Site News

Science

A survey, shows that less then 40% of the British public feel they are well informed about science.

New Articles - Earth's Carbon Cycle Ultra Sonic Frogs Environmental Niche & Dinosaurs Seismic Waves Global Warming Life Support Systems Introduction to the Big Bang The Problem of Acid Rain

Our science section is in production with a proposed 1 Mar 07 "Grand launch" date.

Technology

The Linux Convert site explains how, even today, building your own linux box can be cheaper than getting an off the shelf Windows PC. There is a new article on why you should use linux there now.

New articles: Firewall Bypass Attack Snort For Newbies Malware and Intrusions Intrusion Detection Systems Malware, Trojans and Virus infections and Infection Removal

If you have any comments or suggestions for topics we should cover under the technology banner then please stop by the discussion board and let us know.

Intrusion Detection Systems

Introduction into Intrusion Detection Systems (IDS)

A relevant paper by Bykova et al reported on the development of an equivalent IDS based on the analysis of traffic on a University network. From their work, the IDS should scan for evidence of:

  • Packets with low TTL values
  • The same destination and source port numbers
  • IP addresses in the private range
  • Address violations (such as 0. as the destination IP, 127 as the source outside the host, all 1 bits in the host name)
  • Invalid TCP flags (invalids combinations of SYN, URG, PSH, RST,FIN)
  • Use of strict routing option
  • Zero port
  • Port source and destination have the same numbers (although this was considered to be more likely due to coincidence than attack)
  • Header too short

In the Cisco document Network Security at a glance (http://www.cisco.com) the following factors are presented as the crucial ones in developing a secure network:

  • Identify user ID (e.g. password)
  • Identify Device identity on basis of IP/MAC address then can authenticate and apply proper policy for that user/device/app
  • Apply perimeter security access control lists on routers and switches
  • Also use firewall, virus scanners, content filter and IDS

Page 1 - Page 2 - Page 3 - Page 4 - Page 5 - Page 6 - Page 7

XHTML CSS level 2 W3 Sites Any Browser GEO Url

Sci-Tech

RSS Feed

News Provided By The BBC