Performance Testing an Inline Network Intrusion Detection System Using Snort

Total Page:16

File Type:pdf, Size:1020Kb

Performance Testing an Inline Network Intrusion Detection System Using Snort PERFORMANCE TESTING AN INLINE NETWORK INTRUSION DETECTION SYSTEM USING SNORT A Thesis Presented to the Faculty of the College of Science and Technology Morehead State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Richard Wagoner November 16, 2007 Accepted by the faculty of the College of Science and Technology, Morehead State University, in partial fulfillment of the requirements for the Master of Science degree. Master's Committee: PERFORMANCE TESTING AN INLINE NETWORK INTRUSION DETECTION SYSTEM USING SNORT Rick Wagoner, M.S. Morehead State University, 2007 Network Security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide. The ever-changing scope of network use and operation along with the public concern for protection of sensitive information makes implementing an efficient and effective security plan a must. Part of such a plan.includes an approach of security in depth. This includes many different pieces of software and hardware working together to provide the desired protection. One component of this approach is that of network intrusion detection systems and for the purposes of this research, the Snort intrusion detection system will be used. However, to ensure that such an implementation is likely to be successful the system must be tested prior to implementation to provide decision makers with assurance to reduce risks. Making a network intrusion detection system work effectively should not degrade overall network performance, so some type of performance measurement plan must be designed and implemented. Such a plan is the topic of this research. The effect of using an inline intrusion detection system, measured by end-to-end delay introduced by the engine, will be discussed as a method of performance testing intrusion detection systems at a basic level to ensure network traffic is unaffected. This will provide some information as to whether the intrusion detection system is capable of efficiently detecting intrusions while maintaining network performance. Accepted by: CHAPTER 1................................................................................................................. 1 INTRODUCTION .................................................................................................... 1 STATEMENT OF THE PROBLEM ................................................................. 1 Question 1 ....................................................................................................... 2 Question 2 ....................................................................................................... 2 Question 3 ....................................................................................................... 2 IMPORTANCE OF THE STUDY ..................................................................... 3 ASSUMPTIONS ................................................................................................. 4 Assumption 1 .................................................................................................. 5 Assumption 2 .................................................................................................. 5 Assumption 3 ........................................................................................... ,...... 5 LIMITATIONS ...................................................................................................... 5 Limitation 1...................................................................................................... 6 Limitation 2 ...................................................................................................... 6 Limitation 3 ...................................................................................................... 6 DEFINITION OF TERMS .................................................................................. 7 CHAPTER 11 .............................................................................................................. 1O REVIEW OF LITERATURE ................................................................................ 10 HISTORY OF NETWORKING ....................................................................... 10 Network Growth .•.............••........................................................................... 10 Network Security Concerns ........................................................................ 11 Security In-Depth. ......................................................................................... 12 NETWORK SECURITY INTRUSION SYSTEMS ....................................... 14 Intrusion Detection Systems....................................................................... 14 Intrusion Prevention Systems .................................................................... 18 SNORT INTRUSION DETECTION SYSTEM .............................................. 19 Snort Capabilities ......................................................................................... 20 Snort Pre-processors ................................................................................... 22 Advantages and Disadvantages of Snort................................................. 25 CURRENT RESEARCH PROJECTS ...........................................................' 26 Network Security .......................................................................................... 26 Intrusion Detection ....................................................................................... 27 Performance Measurement ........................................................................ 28 CHAPTER 111 ............................................................................................................. 30 METHODOLOGY ................................................................................................. 30 POPULATION AND SAMPLE SELECTION ............................................... 30 TESTING ENVIRONMENT............................................................................. 31 DESIGN OF EXPERIMENT ........................................................................... 34 METHOD OF MEASUREMENT .................................................................... 34 APPLICATION TO RESEARCH QUESTIONS ........................................... 