Automatic Defense Against Zero-Day Polymorphic

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Defense Against Zero-Day Polymorphic Information Technology / Security & Auditing Mohammed Pathan Able to propagate quickly and change their payload with each infection, Automatic Defense Against polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds Automatic Defense Against Zero-day Polymorphic in Worms Communication Networks to launch flooding attacks on your servers, using traditional methods such as Zero-day Polymorphic Worms manually creating and storing signatures to defend against these threats is just too slow. in Communication Networks Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Mohssen Mohammed • Al-Sakib Khan Pathan details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks and identifies open-source tools you can use to create your own honeypot. There’s also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double- honeynet architectures. K15460 ISBN: 978-1-4665-5727-7 90000 www.crcpress.com 9 781466 557277 www.auerbach-publications.com K15460 cvr mech.indd 1 4/23/13 10:09 AM Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection through Security Awareness Guide to the De-Identification of Personal Tyler Justin Speed Health Information ISBN 978-1-4398-0982-2 Khaled El Emam Automatic Defense Against Zero-day ISBN 978-1-4665-7906-4 Polymorphic Worms in Communication Information Security Governance Simplified: Networks From the Boardroom to the Keyboard Mohssen Mohammed and Al-Sakib Khan Pathan Todd Fitzgerald ISBN 978-1-4665-5727-7 ISBN 978-1-4398-1163-4 The Complete Book of Data Anonymization: Information Security Policy Development for From Planning to Implementation Compliance: ISO/IEC 27001, NIST SP 800-53, Balaji Raghunathan HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ISBN 978-1-4398-7730-2 Barry L. Williams The Complete Guide to Physical Security ISBN 978-1-4665-8058-9 Paul R. Baker and Daniel J. Benny Information Technology Control and Audit, ISBN 978-1-4200-9963-8 Fourth Edition Conflict and Cooperation in Cyberspace: Sandra Senft, Frederick Gallegos, and Aleksandra Davis The Challenge to National Security ISBN 978-1-4398-9320-3 Panayotis A Yannakogeorgos and Adam B Lowther Iris Biometric Model for Secured Network Access (Editors) Franjieh El Khoury ISBN 978-1-4665-9201-8 ISBN 978-1-4665-0213-0 Cybersecurity: Public Sector Threats Managing the Insider Threat: No Dark Corners and Responses Nick Catrantzos Kim J. Andreasson ISBN 978-1-4398-7292-5 ISBN 978-1-4398-4663-6 Network Attacks and Defenses: A Hands-on The Definitive Guide to Complying with the Approach HIPAA/HITECH Privacy and Security Rules Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, John J. Trinckes, Jr. and Sujith Samuel Mathew ISBN 978-1-4665-0767-8 ISBN 978-1-4665-1794-3 Digital Forensics Explained Noiseless Steganography: The Key to Covert Greg Gogolin Communications ISBN 978-1-4398-7495-0 Abdelrahman Desoky ISBN 978-1-4398-4621-6 Digital Forensics for Handheld Devices Eamon P. Doherty PRAGMATIC Security Metrics: Applying ISBN 978-1-4398-9877-2 Metametrics to Information Security W. Krag Brotby and Gary Hinson Effective Surveillance for Homeland Security: ISBN 978-1-4398-8152-1 Balancing Technology and Social Issues Francesco Flammini, Roberto Setola, and Giorgio Securing Cloud and Mobility: A Practitioner’s Guide Franceschetti (Editors) Ian Lim, E. Coleen Coolidge, and Paul Hourani ISBN 978-1-4398-8324-2 ISBN 978-1-4398-5055-8 Electronically Stored Information: Security and Privacy in Smart Grids The Complete Guide to Management, Yang Xiao (Editor) Understanding, Acquisition, Storage, ISBN 978-1-4398-7783-8 Search, and Retrieval Security for Wireless Sensor Networks using David R. Matthews Identity-Based Cryptography ISBN 978-1-4398-7726-5 Harsh Kupwade Patil and Stephen A. Szygenda Enterprise Architecture and Information ISBN 978-1-4398-6901-7 Assurance: Developing a Secure Foundation The 7 Qualities of Highly Secure Software James A. Scholz Mano Paul ISBN 978-1-4398-4159-4 ISBN 978-1-4398-1446-8 AUERBACH PUBLICATIONS www.auerbach-publications.com • To Order Call: 1-800-272-7737 • E-mail: [email protected] Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Mohssen