Перейти к содержанию
Кирилл Керценбаум

Обсуждение технологии IBM Security Protocol Analysis Module

Recommended Posts

Кирилл Керценбаум

IBM Security Protocol Analysis Module (PAM) - Модуль Анализа Протоколов, является "мозгом" всех продуктов IBM Security класса Intrusion Prevention System (Network IPS и Host IPS) и разрабатывается и поддерживается исследователями и разработчиками команды IBM X-Force. На данный момент времени IBM Security PAM идентифицирует и анализирует 245 сетевых протокола и формата файлов. С учетом того, что он разбирает протоколы и анализирует содержимое, он обнаруживает на данный момент 3291 различных видов событий. Данные события условно разделяются на 3 крупных класса: атаки, аудит и состояние.

IBM Security Protocol Analysis Module Overview(PAM)

IBM Security Protocol Analysis Module Shellcode Heuristics(PAM SCH)

IBM Security Protocol Analysis Module Injection Logic Engine(PAM ILE)

IBM Security Protocol Analysis Module Content Analysis(PAM CA)

IBM Security Protocol Analysis Module (PAM) обеспечивает следующие возможности:

ВИРТУАЛЬНЫЙ ПАТЧ - закрывает возможность использования уязвимостей в ПО вне зависимости от того установлено ли на системе соответствующее обновление от производителя и обеспечивает возможность отказаться от "пожарных" мер при распространении обновлений для ПО и ОС. Критичные системы по-прежнему должны обновляться как можно быстрее, однако в данном случае Вы можете тратить достаточно времени на тестирование соответствующих обновлений. Другие продукты IBM Security, такие как, например IBM Security Network Enterprise Scanner, могут также помочь быстрее идентифицировать наиболее уязвимые системы и ПО с целью более эффективного управления процессом установки обновлений;

ЗАЩИТА ПРИЛОЖЕНИЙ НА ПК - защищает конечных пользователей атак, направленных на приложения используемые в каждодневной работе, такие как Microsoft Office, Adobe PDF, различные мультимедиа файлы и Веб браузеры;

ЗАЩИТА ВЕБ ПРИЛОЖЕНИЙ - обеспечивает защиту Веб серверов и Веб приложений от изощренных атак на уровне программного кода, в том числе такие как SQL Injection, XSS (Cross-site scripting), PHP file-includes, CSRF (Cross-site request forgery) и др.

ОБНАРУЖЕНИЕ И БЛОКИРОВАНИЕ УГРОЗ - обнаруживает и блокирует целый класс угроз, направленных на использование того или иного эксплоита или уязвимости;

БЕЗОПАСНОСТЬ ДАННЫХ - мониторит и выявляет попытки передачи незашифрованной информации, содержащей Персональные данные (ПД) и другие типы конфиденциальной информации. Также обеспечивает возможность исследовать перемещение той или иной информации внутри и вне корпоративной сети для более ранней оценки потенциального риска в будущем;

КОНТРОЛЬ ПРИЛОЖЕНИЙ - позволяет управлять правами доступа для неразрешенных приложений и при необходимости блокировать их доступ к внутренним или внешним ресурсам. Среди поддерживаемых типов приложений, такие как ActiveX элементы, пиринговые приложения, средства Обмена мгновенными сообщениями (ICQ, Skype и др.) и попытки туннелирования трафика

IBM Security Protocol Analysis Module (PAM) позволяет защищаться от следующего класса атак:

IBM Security Protocol Analysis Module (PAM) на данный момент времени способен полностью идентифицировать и проанализировать 62 тип протоколов обмена информацией вне зависимости от порта передачи:

AIM (AOL Instant Messenger/ICQ)

BlackBerry Service Routing

BO2K (Back Orifice 2000)

Citrix IMA remote administration service

Conficker - Downadup

Data Leakage Detection через протоколы AIM, HTTP, IMAP, IRC, Microsoft Messenger, POP3, SMTP, Yahoo! Messenger, SMB и FTP

DCOM (Distributed Common Object Model)

DirectConnect

eDonkey

File Sharing

FIX (Financial Information eXchange protocol)

FTP (File Transfer Protoco)

Gnutella Peer to Peer file sharing

H.245

HTTP (Hypertext Transfer Protocol)

ICQ

IRC (Internet Relay Chat )

ISAKMP (Internet Security Association and Key Management Protocol (ISAKMP))

MGCP (Media Gateway Control Protocol)

Microsoft Messenger

MPLS (Multi-Protocol Label Switching)

MSRPC (Microsoft Remote Procedure Call)

MySQL

Napster

NFS (Sun RPC Network File System)

NIS (Sun RPC Network Information Service)

PCNFS (Sun RPC PC-NFS services)

