13.07.2015 Views

2002 - cesnet

2002 - cesnet

2002 - cesnet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The security audit of machines in the CESNET Dejvice network is carried outregularly every 14 days. The audit is divided into the following stages:1. Audit using virtually all “Denial of Service” tests available (approximately760 machines in two separate groups)2. Audit using only the safe “noDOS” tests (25 machines).Administrators are notified by letter that another security audit took place. Theletter looks approximately like this:From: AuditAdmin Date: Wed, 24 Jul <strong>2002</strong> 18:52:33 +0200To: (...)Subject: AUDIT 24.7.<strong>2002</strong> - noDOSHello,the https://spider.ten.cz/app/nessus server containscomplete security audit results for these machines:195.113.134.aaa (noDOS # aaaaa.<strong>cesnet</strong>.cz): Security warnings found195.113.134.bbb (noDOS # bb.<strong>cesnet</strong>.cz): Security warnings found195.113.144.ccc (noDOS): No response195.113.144.ddd (noDOS): Security holes foundChanges in the audit results of the following machineshave been detected:195.113.134.bbb (noDOS # bb.<strong>cesnet</strong>.cz)195.113.144.ccc (noDOS)195.113.144.ddd (noDOS)Good luck!Yours,AuditAdmin.Researchers of this project tested NESSUS and its auxiliary programs in differentalternatives and configurations and have been using them regularly in threelocal CESNET2 networks (AV ČR Praha-Krč, CESNET Praha-Dejvice, and TUOstrava). Every project researcher runs an auditing system with a configurationaccording to his own needs and requirements of administrators of machines inthe local network.During this time, we located a large number of security holes in tested machinesthanks to NESSUS and its auxiliary programs, thus making the tasks ofnetwork administrators easier to accomplish. Network administrators now havea system available that regularly and automatically provides them with reportson security issues newly detected in tested machines, usually also includingrecommendations for removing these problems.For now, the IDS SNORT system is running only in the networks of AV ČR Praha-Krč and TU Ostrava. It is successfully used when monitoring the communicationto and from a network, for which the suspicion exists that the network is beingattacked from outside or inside, is needed. The program proved useful – e.g.,196 High-speed National Research Network and its New Applications <strong>2002</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!