Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding the Backdoor Rulebase

    The Backdoor rulebase detects the kind of interactive traffic produced during backdoor attacks.

    A backdoor is a mechanism installed on a host computer that facilitates unauthorized access to the system. Attackers who have already compromised a system can install a backdoor to make future attacks easier. When attackers type commands to control a backdoor, they generate interactive traffic.

    Unlike antivirus software, which scans for known backdoor files or executable files on the host system, the IDP engine detects the interactive traffic that is produced when backdoors are used. Interactive programs often transmit several short IP packets containing individual keystrokes and their echoes, reflecting the real-time actions of a user (or an attacker).

    When detection is enabled, the IDP engine detects traffic that exceeds the interactive traffic thresholds you set as runtime parameters. Figure 1 shows the backdoor detection settings in the NSM Device Manager configuration editor.

    Figure 1: NSM Device Manager: Sensor Settings > Run-Time Parameters

    Image s036724.gif

    Table 1 shows the defaults for backdoor detection runtime parameters. You can tune these parameters if safe traffic in your network triggers false positives.

    Table 1: Backdoor Detection Runtime Parameters



    Minimum interval between consecutive small packets (microseconds)


    Maximum interval between consecutive small packets (microseconds)


    Byte threshold for packet sizes in a backdoor connection (bytes)


    Minimum number of data carrying TCP packets (number)


    Minimum percentage of back-to-back small packets (percentage)


    Ratio of small packets to the total packets (percentage)


    Detecting the signs of interactive traffic ensures that the IDP Series device can detect all backdoors, both known and unknown. If the IDP Series device detects interactive traffic, it can perform actions against the connection to prevent the attacker from further compromising your network.

    When you create rules for the Backdoor rulebase, you specify:

    • A source/destination/service match condition
    • Operation
    • Action
    • Notification options

    Published: 2011-02-08