PGM (Pragmatic General Multicast)

RFB (VNC Remote Frame Buffer)

SameTime (Instant Messenger)

SIP (Session Initiation)

Skype (VOIP, Instant Messaging)

SMTP (Simple Mail Transfer Protocol)

SNMP (Simple Network Management)

SOCKS протокол версий 4 и 5

SSH (Secure Shell Protocol)

SSL (Secure Socket Layer)

Standard for the Format of ARPA Internet Text Messages

STATD (Sun RPC Host Status Monitor)

SubSeven Trojan

Sun RPC (Open Network Computing (ONC) Remote Procedure Call версии 2)

Sun RPC automount

Sun RPC bootparam

Sun RPC calendar manager service

Sun RPC NFS mount service

Sun RPC NIS Bind

Sun RPC NIS update

Sun RPC password change service

Sun RPC portmapper service

Sun RPC remote administration

Sun RPC Selection Service

Sun RPC SGI File Alteration Monitor

Sun RPC SNMP DMI subagent

TDS (Tabular Data Stream)

TLS (Transport Layer Security версии 1)

TNS (Oracle Transparent Network Substrate)

ToolTalk (Sun RPC ToolTalk)

Trojan

Ultravox Lightweight Streaming

VRRP (Virtual Router Redundancy)

Yahoo! Messenger

...

IBM Security Protocol Analysis Module (PAM) на данный момент времени способен полностью идентифицировать и проанализировать 107 типа протоколов обмена информацией с привязкой к портам передачи:

ARP (Address Resolution Protocol)

ASN.1

Back Orifice

BGP (Border Gateway Protocol)

BOOTP (Bootstrap Protocol)

Borland Interbase SQL (также Firebird) Remote Access Services

Borland Visibroker

BrightStor backup

BSD Unix Line Printer Daemon

BSD Unix Remote Execution

CISCO CallManager

CISCO Supervisor

Content Data

CVS pserver

DameWare

DHCP (Dynamic Host Configuration)

Distributed Network

DNS (Domain Name Service)

DPS

DRDA (Distributed Relational Database Architechture stream)

EAP (Extensible Authentication)

Ethernet

Fast Ethernet

FDDI (Fiber Distributed Data Interface)

Finger User Info

Gigabit Ethernet

GRE (Generic Routing Encapsulation)

GTP (GPRS Tunneling)

H.323

HP Openview Data Protector Application Recovery Manager (OmniInet)

HSRP (Cisco Hot Standby Router)

IAX (Inter-Asterisk EXchange

IBM SolidDB

IceCap

ICMP (Internet Control Message)

ICMPv6 (Internet Control Message, Версия 6)

IDENT (Identification)

IGMP (Internet Group Management, Версия 2)

IMAP (Internet Message Access, Версия 4)

InformixSQL

Inter-Control Center Communications

IP (Internet Protocol)

IP Authentication Header

IP Encapsulating Security Payload (ESP)

IPv6 (Internet Protocol, Версия 6)

ISL (Cisco InterSwitch Link)

Kerberos

LanMan (Microsoft Windows Lan Manager Remote API)

LDAP (Lightweight Directory Access)

LLC

McAfee E-Business Server

Mercury Loadrunner Agent

MMS (Microsoft Mediaplayer)

MODBUS

NetBIOS

Netware Core

NNTP (Network News Transport)

NTP (simple Network Time)

OSPF (Open Shortest-Path First Interior Gateway)

POP3 (Post Office, Версия 3)

PPPoE (PPP over Ethernet)

PPTP (Point-to-Point Tunneling)

Proxy DNS

Q.931

Quake Protocol версии 3

RADIUS (Remote Authentication Dial In User Service)

RAS (Registration Admission Status)

Remote Desktop

RIP (Routing Information)

RLOGIN (Berkeley Remote Login)

RSH (Berkeley Remote Shell)

RSYNC (Remote File Synchronization)

RTSP (Real Time Streaming)

RtvScan (Symantec AV Process)

ScadaRealWin (RealFlex RealWin SCADA Service)

SCCP (Cisco Skinny Client Control)

SMB (Server Message Buffer)

SSRP (Mircrosoft Simple Server Redundancy)

Subversion

Symantec Alert Management System Intel Alert Originator Service

Symantec pcAnywhere

Syslog (Network Event Logging)

Systems Management Server / System Center Configuration Manager (SCCM)

Talk (BSD Unix Talk)

TCP (Transport Control)

TeamViewer Remote Desktop

Telnet

TFTP (Trivial File Transfer Protocol версии 2)

Token Ring

Trend Micro ServerProtect EarthAgent port 5005

TSM (Tivoli Remote Access Services)

TSM (Tivoli Storage Manager protocol (a/k/a ADSM))

UDP (User Datagram

UNIStim (Unified Networks IP Stimulus)

UPnP (Universal Plug-n-Play)

URL (Uniform Resource Locator)

Veritas Storage Foundation Scheduler Service

Veritas Web Server

VLAN

Windows Internet Name Service

XDMCP (X Display Manager Control)

XFS (X Font Service Protocol)

XMPP (Jabber)

...

