22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

355<br />

sible (e.g. DDOS attack). Some reactions may be harmful from the point of view<br />

of protected domain business.<br />

In FCDS prototype there are implemented following open source reaction<br />

elements:<br />

• Firewall – iptabeles;<br />

• DNS blackholing – Bind;<br />

• Web Proxy – Squid.<br />

They were chosen after requirements definition for developed system.<br />

First of them iptables [14] is an application used to manage packet filtering.<br />

It enables creating Linux firewalls (stateful firewall) or NAT (Network<br />

Address Translation). System administrator defines chains including set of rules<br />

e.g. ACCEPT, DROP, REJECT (Figure 6).<br />

Figure 6. Definition of rules for iptables<br />

Each rule in a chain contains the specification of which packets it matches.<br />

Packets are processed by sequentially traversing the rules in chains. In FCDS iptables<br />

is used for dropping IP packets when source/destination address is recognized<br />

as intrusive.<br />

Second implemented RE is also open source software for DNS blackholing<br />

– Bind [15]. Bind publishes the Blacklist of IP addresses of zombie computers<br />

or other machines being used to send spam, listing the addresses of ISPs who<br />

willingly host spammers, or listing addresses which have sent spam to a honeypot<br />

system. In FCDS system the blacklist is created basing on HSN sensor (system<br />

Honey Spider Network [9] working as a sensor). In the case of FoS environment<br />

DNS blackholing is destined for user computer protection against visiting infected<br />

www portals. It requires proper user terminal configuration to enforce utilization<br />

of appropriate DNS server.<br />

As the Web Proxy as RE in developed system is used Squid [16]. Squid<br />

is a proxy which offers a rich access control, authorization <strong>and</strong> logging environment<br />

to develop web proxy <strong>and</strong> content serving applications. Squid is a highperformance<br />

proxy caching server for web clients, supporting FTP, <strong>and</strong> HTTP

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!