Mohammed • Al-Sakib Khan Pathan CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130304 International Standard Book Number-13: 978-1-4665-5728-4 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Dedication To my father, Mohammed Zain Elabdeen Mohammed; my sister, Maali Mohammed Zain Elaabdeen; faculty of Mathematical Science, University of Khartoum, Khartoum, Sudan, I especially would like to thank Dr. Mohsin Hashim and Dr. Eihab Bashier, and Dr. Lorenzo Cavallaro, Information Security Group, Royal Holloway, University of London. Mohssen Mohammed To my father, Abdus Salam Khan Pathan; my mother, Delowara Khanom; and my loving wife, Labiba Mahmud. Al-Sakib Khan Pathan © 2010 Taylor & Francis Group, LLC Contents P REFACE xiii A BOUT THE AUTHORS xvii C HA P TER 1 THE FU N DA M E N TA L C ONCE P TS 1 1.1 Introduction 1 1.1.1 Network Security Concepts 1 1.1.2 Automated Signature Generation for Zero-day Polymorphic Worms 20 1.2 Our Experience and This Book’s Objective 22 References 23 C HA P TER 2 C OM P UTER N ETWORKING 25 2.1 Computer Technologies 25 2.2 Network Topology 26 2.2.1 Point-to-Point Topology 26 2.2.2 Daisy-Chain Topology 27 2.2.3 Bus (Point-to-Multipoint) Topology 27 2.2.4 Distributed Bus Topology 27 2.2.5 Ring Topology 29 2.2.6 Dual-Ring Topology 29 2.2.7 Star Topology 29 2.2.8 Star-Wired Bus Topology 30 2.2.9 Star-Wired Ring Topology 31 2.2.10 Mesh Topology 32 2.2.11 Hierarchical or Tree Topology 32 2.2.12 Dual-Homing Topology 32 © 2010 Taylor & Francis Group, LLC VII VIII CONTENTS 2.3 Internet Protocol 34 2.4 Transmission Control Protocol 34 2.5 IP Routers 35 2.6 Ethernet Switch 35 2.7 IP Routing and Routing Table 36 2.8 Discussion on Router 37 2.8.1 Access Mechanisms for Administrators 37 2.8.2 Security Policy for a Router 38 2.8.3 Router Security Policy Checklist 40 2.9 Network Traffic Filtering 42 2.9.1 Packet Filtering 42 2.9.2 Source Routing 43 2.10 Tools Used for Traffic Filtering or Network Monitoring 43 2.10.1 Packet Capture 44 2.11 Concluding Remarks 44 References 45 C HA P TER 3 I NTRUSION D ETECTION AND P REVENTION SYSTEMS (IDPS S) 47 3.1 Introduction 47 3.2 IDPS Detection Methods 54 3.2.1 Signature-Based Detection 54 3.2.2 Anomaly-Based Detection
Recommended publications
  • Security Industry Monitor March 2014
    Security Industry Monitor March 2014 For additional information on our Security Team, please contact: John E. Mack III Co-head, Investment Banking Group Head of Mergers and Acquisitions (310) 246-3705 [email protected] Michael McManus Managing Director, Investment Banking Group (310) 246-3702 [email protected] PLEASE SEE IMPORTANT DISCLOSURES ON LAST PAGE About Imperial Capital, LLC Imperial Capital is a full-service investment bank offering a uniquely integrated platform of comprehensive services to institutional investors and middle market companies. We offer sophisticated sales and trading services to institutional investors and a wide range of investment banking advisory, capital markets and restructuring services to middle market corporate clients. We also provide proprietary research across an issuer’s capital structure, including bank debt, debt securities, hybrid securities, preferred and common equity and special situations claims. Our comprehensive and integrated service platform, expertise across the full capital structure, and deep industry sector knowledge enable us to provide clients with superior advisory services, capital markets insight, investment ideas and trade execution. We are quick to identify opportunities under any market conditions and we have a proven track record of offering creative, proprietary solutions to our clients. Imperial Capital’s expertise includes the following sectors: Aerospace, Defense & Government Services, Airlines & Transportation, Business Services, Consumer, Energy (Clean Energy and Traditional Energy), Financial Services, Gaming & Leisure, General Industrials, Healthcare, Homebuilding & Real Estate, Media & Telecommunications, Security & Homeland Security and Technology. Imperial Capital has three principal businesses: Investment Banking, Institutional Sales & Trading and Institutional Research. For additional information, please visit our Web site at www.imperialcapital.com.