37 CHAPTER IV ....................................................................................................... i••.. 38 FINDINGS AND ANALYSIS OF DATA ...........................................................' 38 I DATA COLLECTED ........................................................................................ 38 METHOD OF ANALYSIS ............................................................................... 38 CHAPTER V ............................................................................................................. 48 CONCLUSIONS ................................................................................................... 48 SUMMARY OF FINDINGS ............................................................................. 48 CONCLUSIONS MADE .................................................................................. 49 FUTURE EXTENSIONS TO RESEARCH ................................................... 53 REFERENCES ......................................................................................................... 55 APPENDIX A ............................................................................................................ 57 APPENDIX B ............................................................................................................ 61 APPENDIX C ............................................................................................................ 66 APPENDIX D ............................................................................................................ 86 Acknowledgement I would like to acknowledge and thank those individuals who provided assistance and support in completing this thesis. First, I would like to thank my thesis committee: Dr. Ahmed Zargari who provided general guidance and direction in preparing and completing my thesis, Dr. Gregory Russell wh9 assisted with detailed guidance on my statistical analysis methodologies! and ' Dr. Xiaolong Li who helped me clarify my thesis topic. I would also like to thank my wife, Callie, and son, Zack, who supported me when I had to spend long hours away from home working in the lab. Both were extremely understanding making my work much easier to complete. 1 CHAPTER I INTRODUCTION Network intrusion detection is becoming a key element in the total security approach to network protection. With the use of network intrusion detection systems on the increase and the growth in high volume, high-speed I networks, network administrators need to ensure that network traffic is not I being unduly delayed by overhead introduced from the inline network intrusion detection system. Network administrators do not want to jeopardize network security or add unneeded overhead to the already extremely busy networks by introducing an inline network detection system. STATEMENT OF THE PROBLEM There have been many studies done to test the performance of both network and host intrusion detection systems. However, in most of these instances the performance was based on the ability to detect intrusions and not on the ability of the system to ensure that continued network traffic performance levels are maintained when placed inline. lnline network intrusion detection systems obviously
Recommended publications
  • Informatikai Alapok
    INFORMATIKAI ALAPOK GÁBOR DÉNES FŐISKOLA 2019 Szerzők: Berecz Antónia (4. fejezet), Karácsony Péter (7. fejezet), Kónya László (6. fejezet), Peck Tibor (5. fejezet), Szász Gábor (1. fejezet, Melléklet) Vári-Kakas István (2-3. fejezet) Lektor: Cserny László Szerkesztő: Hülber László Műszaki szerkesztők: Littvay László, Lozsádi Csilla Grafikai munkák: Pálvölgyi Gábor Tartalomjegyzék Tartalomjegyzék ....................................................................................................................... 3 Bevezetés ................................................................................................................................... 9 1. Bevezetés az informatikába és a számítástechnikába .................................................... 10 1.1. Bevezető gondolatok .................................................................................................... 10 1.2. Az informatika rövid története ..................................................................................... 12 1.2.1. Az adattárolás korai eszközei ................................................................................ 12 1.2.2. A számolást segítő eszközök fejlődése ................................................................. 13 1.2.3. A programvezérlés kezdetei .................................................................................. 18 1.3. Neumann elvek ............................................................................................................. 25 1.3.1. Neumann elvek tömören ......................................................................................
    [Show full text]
  • Announcement Summary
    Announcement Summary IBM United States September 18, 2001 Announcements by FAX or Internet FAX The Table of Contents in this package contains the title and letter number for each announcement. Through the FAX Information Service, you can access these or previous Announcement Letters. See the Table of Contents for the FAX Information Service Index. The FAX Information Service is toll-free, easy to use, and available 24 hours a day, 7 days a week. All you have to do is: Step 1: From your touch-tone phone, dial 1-800-IBM-4FAX (1-800-426-4329). Note: Near the end of your call, you will be prompted for the phone number of your fax machine. Step 2: Select Option 2. Step 3: Enter the selected Announcement Letter Number. The Announcement Letter Number is the number that follows the title in the Table of Contents. In the following example, it is 101-253. Options by IBM: PRO/1000T Desktop and PRO/1000T Low Profile Desktop Adapters by Intel 101-253 To select the fax for the detailed Announcement Letter, enter 101253 followed by the pound (#) key. Step 4: You may enter additional Announcement Letter Numbers or request other product information. Up to five documents may be requested per call. Continue following the prompts to receive your requests. Note: To call the FAX Information Service from outside the United States, you must dial 1-408-256-5422 from a fax machine phone. Internet You can access IBM U.S. Announcement Summaries and IBM U.S. Announcement Detail Letters electronically through the Internet at http:/www.ibm.com/news .