IBM Security Protocol Analysis Module (PAM) на данный момент времени способен анализировать содержимое для точного определения 66 форматов файлов:

.ace - WinAce

.ag - Applix Graphics

.ani - Microsoft Windows animated cursor

.aom - Adobe Download Manager

.arj - ARJ archive

.asf/.wmv/.wma - Microsoft Multimedia

.asx - Microsoft Multimedia playlist

.aw - Applix Words

.bmp - Microsoft Bitmap format

.cab - Microsoft Cabinet File Format

.cbo - Microsoft Interactive Training bookmark

.chm - Compiled Help Map

.cpio - Unix archive format

.emf/.wmf - Enhanced Meta

.eot - Embedded OpenType Font

.eps - Encapsulated PostScript

.exe/.dll - Portable Executable Common Object

.fff - Folio Font

.FLAC File format

.flv - Flash Video

.gif - Graphics Interchange Format

.html - Hypertext Markup Language

.html - RealJukebox Track Info Package

.id3 - MP3 ID3 Tag format

.ini - Configuration

.java/.class - Java Bytecode

.jbig2 - JBIG2 image

.jpg - JPEG File Interchange Format

.lnk - MS Shortcut

.mdb - Microsoft Access Database

.mov/.qtif - Apple Quicktime movie/picture

.mp3 - MPEG Layer-3 File Format (mp3)

.pct - Apple QuickDraw Format

.pdf - Portable Document Format

.png - Portable Network Graphics format

.qtl - QuickTime Media Link

.ram - Real Media meta-data (playlist)

.rar - RAR archive

.rat - content rating

.rm - Real Media A/V

.rtf - Rich Text Format

.sis - Symbian installer

.smi/.sami - Synchronized Accessible Media Interchange (SAMI)

.swf - Macromedia Flash

.tif - TIFF Tag Image

.torrent - BitTorrent metainfo

.u3d - Universal 3D

.url - MS Internet Shortcut

.wab - Windows (Outlook) Address Book

.wav/.avi - Resource Interchange File Format (RIFF)

.wpd - Corel WordPerfect Document

.zip - Zip

/etc/passwd или /etc/shadow

Agent Character

FLIC

HTTP Directory Index Protocol

International Color Consortium color management profile

JavaScript

Microsoft Compound File

Microsoft Transport-Neutral Encapsulation Format (MS-TNEF)

MIME - Multipurpose Internet Mail Extensions

SDP - Session Description Protocol

SMIL - Synchronized Multimedia Integration Language

SYLK

IBM Security Protocol Analysis Module (PAM) на данный момент времени способен анализировать расширение или MIME заголовок для точного определения 10 форматов файлов:

.cur - Win32 cursor image format

.ico - Win32 Icon

.ttf - OpenType Font File

.xlw - Excel workbook file

.xml - eXtensible Markup Language

epo - ePolicy Orchestrator

Internet Printing Protocol

RSS - Really Simple Sydnication

SOAP - Simple Object Access Protocol

...

Более подробно о поддерживаемых протоколах и форматах файлов в IBM Security Protocol Analysis Module (PAM):

На данный момент времени IBM Security Protocol Analysis Module (PAM) используется в следующих продуктах компании IBM:

IBM Security Network Intrusion Prevention System

IBM Security Server Protection

IBM Security Virtual Server Protection for VMware

IBM Security Network Multi-Function Security

  • Upvote 5

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты

  • Сообщения

    • Gregoryjed
      Online casino slots are a popular pastime for many people - but with so much to choose from and learn, it can be tricky to find the best ones! Luckily, this article has all of the answers you need to find your next favorite game. With the recent release of a new craze known as "auctioning," many resorts have begun to create games that incorporate this concept. The game's rules can be explained in just the amount of time it takes to play one round. However, there are some who would argue that these games can actually make your gambling habits worse - since you don't have to learn anything, you're at a disadvantage because you're playing "blind."

      How to Win At Slot Machines

      You're not going to win at slots, but the more you play, the better your chances. One great way to win at slot machines is to play with a bonus code. One bonus code will usually give the player 10 free spins up to a certain amount or 20% extra payout after each spin. Slot machines are booming with popularity. Why? Slots have an instant jackpot, and there's always a chance for someone to win BIG! There are some simple steps to follow if you want to be successful at slots. There are many different reasons why people enjoy playing online slots, but there are some basic principles behind winning at slot machines. Here are the most important tips that will help you win at online slots:

      What are the Basic Ways to Play casino slots?

