Solved

How to detect and kill unauthorized network activity

Posted on 2011-03-10
7
955 Views
Last Modified: 2014-09-22
I am a school network admin.  How can I detect when my students are using tools like PUTTY and Ultrasurf to bypass webfiltering and how can I detect and track DOS attacks from the student workstations?  We do not allow non-distrooct devices to attach to the network.  M7y best solution would be to detect and identify the activity, e-mail me about it, and allow me to either control it, or track it to a port on a switch. Additionally, if I could shape my network traffic to limit certain content, that would be a bonus...

My network uses Brocade big iron switches.

Thank you for your help.
0
Comment
Question by:Stephen York
  • 4
  • 2
7 Comments
 
LVL 13

Expert Comment

by:kdearing
ID: 35095380
You're looking for a good network monitoring package.
The following link has many:
http://www.experts-exchange.com/Software/System_Utilities/Q_26748566.html?cid=748#a34841205
0
 
LVL 1

Author Comment

by:Stephen York
ID: 35097735
Do you have any preferences?  Have you used What's Up Gold?
0
 
LVL 13

Accepted Solution

by:
kdearing earned 500 total points
ID: 35100247
I've used What's Up Gold, SpiceWorks, and Wireshark.
Alot of experts here love PRTG
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 1

Author Comment

by:Stephen York
ID: 35128299
We will look at WUG and PRTG.  Both have free trials and both can be cost effective for me.  Thank you for your suggestions and help!
0
 
LVL 1

Author Closing Comment

by:Stephen York
ID: 35128304
THANX!!!!!!!!!
0
 

Expert Comment

by:telebec
ID: 40335605
I have a script I created that blocks write access to a certain part of the user registry. Ultrasurf needs to be able set it's own address as a proxy in windows. My blog explains it in more detail http://www.chrisleblanc.org/block-ultrasurf-workstation-level-windows/
0
 
LVL 1

Author Comment

by:Stephen York
ID: 40336432
Interesting - thanx.  My question was really beyond just Ultrasurf, but it was part of my problem...

For the major proxy avoidance tools, after a little observation of real traffic on our network and my firewall, and then running the many versions of Ultrasurf and some of its brothers, we found that Ultrasurf and kin tends to use netblocks from and Asian provider, Hurricane Electric, to stash their moving server IP targets...  nothing good seems to come from there so we simply black-list entire blocks of the netblocks from that vendor and Ultrasurf does not give the illusion of not working, it just doesn't work.  The only complaints that I have had since doing this is from some of my students... <<Insert evil giggle and/or smirk here ...>>  Way easier than playing with so many other things to stop the stupidity.  It is not foolproof, but I employ other means to help bolster my security and tighten the use of my network bandwidth to be more oriented towards education...  I really have so many other better things to do than play spy versus spy, but this is part of the job...
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SharePoint Online Security 5 62
Martian Packets Unix 5 50
No internet connection message when there is - multiple software 4 33
Admin account lockout 10 36
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques. This attack comes as a nightmare trifecta for email filtering services; sent from a familiar contact, using authentic tone and verbi…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now