    [Show full text]
  • L'etat Passe À La Vitesse Supérieure
    AAGGAAZZ MM IINN E EE E RR 11 0 T 0 T 0 0 O O % % V V - - G G T T R I R I A U T A U T 23 - Août 2008 ISSN 1112-8178 Actualités P.05 « Aucune puce anonyme au-delà du 10 Octobre ! » Algérie Télécom s’allie à Stonesoft Corporation BIVISION SYSTEMS La 1ère encyclopédie algérienne en ligne Réunion de l’Icann Mobilité P.10 Nokia destination design HP Nouvelle gamme de PC portables SONY : Are you VAIO ? LG lance le Chocolate 3 et le KS360 SAMSUNG DOSSIER : Page 22 Le i900 Omnia et le i710 DU NOUVEAU DANS LE HAUT ET LE TRES HAUT DEBIT Conso P.24 L’Etat passe à la vitesse supérieure Bien choisir son appareil photo numérique Trucs et astuces P.31 Faire de la place dans son disque dur (XP et Vista) Internet pratique P.32 Page 18 Faites le plein de plug-ins Jeux vidéo : Que retenir des conférences à votre navigateur des constructeurs lors de l’E3 2008 ? Page 26 OU TROUVER N’TIC ? Points de distribution Edito Cyber Orange : 01, rue Hassiba Ben Bouali, Alger centre Les Technologies de l’Information et de la Communication en Algerian Learning Center (ALC) : 2 & 8, Rue de Savoie, Hydra général et l’ADSL en particulier, constituent une aubaine pour Librairie Maison de la presse : 1 Place Kennedy, El Biar les pays émergeants, elles sont un moyen de lutte contre les Librairie BOUHADJAR : (face lycée Hamia), Kouba principaux facteurs de pauvreté que sont : l’ignorance et l’iso- Librairie El Kartassia : 1 Boulevard Amirouche, Alger centre Librairie Liberté : 17 Cité des Asphodèles, Ben Aknoun lement.
    [Show full text]
  • VOLUME 2 BOOK 4B
    Registration No: 1998/009584/06 SOUTH AFRICAN NATIONAL ROADS AGENCY LIMITED PROCUREMENT OF A NATIONAL INTELLIGENT TRANSPORT SYSTEM AND INTEGRATED SUPPORTING SYSTEMS SOFTWARE AND THE DEPLOYMENT THEREOF IN GAUTENG, KWAZULU-NATAL AND THE WESTERN CAPE STANDARD SPECIFICATION FOR ELECTRONIC WORKS JUNE 2010 VOLUME 2 BOOK 4b THE REGIONAL MANAGER NORTHERN REGION SOUTH AFRICAN NATIONAL ROADS AGENCY LIMITED 38 IDA STREET MENLO PARK PRETORIA SOUTH AFRICA 0081 - ii - VOLUME 2 BOOK 4b: STANDARD SPECIFICATION FOR ELECTRONIC WORKS - iii - TABLE OF CONTENT PART 3 ELECTRONIC EQUIPMENT AND DESIGN .................................................................................................... 7 SECTION 1 INFORMATION AND COMMUNICATION TECHNOLOGY SPECIFICATIONS .............................................. 8 1.1 SCOPE .................................................................................................................................................................. 9 1.2 STANDARDS ........................................................................................................................................................ 9 1.3 NETWORK CABLING .......................................................................................................................................... 11 1.4 NETWORK AND COMMUNICATION EQUIPMENT .............................................................................................. 18 1.5 SERVER AND STORAGE HARDWARE .................................................................................................................
