Notes for October 19, 1998

  1. Greetings and Felicitations!
    1. Homework is due in two weeks, on Monday, November 2.
    2. Office hours are moved for this Wednesday, to Tuesday 2:00-3:00. I have a meeting that had to be scheduled for after class on Wednesday.
  2. Puzzle of the Day
  3. Flaw Hypothesis Methodology
    1. System analysis
    2. Hypothesis generation
    3. Hypothesis testing
    4. Generalization
  4. System Analysis
    1. Learn everything you can about the system
    2. Learn everything you can about operational procedures
    3. Compare to models like PA, RISOS
    4. Hypothesis Generation
    1. Study the system, look for inconsistencies in interfaces
    2. Compare to previous systems
    3. Compare to models like PA, RISOS
  5. Hypothesis testing
    1. Look at system code, see if it would work (live experiment may be unneeded)
    2. If live experiment needed, observe usual protocols
  6. Generalization
    1. See if other programs, interfaces, or subjects/objects suffer from the same problem
    2. See if this suggests a more generic type of flaw
  7. Peeling the Onion
    1. You know very little (not even phone numbers or IP addresses)
    2. You know the phone number/IP address of system, but nothing else
    3. You have an unprivileged (guest) account on the system.
    4. You have an account with limited privileges.
  8. Examples
    1. Go through Michigan Terminal System penetration
    2. Go through Burroughs B6700 penetration
  9. Intrusion Detection Systems
    1. Anomaly detectors: look for unusual patterns
    2. Misuse detectors: look for sequences known to cause problems
    3. Specification detectors: look for actions outside specifications



You can also see this document in its native format, in Postscript, in PDF, or in ASCII text.
Send email to [email protected]. Department of Computer Science
University of California at Davis
Davis, CA 95616-8562


Page last modified on 10/19/98