      There are a lot of different games to play at an online casino. One you might want to try is the slots, which is where the most money is won in slot machines across the world. Online casino slots vary depending on where you are playing and what games they have available. Some casinos specialize in just one game while others have many different options to choose from. There are a variety of ways that you can play casino slots. Some of these include the "Wheel of Fortune" and "Lucky Ladys Charm." Playing these games is probably one of the easiest ways to understand how the game works. If you are more interested in playing games with higher odds, then try playing video poker or blackjack.

      Which online casinos Offer Welcome Bonuses?

      Casinos that offer welcome bonuses to new players typically also have a number of other sign-up incentives, including free spins, cash back, and match deposits. These promotions can help to entice players away from their competitors and give them the best possible chance at winning big. There are various online casinos that offer welcome bonuses. These include 100% bonus, free chips, no deposit bonus, and match bonus. However, bonuses vary from casino to casino. It is important to choose a casino because of their terms and conditions. online casinos offer welcome bonuses to encourage new players to join. These welcome bonuses typically consist of a percentage of the first deposit that is given back to the player, usually in the form of free slots and/or free cash. Some online casino welcome bonuses also include an additional bonus on top of that, such as a coupon code or match bonus.

      Best Casino Sites in the UK

      The biggest mistake that players make is not doing sufficient research on the best casino sites in the UK. It's important to find a reliable and affordable site, such as Casino Rama, so that you can enjoy your time playing at one. Online casino slots are a great way to try and win big while doing something you enjoy. There are plenty of UK casinos that offer slots so it can be a daunting task trying to find the right one. The following websites offer the best casinos with the best games, bonuses and more: So you want to win at online casino slots? Rather than getting in over your head, it's best to start small - with the UK's best casinos. These sites have a great selection of games and are some of the most trusted around.

      Best online casinos in the UK

      As online casinos have become more popular, so have the rules and guidelines surrounding their game selection. One thing you should know is that the best online casino games are those that can produce a lot of revenue for your business. The UK has a handful of the top online casinos that offer slots, roulette, and other games. These include jackpotbetonline.com, jackpotbetgame.com, jackpotcasinotips.com and more to come soon as they continue to grow in popularity as an alternative to brick-and-mortar casinos. UK online casinos offer players a variety of different games with huge jackpots to be won. Different online casinos offer different types of payouts, such as the amount you will get from playing slots, or how much your deposit will pay out. It's important to know what each casino offers in order to find one that better suits your needs.

      Why Is casino slots so Addictive?

      casino slots have the potential to be highly addictive. This is because of the random nature of slot games and how the outcome of each round is different. The specific combination of symbols in each game can make a player feel as if they are always winning, which leads to them considering it a fun activity. They'll also spend more money on slot machines in order to keep this feeling going, which can lead to gambling problems and spending too much money. Many people love the thrill of playing slots. Some people enjoy slot machines because they are easy to understand and can feel in control. There are a few ways to determine why slots are so addictive and some suggestions on how to avoid it.

      Conclusion

      In conclusion, it is important to realize that playing slots online is not the same as playing slots in a land-based casino. One of the most important rules to remember when playing at a land-based casino is to never play for more than what you can afford, but online slots are not always so easy.
    • Joshua3233Chids
      This is my first time come here
      https://gto5767.com/home.php?mod=space&uid=1902793
      http://www.atlasroleplay.com/forum/profile/koreanneck14
      https://spinalhub.win/wiki/H124pc_Wholesale_Clear_Acrylic_Crystal_Stud_Earring_Field_Show_Jewelry_Reward_Binsh1
      http://quanboo.com/home.php?mod=space&uid=53013
      http://idea.informer.com/users/cobwebplier5/?what=personal

      I am very happy to cme here I am very happy to cme here I am very happy to cme here I am very happy to cme here I am very happy to cme here 8287d12
    • Ego Dekker
      Домашние антивирусы ESET были обновлены до версии 15.0.23.
    • Thomaspaymn
      Hello there, I'm completely new here, I am not sure in the event this section is a right place to create this and also sorry with this, but I was hoping a person here on anti-malware.ru would be able to assist me.
      I am just wondering anybody knows just about any trusted company for signals for crypto. Is this website good and anyone worked with them ?
      binance futures signals
      Also please introduce any good and comprehensive blog for more inormation about this kind of services. We appreciate it.
    • Gabrielmop
      Какое абстрактное мышление
      filmkont.online
×