Ask the Expert

What are the top three network intrusion techniques?

What are the top three network intrusion techniques used by hackers to cover their tracks, and how can security pros spot them?

    Requires Free Membership to View

The top three technologies used by hackers to cover their tracks after a network intrusion are deleting logs, using encryption on the data being sent (leaking) out of your organization and installing rootkits -- all while not calling attention to themselves. Many high-profile attacks in the news recently have identified these technologies used by attackers. For example, the TJX hacker Albert Gonzalez is reported to have setup VPNs for criminals to communicate so they could cover their tracks.

Deleting logs helps attackers cover their tracks and makes it more difficult for forensics researchers to identify where and what attackers have accessed. It's like committing a crime and stealing the tape from the surveillance camera. Using encryption on data being sent out of your organization, for example a SSL connection over port 443 allows attackers to hide their activities from network-based detections. Outbound traffic is cloaked to look innocuous to detection systems, making data theft detection less likely. Installing rootkits similarly helps hackers further avoid detection when examining a local system. Rootkits are designed to go undetected, enabling an attacker to leisurely inspect a system and exploit it at will.

Security pros can combat these network intrusion techniques using log review, centralized logging, network-based anomaly detection and file-integrity monitoring software. These are standard techniques for detection that are not always effectively used. Developing an effective and strategic review of the many types and locations of logs can help detect when an attacker has compromised a system. Centralized logging or a mechanism that prevents tampering with the logs will defend against attackers that delete logs to cover their tracks.

Network-based anomaly detection (NBAD) identifies when a compromised system communicates with unknown systems. The technology identifies intrusions and can be used even if the attacker is, for example, using SSL over port 443 to detect the endpoint he or she is connecting to on the Internet. File-integrity monitoring software can also be used to detect when attackers modify system files with a rootkit as part of their compromise. For example, the file- integrity monitoring software can detect when a critical system file is replaced or modified to include a file from the rootkit.

This was first published in December 2009

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: