Friday, May 4, 2018

The City of Houston and Microsoft has partnered to create the nation’s first “Internet of Things” alliance.  This partnership will be aimed at digital literacy. Microsoft says they will focus on 5 communities where they will be giving people the skills they need to develop careers in an increasingly digital world. The focus is on science, technology, engineering and mathematics education programs.

The “internet of things” has far reaching potential and benefits.  One common example is when smartphones receive software upgrades to fix bugs. Another impressive one comes from electric car company Tesla, which resolves problems in cars without recalling them to the dealership. For example, upon discovering that a charger plug was a potential fire hazard, it was able to fix the issue in 29,222 vehicles via a software update.

Another overriding benefits of the “internet of things” for marketers is the vast amount of data that can be harnessed from devices. Not only can this data help to inform wider product development, but it can also be used to create meaningful and personalised interactions with consumers 24 hours a day, seven days a week.
Alongside this, it also means that customer service will be able to evolve. If a non-connected device malfunctions, it would currently be up to the consumer to take action. Whether that means searching for a solution online, enquiring of customer service, or returning it to the manufacturer. 

Ngozi

Gilliland, N., & Econsultancy. (2018, May 02). How the internet of things can improve customer experience. Retrieved from https://www.econsultancy.com/blog/69988-how-the-internet-of-things-can-improve-customer-experience


May the Fourth

Today is May the fourth, and when we think of IoT today we think of small devices that monitor the house, stream radio, and check how burnt my toast is. However, with it being May the fourth we can talk about projects that are in the spirit of the day.

First over on the website hackernoon.com, is an article about various challenges in building and IoT devices that were made, Droid Translator Helmets which will pick up the speaker’s voice and translate the speech into beeps and buzzes, a Death Star Clock, a Force detector, and others. While there is an article over on makezine.com on building an R2-D2. After building the R2-D2 unit, one can easily make it better with a bit of work and a Raspberry Pi.


References

Are You an IoT Jedi? Create Your Own Star Wars Inspired Tech. (2017, 12 15). Retrieved from Hackrnoon.com: https://hackernoon.com/are-you-an-iot-jedi-create-your-own-star-wars-inspired-tech-4c36ce8d4535

Gentile, P. (2016, March 7). The Comprehensive Guide to Building a Realistic R2-D2 Replica. Retrieved from Makezine.com: https://makezine.com/projects/building-your-first-r2/

Wednesday, May 2, 2018

Using IoT devices for IDS applications Cont...

About a month ago I started describing the the process to use a Raspberry Pi device as an IDS. Now I continue with the process.

From this base of the installed and updated OS, to install the following applications Snort, Barnyard2, PulledPork, and WebSnort the project followed the following instructions and used the Snorter installation script that is available at the following site: https://github.com/joanbono/Snorter. Once this process was completed and configured the NIDS completed and functional. Another application that can be installed is Kismet. While an explanation of the installed applications will be listed in the project results section.

Another application that was installed was the remote desktop application, XRDP. This application which will allow remote access should it be necessary to the RPZW. However, during configuration use of the remote desktop often delayed or hampered with the downloading of application packages.

By following the installation processes on the various pages, installation of the software should fairly simple to complete.

    Listing of Sites used for the installation processes:
  • https://docs.kali.org/introduction/download-official-kali-linux-images
  • https://etcher.io/
  • https://whitedome.com.au/re4son/kali-pi/#swap
  • https://www.raspberrypi.org/downloads/.
  • https://whitedome.com.au/re4son/re4son-kernel/
  • https://docs.kali.org/general-use/kali-linux-sources-list-repositories
  • https://github.com/joanbono/Snorter

Due to the non-standard configuration of a RPZW computer system and that this project was conducted on a highly compressed time-cycle certain items. In configuration of the RPZW as a NIDS the project found that the initial off the shelf configuration of the RPZW required an additional Wi-Fi connector known as a USB “On the Go” adapter, while the OS footprint and the installation of the applications required at least a 16 GBs of disk space. In consideration of the limitations the project was a success.

The project group noted some benefits to the use of the particular OS, as the Kali Linux derivative is designed as a Penetration Testing Linux for those specializing in network security evaluations. Due to this specific intention of the distribution the project has developed a standalone tool that can provide a complete evaluation of network security. This project installed successful for use the following applications Snort, BarnYard2, WebSnort, Pulled Pork and Kismet as well as from the default installation Wireshark, a short summary of the applications is below.

Snort is as the snort.org web-page documentation states “is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks.” In the use of Snort we can monitor and detect network attacks when they are active in the network

BarnYard2 is an application that is deployed to translate the output of Snort. It is used by other applications to provide a translation service to understand the output of Snort.

PulledPork is a set of rules for usage in Snort they are provided by maintainers of Snort. The maintainers of the Snort application provide a public, a private version and a paid access version of these rule sets. The usage of the predefined ruleset provides an efficient method of automating the detection of network issues.

WebSnort is a browser based interface for displaying the output of what is referred to as a pcap file. Pcap files are the generated output produced by Snort. During analyst of Snort output WebSnort can manipulate the output files.

Wireshark is an application that be used monitor network protocols. While running Wireshark, the project can monitor the data packets traversing the network. This application can provide information on not only the packet header, but can be used to reconstruct the actual webpages that have been transferred across the network.

Kismet is used as wireless network detector, sniffer and an IDS application in itself. This application can itself work as the IDS over a wi-fi network. Similar to Wireshark and Snort it too needs the Wi-Fi chipset to allow for promiscuous mode. The application is passive in nature of its monitoring of the network. Kismet can provide a survey report for the Wi-Fi networks in the area.

Wrapping this up

The project’s efforts were focused on developing a NIDS that can serve the administrators or owners of the host network as a method of notification if there is unwelcome traffic, with the additional goals of maintaining a low entry point cost and providing efficient utilization or minimum use of power for the device, as well as providing documentation for the process.

Developed by the project efforts, was a RPZW device that is capable of using a host of applications to provide for the monitoring of the network. Installed on the device was several programs used to enable monitoring of a network. The applications included Snort, Kismet, WireShark, WebSnort, PulledPork, and BarnYard2. While all these applications alone can provide for a suitable monitoring of a network, combined these utilities offer a comprehensive ability to monitor a network.

Low cost efforts of the project can be maintained. All applications including the operating system are available as opensource software. Additionally, the device itself the RPZW was purchased for ten dollars, and accessories were available for an additional few dollars more. To further emphasize cost saving we can stress that this device also consumes very little power when in operation. The final goal of the project was to provide documentation as reference on how to replicate this endeavor. The project respectfully submits this document as that documentation. Efforts of the group within this document have been recorded.

Network monitoring tools are often thought of after an issue has been discovered. The ability for one to ensure that the network is uncompromised so that the information, passwords, credit card and other private information that is sent over that network remains confidential is also only valued after evidence that the network has been compromised is discovered. As a result, the value of a passive NIDS to monitor the network should be considered as valuable as the information that is available on that network. Likewise, the usefulness of the NIDS to monitor the network would only be noted after the network has been compromised.

As the project proceeded, the group must say that the project was not without issues. As a group, we managed to successfully overcome the issues as they arose. This project suffered from various issues from logistical, to configuration issues of the appliance.

One of the initial issues the project suffered from was the specialized hardware. Notably the as it is termed “USB On the Go” connector. This micro USB male to Female USB cable or adapter was initially ordered at the same time as the original RPZW. The first cable ordered was only arrived on July 19th, after being promised the standard 5-day delivery. After the arrival of other adapters made for the RPZW, a different “USB On the Go” cable adapter was ordered and arrived as promised two days later. While awaiting cables the group project used the time by writing disk images of various operating systems on to several micro SD cards.

Once all the cables arrived the RPZW was assembled, a second issue was discovered. This issue was the originally purchased RPZW was not operational. This was confirmed by using the a few of the already imaged micro SD cards successfully in another known good Raspberry Pi. Once this was discovered as a problem the device was returned to the store and exchanged for a working unit.

One issue was with the unfamiliarity of the group with initial RPZW, as with some distributions on with Raspberry Pi the installation can be completed on the slightly larger Raspberry PI 3b, which is 64-bit, the Micro SD card with the installed and configured OS could be simply transferred and updated on the RPZW. An initial selection of OpenSUSE as the OS was in error as that distribution no longer supports 32-bit hardware. Eventually, it was determined that a modified version of Kali Linux can be used on the RPZW and was installed on the RPZW.

The final issue encountered was during the first installation of the software. The first installation of the OS and supporting application was made on an 8 GB micro SD. After installation and upgrading of the base applications, the project suffered from a lack of space on the flash memory card. A larger 16 GB flash memory card was used and the installation of all applications was completed.

A small amount of changes would be made if the project was to be repeated by this group. First, on the ordering of parts, the group recommends ordering from vendors that are local or if the vendor has policies in place to guarantee prompt delivery of the ordered items. Another change would be that we start off with larger 16 GB micro SD cards rather than the smaller 8 GB.

Despite the issues that the project encountered during the effort. With the development of the NIDS system on the RPZW, the next step would be to install a one of the GUI interfaces Snort. One of the interfaces that can be evaluated is BASE, or Basic Analysis and Security Engine. Further another IDS service is Bro that could be installed as a comparative product. In using the RPZW as a test bed for various configurations could provide a solution to installations on more expensive hardware.

In closing there are still other opensource applications left to investigate their usefulness. However, the project was completed with the initial NIDS installed for monitor a wireless network. During the project, the group worked together to accomplish the goals, and succeeding to build a NIDS for monitoring Wi-Fi networks. Issues were overcome and dealt with as they arose. In closing this was the end of a successful project.