    [Show full text]
  • List of Versions Added in ARL #2622
    List of Versions added in ARL #2622 Publisher Product Version .NET Foundation Windows Installer XML 3.6 .NET Foundation Windows Installer XML 3.8 .NET Foundation WiX Toolset 3.8 .NET Foundation Windows Installer XML 3.7 /n software IP*Works! SSH 9.0 [den4b] Denis Kozlov ReNamer 6.2 [den4b] Denis Kozlov ReNamer 6.7 [den4b] Denis Kozlov ReNamer 6.9 [den4b] Denis Kozlov ReNamer 7.1 10x Genomics Loupe Browser 5.0 2BrightSparks SyncBackSE 9.1 2BrightSparks SyncBackFree 8.6 2BrightSparks SyncBackFree 9.0 2BrightSparks SyncBackFree 9.1 2BrightSparks SyncBackFree 9.2 2BrightSparks EncryptOnClick 2.1 2BrightSparks SyncBackPro 6.1 360 360 Total Security 10.6 3CX 3CXPhone 12.0 3CX 3CXPhone 15.0 3D Systems 3D Sprint 2.13 3D Systems 3D Sprint 2.5 3D Systems 3D Sprint 3.0 3D Systems Geomagic Control X 2020.0 3DP Chip 16.11 3M Detection Management Software 2.3 3T Software Labs Robo 3T 10.1 3T Software Labs Studio 3T 2021.3 3uTools 3uTools 2.31 3uTools 3uTools 2.32 3uTools 3uTools 2.33 3uTools 3uTools 2.36 3uTools 3uTools 2.37 3uTools 3uTools 2.38 3uTools 3uTools 2.39 3uTools 3uTools 2.50 3uTools 3uTools 2.51 3uTools 3uTools 2.53 3uTools 3uTools 2.56 4Team Sync2 2.83 4Team OST PST Viewer 1.12 4Team OST PST Viewer 1.22 8x8 Work for Desktop 7.3 8x8 Work for Desktop 7.4 8x8 Work for Desktop 7.5 8x8 Work for Desktop 7.6 8x8 Work for Desktop 7.7 A.N.D. Technologies Pcounter 2.85 A9Tech A9CAD 1.0 AbacusNext HotDocs Server Management Tools 10.2 AbacusNext HotDocs Server 10.2 ABB RobotStudio 2020.2 ABB RobotStudio 2020.4 ABB Drive composer pro 2.0 ABB Drive
    [Show full text]
  • Computer Security Handbook Computer Security Handbook
    COMPUTER SECURITY HANDBOOK COMPUTER SECURITY HANDBOOK Fifth Edition Volume 1 Edited by SEYMOUR BOSWORTH M.E. KABAY ERIC WHYNE John Wiley & Sons, Inc. Copyright C 2009 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher, editors, and the authors have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate.
