Network Intrusion Detection OverviewNetwork intrusion detection is a critical component of network defense. Through effective network intrusion detection, malicious activities and policy violations can be monitored and identified. In general, network intrusion detection system (NIDS) can
Buffer Overflow Attack OverviewThis lab introduces the buffer overflow where a program, when writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. This vulnerability can be utilized by a malicious user
ARP Spoofing Attack OverviewThe Internet protocol suite, also known as TCP/IP suite, is the foundation of the Internet. This suite provides various protocols that lie upon the Internet Protocol (IP) for end-to-end data communications. Vulnerabilities
Cross-site Scripting Attack OverviewCross-site scripting (XSS) is a type of exploits that relies on injecting executable code into the target website and later making the victims executing the code in their browser. It is one of
Network Vulnerability Discovery OverviewVulnerability discovery (or vulnerability scanning) is one of the most important parts of proactive defense. With regular and periodical vulnerability scan, system and network weaknesses can be identified in advance and many security
Network Firewall OverviewThis lab explains firewall rules and related theory, and illustrates firewall configuration with examples. Students will play with iptables to get familiar with Linux built-in firewall software and common concepts about table, chain,
DNS Cache Poisoning Attack OverviewThe Internet protocol suite, also known as TCP/IP suite, is the foundation of the Internet. This suite provides various protocols that lie upon the Internet Protocol (IP) for end-to-end data communications. Vulnerabilities
TCP SYN Flooding Attack OverviewThe Internet protocol suite, also known as TCP/IP suite, is the foundation of the Internet. This suite provides various protocols that lie upon the Internet Protocol (IP) for end-to-end data communications. Vulnerabilities