List o references used to build upon.

a list of references....

Here is a listing of references for the IDS project..
    References
  • 1.      Abbasi, A., Zahedi, F. “., Zeng, D., Chen, Y., Chen, H., & Nunamaker, J. F. (n.d.).
  • 2.       Advanced Threat Protection Buyer's Guide. (2016, 5 10). Computer Weekly, pp. p1-18. 18p.
  • 3.       Ashish Malik, A. K. (2015). A Comparative Analysis of Network Topologies in Wired Network. IUP Journal of Telecommunications Vol 7 Issue 4, p7-15.
  • 4.       BarnYard2. (2017, July 21). Retrieved from http://www.forensicswiki.org/wiki/Barnyard2: http://www.forensicswiki.org/wiki/Barnyard2
  • 5.       GFI Software. (2017, 6 18). Security Threats: A guide for small and Medium businesses. Retrieved from www.gfi.com: www.gfi.com/whitepapers/security_threats_SMBs.pdf
  • 6.       Gupta, A., & Zhdanov, D. (2012). GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE. MIS Quarterly, p1109-A7. 29p.
  • 7.       Hassen Sallay, S. B. (2015). Intrusion detection alert management for high-speed networks: current researches and applications. John Wiley & Sons, Ltd.
  • 8.       https://websnort.readthedocs.io/en/latest/. (2017, July 23). Retrieved from https://websnort.readthedocs.io/en/latest/: https://websnort.readthedocs.io/en/latest/
  • 9.       Internal Segmentation Firewall. (2016, 5 10). Computer Weekly, pp. p1-12, 12p.
  • 10.   Jr., G. S., Goyal, S., & Singh, G. (2014). Intrusion Detection Using Network Monitoring Tools. The IUP Journal of Computer Sciences, Vol. IX, No. 4,, pg. 45-58.
  • 11.   Kismet Wireless. (2017, July 21). Retrieved from https://www.kismetwireless.net/: https://www.kismetwireless.net/
  • 12.   Lazarevic, A., Kumar, V., & Srivastava, J. (2005). Intrusion Detection: A Survey. In A. Lazarevic, V. Kumar, & J. Srivastava, Managing Cyber Threats: Issues, Approaches, and Challenges (pp. 19-78). Boston, Ma: Springer US.
  • 13.   McNab, C. (2008). Network Security Assesment, Edited by Tatiana Apandi; 2nd ed. Sebastopol: O'Reilly Media.
  • 14.   Mohammad Sazzadul Hoque, M. A. (2012). An Implementation of Intrusion Detection System Using Genetic Algorithm. International Journal of Network Security & Its Applications, Volume 4, Number 2, pages 109-120.
  • 15.   Obaidat, M. a. (2007). Security of e-Systems and Computer Networks. New York: Cambridge University Press.
  • 16.   Perez, A. (2014). Network Security. London, [England]; Hoboken, New Jersey;: ISTE Limited : John Wiley & Sons.
  • 17.   Pfleeger, C. a. (2007). Security In Computing. 4th Ed. Boston: Pearson Education, Inc.
  • 18.   Raspbery Pi Foundation. (2017, Febuary 1). Introducing the Raspberry Pi Zero W. Retrieved from raspberrypi.org: https://www.raspberrypi.org/magpi/pi-zero-w/
  • 19.   Rouse, M. (2014, 11 1). http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. Retrieved from http://whatis.techtarget.com: http://whatis.techtarget.com
  • 20.   Schifreen, R. (2006). Defeating the Hacker: A Non-Technical Guide to IT Security. West Sussex: John Wiley & Sons.
  • 21.   Securing Your Network and Application Infrastructure. (2016, 5 10). Computer Weekly, pp. p2-62, 63p.
  • 22.   Snort. (2017, July 23). Retrieved from https://www.snort.org/: https://www.snort.org/
  • 23.   Snort FAQ. (2017, July 23). Retrieved from snort.org: https://www.snort.org/faq/what-is-snort
  • 24.   Steinberg, J. (2015). Official (ISC)2 Guide to the CICCP-ISSP CBK. 2nd ed. Boca Raton: Taylor & Francis Group, LLC.
  • 25.   Syed, M. R., & Kar, D. C. (2011). Network Security, Administration, and Management : Advancing Technology and Practice. Hershey Pa: IGI Global.
  • 26.   Timofte, J. (2008). Intrusion Detection using Open Source Tools. Revista Informatica Economică , 75-79.
  • 27.   Vacca, J. R. (2014). Network and System Security. Amsterdam: Syngress.
  • 28.   Wang, C. &. (2007). Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats. Hoboken: Wiley.
  • 29.   WireShark.org. (2017, July 23). Retrieved from WireShark.org: https://www.wireshark.org/