    [Show full text]
  • UNITED NATIONS SYSTEM Annual Statistical Report 2006
    Annual Statistical Report 2006 • Procurement of Goods & Services • All Sources of Funding • Procurement from DAC Member Countries • International & National Project Personnel • United Nations Volunteers • Fellowships Published: July 2007 by UNITED NATIONS SYSTEM Annual Statistical Report 2006 Procurement of Goods and Services • All Sources of Funding Procurement from DAC Member Countries International & National Project Personnel United Nations Volunteers Fellowships July 2007 Copyright © 2007 by the United Nations Development Programme 1 UN Plaza, New York, NY 10017, USA All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, photocopying, recording or otherwise, without prior permission of UNDP/IAPSO. TABLE OF CONTENTS INTRODUCTION .................................................................................................................... 1 GLOASSARY OF TERMS ...................................................................................................... 2 EXECUTIVE SUMMARY: ALL SOURCES OF FUNDING (UN SYSTEM)............................ 3 PROCUREMENT OF GOODS AND SERVICES - ALL SOURCES OF FUNDING Procurement of goods by country of procurement and services by country of head office ................................................................................................... 8 Procurement by UN agency ....................................................................................... 11 Procurement of goods by country
    [Show full text]
  • THE FOG of CYBER DEFENCE Eds
    1 THE FOG OF CYBER DEFENCE Eds. Jari Rantapelkonen & Mirva Salminen National Defence University Department of Leadership and Military Pedagogy Publication Series 2 Article Collection n:o 10 Helsinki 2013 2 © National Defence University/Department of Leadership and Military Pedagogy ISBN 978–951–25–2430–3 ISBN 978–951–25–2431–0 (PDF) ISSN 1798–0402 Cover: Toni Tilsala/National Defence University Layout: Heidi Paananen/National Defence University Juvenes Print Oy Tampere 2013 3 CONTENTS Foreword ........................................................................................ 5 Summary ........................................................................................ 6 Jari Rantapelkonen & Mirva Salminen Introduction: Looking for an Understanding of Cyber ............. 14 Part I: Cyberspace Jari Rantapelkonen & Harry Kantola Insights into Cyberspace, Cyber Security, and Cyberwar in the Nordic Countries ...................................... 24 Topi Tuukkanen Sovereignty in the Cyber Domain ...................................... 37 Jari Rantapelkonen & Saara Jantunen Cyberspace, the Role of State, and Goal of Digital Finland .................................................................................. 46 Margarita Jaitner Exercising Power in Social Media ....................................... 57 Kari Alenius Victory in Exceptional War: The Estonian Main Narrative of the Cyber Attacks in 2007 ............................. 78 PART II: Cyber Security Anssi Kärkkäinen The Origins and the Future of Cyber Security in the Finnish
    [Show full text]
  • CESG Directory of INFOSEC Assured Products
    Important Information – Please Read THE DIRECTORY OF INFOSEC ASSURED PRODUCTS Users of this Directory must be aware that the most up-to-date version of Infosec Assured Products are available at www.cesg.gov.uk For current information on IA products and their usage please see the individual product entries using the product search facilities at www.cesg.gov.uk THIS DOCUMENT WAS CORRECT AT TIME OF PRODUCTION OCTOBER 2010 SECTION 1 SECTION 10 Introduction Operating Systems SECTION 2 SECTION 11 Access Control Protection Profiles SECTION 3 SECTION 12 Airwave Miscellaneous SECTION 4 SECTION 13 Communications TEMPEST SECTION 5 SECTION 14 Database Mobile Solutions SECTION 6 SECTION 15 Data Encryption IACS Scheme SECTION 16 SECTION 7 External Common Data-Erasure Criteria Scheme SECTION 17 SECTION 8 Index Firewalls Related Abbreviations SECTION 9 Networking Directory of Infosec Assured Products 2010 Page 1.2 For End Users… Products which have been certified by us, or by our partners This ‘Directory of Infosec Assured Products’ is a top-level around the world, offer end users ready-made assurance. guide listing all IT security products approved by CESG. The This allows the customer to determine whether the product Directory lists products by type, and in addition gives brief is appropriate for his needs. If assurance is required in a details of the means by which products are approved or system, then a range of packages, including IT Security certified, an overview of the products’ features, and the Health Check, is available. context in which they should be used. There is also a contact list of product vendors.
