacker 有效訪問 偵測(cè)訪問 169。 2022 Extreme Networks, Inc. All rights reserved. Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. Page 13 威脅檢測(cè)機(jī)制 TAE 基于主機(jī)間所有會(huì)話流量分析,要求端口鏡像 Host Rules-主機(jī)策略 ? 異常主機(jī)訪問監(jiān)控: Too many unused、 Too many unprotected等 Portbased monitoring- udp/tcp端口策略 ? Ports across many hosts: Too many SMTP等 ? Ports per host : ports scan-端口掃描 Packet-包策略 ? 協(xié)議包合法性檢查 Spoof-欺騙策略 ? 非法 IP和 MAC 映射 169。 2022 Extreme Networks, Inc. All rights reserved. Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. Page 14 防護(hù)措施 Active Deception Sentriant 通過 virtual decoys 虛擬主機(jī),代為響應(yīng)非法訪問請(qǐng)求 Sentriant可仿真各種操作系統(tǒng)主機(jī) (如 DOS,windows95,windowsXP等) RPT攻擊源無法區(qū)分真實(shí)主機(jī)與虛擬主機(jī),嘗試攻擊不存在的虛擬主機(jī),從而浪費(fèi)其系統(tǒng)資 Sentriant記錄所有針對(duì)虛擬主機(jī)的攻擊行為和攻擊模式 真實(shí)主機(jī)隱藏在虛擬主機(jī)產(chǎn)生的 white noise白噪聲中 ! Virtual Decoys ! Virtual Decoys 虛擬主機(jī)預(yù)警網(wǎng)絡(luò)掃描行為 ! ! Virtual Decoys 169。 2022 Extreme Networks, Inc. All rights reserved. Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. Page 15 防護(hù)措施 Snaring 修改 TCP 會(huì)話建立過程中的 3way握手過程 設(shè)置 TCP window size 為 zero ? 強(qiáng)制攻擊源每次只能發(fā)送一個(gè)攻擊包 設(shè)置 MSS值,強(qiáng)制每個(gè)攻擊包大小為最小 因?yàn)楣粼粗鳈C(jī)的資源有限, sentriant可通過上述行為,掛住每一個(gè)攻擊會(huì)話,導(dǎo)致攻擊源無效會(huì)話數(shù)累積,從而最終降低其對(duì)其它主機(jī)的攻擊能量 Snaring 虛假響應(yīng)延續(xù)攻擊會(huì)話存活時(shí)間 A t t a c k e rS n a r eR e s p o n s eS YNA CK ( At t ac k p ac ke t )S YN /A CK ( Win do w = 0 , M SS = 1 0)W in do w P ro beA CK ( Win do w = 0 , M SS = 1 0)~ 4 : 1 0~ 4 : 1 0Attacker Response 169。 2022 Extreme Networks, Inc. All rights reserved. Extreme Networks Confidential and Proprietary. For Internal Use Only. Not to be distributed outside of Extreme Networks, Inc. Page 16 防護(hù)措施 Cloak MAC Address IP Address 攻擊源 ARP 表 00:fe:4a:c3:ca:e0 00:fe:ea:d1:32:5a 00:fe:cd:a5:4a:d2 攻擊源 目的主機(jī) MAC Address IP Address 目的主機(jī) ARP表 00:fe:3e:c1:82:0e 00:fe:ea:d1:32:5a 00:fe:cd:a5:4a:d2 攻擊包 Cloaking之前 MAC Address IP Address 攻擊源 ARP 表 00:fe:00:00:00:fe MAC Address IP Address 目的主機(jī) ARP 表 00:fe:ea:d1:32:5a 00:fe:00:00:00:f2 00:fe:00:00:00:f1 00:fe:00:00:00:fe 00:fe:cd:a5:4a:d2 { { 重定向 Arp表 重定向 Arp表 Cloaking之后 攻擊源 目的主機(jī) 當(dāng) Sentr