    [Show full text]
  • Patterns: SOA Foundation Service Creation Scenario
    Front cover Patterns: SOA Foundation Service Creation Scenario Key concepts and architecture of the IBM SOA Foundation Process for identifying SOA scenarios, patterns and services Service Creation scenario working examples John Ganci Amit Acharya Jonathan Adams Paula Diaz de Eusebio Gurdeep Rahi Diane Strachan Kanako Utsumi Noritoshi Washio ibm.com/redbooks International Technical Support Organization Patterns: SOA Foundation Service Creation Scenario September 2006 SG24-7240-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (September 2006) This edition applies to IBM Rational Application Developer V6.0.1 on Microsoft Windows XP, and IBM WebSphere Application Server Network Deployment V6.0.2 and IBM Tivoli Composite Application Manager for SOA V6.0 on Microsoft Windows 2003 Server. © Copyright International Business Machines Corporation 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiii Become a published author . xvii Comments welcome. xvii Part 1. Getting started with IBM SOA Foundation . 1 Chapter 1. Introduction to service- oriented architecture . 3 1.1 Service-oriented architecture overview . 4 1.1.1 Definition of a service-oriented architecture . 4 1.1.2 Challenges and drivers for SOA . 6 1.1.3 Why SOA now?. 10 1.1.4 SOA approach for building a solution . 13 1.2 Getting started with SOA. 14 1.2.1 SOA adoption . 14 1.2.2 IBM SOA entry points .
    [Show full text]
  • 1406HE03.Lwp
    IBM HIGHLIGHTS, 1996 - 2002 Year Page(s) 1996 2 - 7 1997 7 - 13 1998 13- 21 1999 21 - 26 2000 26 - 34 2001 34 - 43 2002 43 - 55 February 2003 1406HE03 2 1996 Business Performance IBM revenue reaches $75.94 billion, an increase of six percent over 1995, and earnings grow by nearly 30 percent to $5.42 billion. There are 240,615 employees and 622,594 stockholders at year end. Speaking in Atlanta to a group of shareholders, analysts and reporters at the corporation’s annual meeting, IBM chairman Louis V. Gerstner, Jr., discusses IBM’s condition, prospects for growth and the importance of network computing to the company’s future. IBM reaches agreement with the United States Department of Justice to terminate within five years all remaining provisions of the Consent Decree first entered into by IBM and the U.S. government in 1956. Organization IBM forms the Network Computer Division in November. The company says it will operate its worldwide services business under a single brand: IBM Global Services. IBM puts its industry-specific business units on a single global general manager. IBM and Tivoli Systems Inc. enter a merger agreement. Tivoli is a leading provider of systems management software and services for distributed client/server networks of personal computers and workstations. IBM’s acquisition of Tivoli extends the company’s strength in host-based systems management to multiplatform distributed systems. IBM and Edmark Corporation, a developer and publisher of consumer and education software, complete a merger in December. IBM acquires The Wilkerson Group, one of the world’s oldest and largest consulting firms dedicated to the pharmaceutical and medical products industry.
