04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> Micro <strong>OfficeScan</strong> <strong>10.6</strong> Administrator’s <strong>Guide</strong><br />

11-4<br />

Intrusion Detection System<br />

The <strong>OfficeScan</strong> firewall also includes an Intrusion Detection System (IDS). When<br />

enabled, IDS can help identify patterns in network packets that may indicate an attack<br />

on the client. The <strong>OfficeScan</strong> firewall can help prevent the following well-known<br />

intrusions:<br />

• Too Big Fragment: A Denial of Service Attack where a hacker directs an oversized<br />

TCP/UDP packet at a target computer. This can cause the computer's buffer to<br />

overflow, which can freeze or reboot the computer.<br />

• Ping of Death: A Denial of Service attack where a hacker directs an oversized<br />

ICMP/ICMPv6 packet at a target computer. This can cause the computer's buffer<br />

to overflow, which can freeze or reboot the computer.<br />

• Conflicted ARP: A type of attack where a hacker sends an Address Resolution<br />

Protocol (ARP) request with the same source and destination IP address to a<br />

computer. The target computer continually sends an ARP response (its MAC<br />

address) to itself, causing it to freeze or crash.<br />

• SYN Flood: A Denial of Service attack where a program sends multiple TCP<br />

synchronization (SYN) packets to a computer, causing the computer to continually<br />

send synchronization acknowledgment (SYN/ACK) responses. This can exhaust<br />

computer memory and eventually crash the computer.<br />

• Overlapping Fragment: Similar to a Teardrop attack, this Denial of Service attack<br />

sends overlapping TCP fragments to a computer. This overwrites the header<br />

information in the first TCP fragment and may pass through a firewall. The firewall<br />

may then allow subsequent fragments with malicious code to pass through to the<br />

target computer.<br />

• Teardrop: Similar to an overlapping fragment attack, this Denial of Service attack<br />

deals with IP fragments. A confusing offset value in the second or later IP fragment<br />

can cause the receiving computer’s operating system to crash when attempting to<br />

reassemble the fragments.<br />

• Tiny Fragment Attack: A type of attack where a small TCP fragment size forces<br />

the first TCP packet header information into the next fragment. This can cause<br />

routers that filter traffic to ignore the subsequent fragments, which may contain<br />

malicious data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!