beautypg.com

H3C Technologies H3C Intelligent Management Center User Manual

Page 43

background image

34

UBA provides the following predefined anomaly detection templates. You cannot add or delete

anomaly detection templates, but you can modify them.

TCP Null Scan—Used to determine whether a port is closed on the target host. The attacker sends to

the target host port a TCP packet with no flags in the packet header. If the port is closed, the host

returns a TCP RST packet. Otherwise, the packet is discarded.

TCP Fin Scan—Used to determine port status and the operating system version (Unix or Windows)

on the target host. The attacker sends to the target host port a TCP packet with the FIN bit set in the

packet header. If the port is closed, the host returns a TCP RST packet. Otherwise, the packet is
discarded.

TCP Syn Fin Scan—Indicates that a network attack has occurred. TCP SYN is used to initiate a TCP

connection, and cannot be set together with the FIN and RST bits. Other similar combinations

include SYN/FIN, SYN/FIN/PSH, SYN/FIN/RST, and SYN/FIN/RST/PSH.

TCP Xmas Scan—Used to determine whether ports are closed on the target host. The attacker sends

to the target host port a TCP packet with the FIN, URG, and PSH bits set in the packet header. If the

port is closed, the host returns a TCP RST packet. Otherwise, the packet is discarded.

UDP Bomb Attack—Used to attack old version operating systems. The attacker fills the UDP header

with some invalid values, such as Length values. Some old version operating systems will crash
when flooded with such packets.

Snork Attack—Denial of service (DoS) attack against Windows NT RPC service. This attack is

accomplished by sending UDP packets with source port 7, 19, or 135, and destination port 135.

UDP Flood Attack—UDP-based DoS attack. This attack significantly consumes the network

bandwidth and degrades the network performance.

DNS Rogue Hack—An attack that exploits the DNS protocol to transmit illegal data. The attacker

disguises the data as DNS traffic to send through the UDP port 53. Administrators must specify a

list of valid DNS servers to distinguish between legitimate and disguised DNS traffic.

Invalid ToS—Packets that contain invalid ToS values, such as 0, 2, 4, 8, and 16.

Land Attack—Used to attack a host operating system. This attack is accomplished by sending

spoofed packets with source address the same as the destination address, causing the operating
system flooded with these packets to crash or "hang."

Invalid IP Protocol—Spoofed IP packets with protocol numbers equal to or greater than 134. These

protocol numbers are unassigned or reserved, and cannot be used in normal networks.

Corrupt IP Option—Used to attack Windows operating system hosts. The attacker crashes the

target Window system or bypasses security checks by sending packets to the system with carefully

crafted IP options.

Time Stamp IP Option—Used to attack NetBSD hosts. The attacker launches a remote DOS attack

against the target NetBSD system by flooding the system with TCP packets. The TCP packets
contain unmatched IP timestamp options, which causes the NetBSD system to crash.

Source Route IP Option—The attacker uses IP source options to hide their true address and access

restricted areas of a network by specifying a different path.

Record Route IP Option—The attacker uses IP route record options to gain information about the

architecture and topology information of the network through which the IP packets passed.

Security IP Option—Forged IP packets with security options in the packet header. The IP security

option is obsolete and therefore its presence in the IP header is suspect.

Stream ID IP Option—Forged IP packets with stream ID options in the packet header. The stream ID

option is obsolete and therefore its presence in the IP header is suspect.