    [Show full text]
  • IBM Netvista Thin Clients
    The IBM NetVista Thin Client Family From a technical point of view IBM PSG, Nordic Thin Clients IBM NetVista Thin Client Family - From a technical point of view This presentation will give you an introduction to the IBM Thin Client Family. The presentation has a strong technical bias, but will try to explain the details so everyone can understand. 1 Topics Ø Why thin clients? Ø NT/Terminal Server, Windows 2000, Citrix Metaframe Ø IBM's thin client family overview Ø IBM NetVista N2200w - the Windows-based Terminal Ø IBM NetVista N2200 & N2800 with Thin Client Manager Ø Other IBM thin client offerings (TCM Express, Linux) Ø Positioning the IBM thin client offerings IBM NetVista Thin Client Family - From a technical point of view 2 The evolution... Personal Computing Client Server Network Computing Network Computer “thin client” Web Server Database Applications Server Server Pervasive Computing Smart Digital Networked Personal digital Thin client Screen mobile set-top box vehicle assistant (NC) phone Connectivity* to Web Server Database Applications Server Server Sources: IBM; The Economist *To convert web applications for each device IBM NetVista Thin Client Family - From a technical point of view This picture is taken from an article (written by IBM) in The Economist, September 1998. It shows where we stand today and where we are heading in the very near future. Today, in the Personal Computing paradigm, most companies use a client-server computing model with fat PC clients and a wide range of servers (NT, Unix, mainframes etc.). In most of these companies, the PC clients are doing most of the work - and therefore has a huge amount of code installed locally - while the servers are merely database servers.
    [Show full text]
  • Die Geschichte Der Digitalen Evolution Bezugsquelle
    Die Geschichte der digitalen Evolution Bezugsquelle: www.computerposter.ch 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 und ... Phasen Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters Cognitive Computing und Internet der Dinge (IoT) Zukunftsvisionen Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: A. Bowyer Cloud Wichtig Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um iMac und inter- duktion des Open Source Unterstüt- mögliche zukünftige Anwendungen, welche sich mit neuem essant: XO-1-Laptops: 3D-Drucker zung und mit neuen Technologien und Konzepten realisie- Veriton RepRap nicht Ersatz ren lassen. Diese basieren auf Resultaten aus Logo Millennium Bug (Datumfehler): Ver- Haupteinsatz: Apple Watch: Jetzt kaufbar (April). FP2 (Acer), (Replicating von Spezia- Forschung und Entwicklung, welche man in den zurück. Uruguay, Peru, Sensoren: Herzfrequenz, Lage, IBM lanciert die Aptiva-Linie für PC im hinderung des IT-Horrorszenario Rapid-Pro- AI (Artificial Intelligence) wird immer listen. weltweiten Labors erarbeitet. iMac wird verschlingt 800 bis 1’000 Mia $. Mexico, Ruan- Beschleunigung. Wi-Fi, Bluetooth - Systeme den Heimmarkt. Compaq beherrscht als Markt- Bildschirm totyper) als wichtiger: Computer-Magazine 1. kommerzieller Einsatz von Watson Cognitive Computing als Ergänzung IBM ThinkPad TransNote: 27.1.2010: Steve Jobs präsentiert Das IBM-Programm Watson 4.0, NFC, S1-CPU, 10’000 Apps. leader das PC-Business.
    [Show full text]
  • Return of Organization Exempt from Income
    l efile GRAPHIC p rint - DO NOT PROCESS As Filed Data - DLN: 93490289002268 Return of Organization Exempt From Income Tax OMB No 1545-0047 Form 990 Under section 501 (c), 527, or 4947( a)(1) of the Internal Revenue Code ( except black lung benefit trust or private foundation) 2 00 7_ Department of the Open -The organization may have to use a copy of this return to satisfy state reporting requirements Treasury Inspection Internal Revenue Service A For the 2007 calendar year, or tax year beginning 01 -01-2007 and ending 12 -31-2007 C Name of organization D Employer identification number B Check if applicable Please EL RIO SANTA CRUZ NEIGHBORHOOD HEALTH 1 Address change use IRS 86-0285857 label or Number and street (or P 0 box if mail is not delivered to street address ) Room/ suite E Telephone number F Name change print or 839 type . See