    [Show full text]
  • Application Name Major Version Minor Version Company Name .NET Memory Profiler 3 5 Scitech Software AB .NET Reporting Engine 8 Windward Studios Inc
    Application Name Major Version Minor Version Company Name .NET Memory Profiler 3 5 SciTech Software AB .NET Reporting Engine 8 Windward Studios Inc. .print Application Server Engine 7 6 ThinPrint .print Engine for Remote Web Workplace ThinPrint .print RDP Engine 7 6 ThinPrint .print Server Engine 7 6 ThinPrint :milliarium 5 0 GABO mbH & Co. KG 100,000 ClipArt 3 12 Avanquest 100,000 Mahjongg Games 1 0 Viva Media 1001 Japanese Crosswords 1 0 Viva Media 1001 Minigolf Challenge 1 0 Viva Media 1001 Tangram Puzzles 1 0 Viva Media 1001 Ultimate Word Games Ultimate Valusoft 120,000 ClipArt 1 Avanquest 123BCP 1 123BCP 1-2-3File All to PDF 4 1 1-2-3FileConvert 123PDF Converter 4 1 123 pdf converter 12Pay Payroll 1 4 12Pay Ltd 1707 Great Games Valusoft 1ERP Quidgest 1KEY Agile BI Suite 2 0 MAIA Intelligence Pvt. Ltd. 1KEY Agile Business Intelligence Suite 1 0 MAIA Intelligence Pvt. Ltd. 20/20 vision 2009 20/20 vision Europe BV 2002 Games 1 0 Viva Media 2002 Kakuro Puzzles 1 0 Viva Media 2002 Pentamino Puzzles 1 0 Viva Media 2002 Space Out Games 1 0 Viva Media 2002 Sudoku Games 1 0 Viva Media 20-20 Design 9 0 20-20 Technologies 225,000 Clipart Images 3 2 Focus Multimedia Ltd. 2sms Microsoft Outlook Solution 3 2sms 2sms Microsoft SharePoint Solution 2 2sms 2sms SMS Excel add-in 3 2sms 30,000 Photos 3 1 Focus Multimedia Ltd. 3000 Truetype Fonts Summitsoft Corporation 3003 Crystal Mazes 1 0 Viva Media 360° 4 Software Innovation 360e-BUSINESS 3 e-velopment 3CX Phone System 7 1 3CX 3D Garden Designer Gift Pack Avanquest 3D Globe Deluxe 1 Focus Multimedia Ltd.
    [Show full text]
  • Mcafee SIEM Supported Devices Updated September 2014
    McAfee SIEM Supported Devices Updated September 2014 Version(s) Method of Vendor Name Device Type Parser ESM Version Supported Collection A10 Networks Load Balancer (ASP) Load Balancer All ASP Syslog 9.1 and greater Accellion Secure File Transfer (ASP) Application All ASP Syslog 9.1 and greater Access Layers Portnox (ASP) NAC 2.x ASP Syslog 9.1 and greater Bluesocket (ASP) Wireless Access Point All ASP Syslog 9.1.1 and greater Adtran NetVanta (ASP) Network Switches & Routers All ASP Syslog 9.1 and greater AirTight Networks SpectraGuard (ASP) Application All ASP Syslog 9.1 and greater NGN Switch (ASP) Switch All ASP Syslog 9.2 and greater Applications / Host / Server / Alcatel-Lucent VitalQIP (ASP) Operating Systems / Web Content / All ASP Syslog 9.1 and greater Filtering / Proxies American Power Conversion Uninterruptible Power Supply (ASP) Power Supplies All ASP Syslog 9.1 and greater Applications / Host / Server / Apache HTTP Server Operating Systems / Web Content / 1.x, 2.x Code Based Syslog 9.1 to 9.3.2 Filtering / Proxies Apache Software Foundation Applications / Host / Server / Apache Web Server (ASP) Operating Systems / Web Content / 1.x, 2.x ASP Syslog 9.1 and greater Filtering / Proxies Applications / Host / Server / Apple Inc. Mac OS X (ASP) Operating Systems / Web Content / All ASP Syslog 9.1 and greater Filtering / Proxies Peakflow SP (ASP) Network Switches & Routers 2.x and greater ASP Syslog 9.2 and greater Peakflow X Network Switches & Routers 2.x Code Based Syslog 9.1 to 9.3.2 Arbor Networks Peakflow X (ASP) Network Switches
    [Show full text]