WEST CONGRESS STREET (520 ) 670-3705 1 Initial return Specific Instruc - City or town, state or country, and ZIP + 4 FAccounting method fl Cash F Accrual F_ Final return tions . TUCSON, AZ 85745 (- Other ( specify) 0- (- Amended return (Application pending * Section 501(c)(3) organizations and 4947(a)(1) nonexempt charitable H and I are not applicable to section 527 organizations trusts must attach a completed Schedule A (Form 990 or 990-EZ). H(a) Is this a group return for affiliates? F_ Yes F No H(b) If "Yes" enter number of affiliates 0- G Web site: 1- ELRIO ORG H(c) Are all affiliates included? F Yes F No (If "No," attach a list See instructions ) I Organization type (check only one) 1- F9!!+ 501(c)
    [Show full text]
  • Earthquake Researcher Returns
    September 13, 2007 Vol. 43 No. 22 The University of Western Ontario’s newspaper of record www.westernnews.ca PM 41195534 MUSTANGS TO WATCH FOOD FIGHT INTERNATIONAL RESEARCH Our new feature brings a weekly snapshot of a top Battling the Frosh 15 Geographer Belinda Dodson had to Mustang athlete. Meet food bulge takes a bit of do just one thing to become an inter- football’s Michael Faulds. planning and willpower. national researcher – move to Canada from South Africa. Page 18 Page 7 Page 11 Music grad CANADA RESEARCH CHAIRS makes career Earthquake researcher returns leap to UN B Y PAUL MAYNE (CRC) to explore ways to miti- quake Hazards and Ground earthquake will occur, but we gate damage from earthquakes Motions, Atkinson will receive can predict the expected ground disarmament If a major earthquake hit the by better predicting how they $200,000 annually over the next motions, so that buildings can be London region, how would the will strike. seven years to support her designed to withstand the shak- B Y VANESSA MARTIN major older buildings cope? Atkinson is one of four new research into the ground motion ing,” says Atkinson, who comes R ANDIN While the likelihood of a sig- CRCs announced today at West- of quakes so that patterns can be to Western from Carleton Uni- nificant local earthquake are not ern, where two additional chairs discerned and predictions can be versity in Ottawa. Seven years after graduating great, it is not impossible - and were also renewed. One of the made about future motions. Atkinson’s work is used to from the University
    [Show full text]
  • Service Guide for Consoles Level 01B
    IBM IBM Z Service Guide for Hardware Management Consoles and Support Elements GC28-6983-01 Level 01b Level 01b IBM IBM Z Service Guide for Hardware Management Consoles and Support Elements GC28-6983-01 Level 01b Note: Before using this information and the product it supports, read the information in “Safety” on page v, “Notices,” on page 183, and IBM Systems Environmental Notices and User Guide, Z125–5823. This edition, GC28-6983-01b, applies to IBM Z and IBM LinuxONE servers. This edition replaces GC28-6983-01a. There might be a newer version of this document in a PDF file available on Resource Link. Go to http://www.ibm.com/servers/resourcelink and click on Library on the navigation bar. © Copyright IBM Corporation 2017, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Level 01b Contents Safety ............... v System unit testing for 8305, 8187, 8141, 8485, Safety notices .............. v 4362 Hardware Management Consoles .... 27 World trade safety information ....... v System unit testing for 4367 Hardware Danger notices ............ v Management Consoles.......... 27 Laser safety information .......... vii System unit testing for 7327 Hardware Laser compliance ........... vii Management Consoles.......... 29 System unit testing for 7382 Hardware About this publication ........ ix Management Consoles.......... 30 System unit testing for 7914 Hardware Intended audience ............ ix Management Consoles.......... 31 Revisions ............... ix System unit testing for 2461 Hardware General comments ............ ix Management Consoles.......... 33 Where to start.............. ix Ethernet tests for PCI bus adapter ....... 33 Accessibility .............. ix CMOS configuration procedures for Hardware Accessibility features .......... ix Management Consoles........... 37 Keyboard navigation .........
    [Show full text]
  • Netvista W50 Wireless Internet Appliance (Type 8368) Getting Started
    NetVista W50 Wireless Internet Appliance (Type 8368) Getting Started W5UG0000 NetVista W50 Wireless Internet Appliance (Type 8368) Getting Started W5UG0000 First Edition (November 2001) © Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents ImportantSafetyInstructions......v Apasswordproblem........15 A power switch problem .......15 Chapter 1. Welcome .........1 Wireless connection problems .....15 Standby problems .........16 Chapter 2. Checklist for unpacking ....3 Tabletscreenproblems.......16 Battery problems .........17 Chapter 3. Set up ..........5 Otherproblems..........17 Starting the BIOS Setup Utility ......17 Chapter 4. Tablet features .......7 Frontview.............7 Chapter 8. Getting information, help, and Leftview.............8 service.............19 Rightview.............9 Getting information .........19 Backview.............10 UsingtheWorldWideWeb......19 Getting information by fax ......19 Chapter 5. Cradle features.......11 Getting help and service ........20 Frontview............11 Using the documentation and diagnostic Rearview.............11 programs............20 Calling for service .........20 Chapter 6. Operating the tablet .....13 Appendix A. Specifications ......23 Starting the tablet ..........13 Shutting down the tablet ........13 Features.............23 Usingthebuttons..........14 Specifications ...........24 Understanding the indication lights
    [Show full text]
  • User Guide Netvista X40 Type 6643
    IBM User Guide NetVista X40 Type 6643 IBM User Guide NetVista X40 Type 6643 Note Before using this information and the product it supports, be sure to read “Safety information” on page ix and “Product warranty and notices” on page 87. First Edition (March 2000) © COPYRIGHT INTERNATIONAL BUSINESS MACHINES CORPORATION, 2000. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. IBM Contents Safety information . ix Lithium battery notice . x Modem safety information . xi Laser compliance statement. xi About this book . xiii Conventions used in this book . xiii Related information . xiv Chapter 1.Product overview . 1 Identifying your computer. 1 Hardware features. 2 Microprocessor . 2 Memory . 2 Internal drives . 2 Graphics subsystem. 2 Audio subsystem . 2 Communications . 2 System management features. 3 Keyboard and mouse features . 3 Expansion capability . 3 Power . 3 Security features. 3 Supported operating systems . 3 Software . 4 IBM preinstalled software. 4 Additional software. 4 Access IBM . 4 Chapter 2.Setting up your computer . 5 Selecting a location for your computer . 5 Arranging your workspace . 6 Comfort . 6 Glare and lighting . 6 Air circulation. 7 Electrical outlets and cable lengths . 8 Connecting cables . 8 USB connectors. 9 Audio connectors . 9 Other connectors . 10 Recording identification numbers . 10 Starting the computer . 11 Chapter 3.Operating and caring for your computer . 13 Controls and status indicators. 13 Starting your computer . 14 Shutting down the computer. 15 © Copyright IBM Corp. 2000 v Using the Rapid Access III keyboard .
    [Show full text]
  • Announcement Summary
    Announcement Summary IBM United States October 29, 1996 Announcements by FAX or Internet FAX The Table of Contents in this package contains the title and letter number for each announcement. Through the FAX Information Service, you can access these or previous Announcement Letters. See the Table of Contents for the FAX Information Service Index. The FAX Information Service is toll-free, easy to use, and available 24 hours a day, 7 days a week. All you have to do is: Step 1: From your touch-tone phone, dial 1-800-IBM-4FAX (1-800-426-4329). Note: Near the end of your call, you will be prompted for the phone number of your fax machine. Step 2: Select Option 2. Step 3: Enter the selected Announcement Letter Number. The Announcement Letter Number is the number that follows the title in the Table of Contents. In the following example, it is 196-282. IBM ARTIC Product Family Extends Warranty to Three Years 196-282 To select the fax for the detailed Announcement Letter, enter 196282 followed by the pound (#) key. Step 4: You may enter additional Announcement Letter Numbers or request other product information. Up to five documents may be requested per call. Continue following the prompts to receive your requests. Note: To call the FAX Information Service from outside the United States, you must dial 1-415-855-4329 from a fax machine phone. Internet You can now access IBM U.S. Announcement Summaries and IBM U.S. Announcement Detail Letters electronically through the Internet on the IBMLink gopher server in both ASCII and PostScript** format.
    [Show full text]