Nemea: Searching for Botnet Footprints
|
|
|
- Derek Spencer
- 10 years ago
- Views:
Transcription
1 Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, Prague 6 Thakurova 9, Prague 6 Czech Republic Czech Republic {cejkat,bodik}@cesnet.cz, [email protected] Abstract. Malicious network traffic originated by malware means a serious threat. Current malware is designed to hide itself from the eyes of victim users as well as network administrators. It is very difficult or impossible to discover such traffic using traditional ways of flow-based monitoring. This paper describes a network traffic analysis of a backbone network as an attempt to discover infected devices. Cooperation with forensic laboratory and analysis of samples of malware allow to gain information that can lead to find unwanted traffic. Special tailored Nemea framework with high speed monitoring pipeline was used to discover infected devices on the network. Keywords. Nemea, traffic analysis, malware, infected devices discovery, application layer analysis, DNS, HTTP, forensic laboratory. 1 Introduction This paper is focused mainly on network traffic monitoring and analysis on a backbone networks. Backbone networks are very specific because of the volume of traffic that flows through the network infrastructure. The growth of network speed and bandwidth makes monitoring and analysis complicated. There are several issues related to this area [10]. Standard monitoring mechanisms (well described e.g. in [8]) exploits various mechanism of traffic aggregation or sampling that allow storage of information about traffic. Many security threats are still detectable even though the used aggregation looses precise information about transferred packets. Information about communication over network is represented as so called flow record, i.e. tuple of network addresses, ports and protocol that uniquely identify one connection between two hosts. Basic flow records contain volume statistics such as number of packets and number of bytes. Analysis of the flow records is used to detect Denial of Service attacks (DoS), scanning or sweeping of addresses or ports, brute-force attacks etc. However, there are malicious applications that generate traffic very similar to normal benign traffic. The malicious applications (usually called malware), forged by attackers, usually exploit standard protocols and services. Additionally, this traffic is composed of a few packets in long time periods. Basic volume information about malware traffic is almost useless for detection of infected devices. As we will explain in following sections, malware sometimes generate specific patterns that appear in packets. The patterns are e.g. URL in the HTTP protocol or DNS lookups containing suspicious domain names. Detection of such traffic could be based on application layer analysis of transferred packets, sometimes called as deep packet inspection [14]. The examples of detection of suspicious traffic using application layer information can be found e.g. in [2, 3].
2 Application layer analysis is very difficult or impossible for large networks without any hardware acceleration. The main obstacle is the volume of data that must be processed. On current high-speed networks, it is needed to analyze traffic at speed over 10 Gbps. Such traffic is very difficult to be transferred into software for processing by standard tools. For this task, a special tailored hardware card [7] can be used for hardware accelerated preprocessing in monitoring probes. Using the monitoring probes it is possible to process headers of application layers export information for additional analysis. The rest of this paper describes real use case of cooperation of monitoring system, network traffic analysis tools and forensic laboratory that is able to analyze malware and provide valuable information to discover infected devices on the network. 2 Malware Sample Analysis Currently, most of devices that are connected into internet can be infected by a malicious software. When malware gets into a device, it usually works as a downloader and starts to download additional applications such as backdoor [13]. Malicious codes spread through the internet via many means, but so far most used channel is a simple . The most typical scenario includes the obfuscated executable sent as an e- mail attachment, latter upon delivery the user itself is forced (perhaps by an urgently composed text) to open an attachment and thus executing the malicious program on one of his devices. Our analyzed samples were acquired as an suspicious incoming and were securely sent to forensic laboratory [4] for extended analysis. This section briefly describes a process of malware analysis performed in the forensic laboratory. At first, malware samples are passed to several simple tools for extracting basic data and metadata from the samples. This phase includes file, strings, antivirus software, PE Explorer,... Finaly samples are disassembled to gain basic overview of its functionality. The data, metadata and assembler code of the executable file supplies the first insight and sometimes it can provide e.g. domain names or IP addresses or other interesting keywords in readable text format. The second step is execution of the malicious code in specially prepared virtualized environment. Isolated virtual machine contains tools that monitors system calls (e.g. using procmon [12], strace,... ) and state of the system. It is needed to be able to take snapshots of disk and memory in a different phases of malware execution (starting with the state before execution). Execution of malware can bring valuable information about the infiltration into the operating system as well as the activity of malicious process. The activity of the process include disk operations (writing data) or network communication (downloading other binaries, contacting command and control servers). Traces of process monitor and network traffic dump (e.g. using Wireshark [11]) can be visualized by ProcDOT [15]. This application can generate call graph that represents behaviour of the analyzed sample. Network dump is useful source of addresses and domain names that should be traced and monitored in real network traffic. Communication with gained addresses can expose infected hosts on the network. Forensic analysis discovered several characteristics of malware behavior. The interesting characteristics for our purposes are related to the network traffic generated by malware. Fig. 1 shows the example of captured traffic from testing virtual environment. Fig. 2 shows visualisation of malware activity. It summarizes information of process monitoring and network monitoring. The figure contains part of the graph that was created by ProcDOT [15].
3 Figure 1: Network communication of infected computer with attacker s server. Figure 2: Part of the diagram of malware activity gained using ProcDOT in forensic analysis. The laboratory analysis found the list of suspicious domain names and IP addresses that is shown in the following list and those pieces of information can be used to locate other infected nodes in monitored network: globalgateone.com globalgatetwo.com lac-fessenheim.org ogarape.com ndiprintmaking.ca x
4 x x 3 Real Network Monitoring Infrastructure Our monitoring infrastructure consists of monitoring probes [9] with the COMBO cards [7] for hardware acceleration, the open-source IPFIXcol collector [5] for collecting information about network traffic and finally the Nemea system [6] for stream-wise data analysis. The monitoring infrastructure is shown in Fig. 3. Figure 3: Monitoring infrastructure consisting of monitoring probes, collector and Nemea system. The Nemea system a modular system for network traffic analysis and anomaly detection. It is composed by independent modules developed using the Nemea framework [1]. The framework tries to make development of Nemea modules easier and faster due to implementing common tasks in form of shared libraries. Nemea contains several modules that work as a source of data for the Nemea system. An important example of such modules is a plug-in for IPFIXcol. This plug-in can export all flow records that collector receives from monitoring probe and pass them in format that Nemea modules understand. Using IPFIXcol plug-in, it is possible to get flow records extended by application layer information at near real-time into detection modules in the Nemea system. The example of the Nemea system configuration is shown in Fig. 4. Figure 4: Example of interconnected modules of the Nemea system. For the purposes of tracking of malicious traffic, a special filter module was used. The filter is able to take user-defined condition and apply it on incoming messages with information about
5 flow. Messages that do not satisfy the condition are dropped, the rest of messages is passed for next processed. The module supports many operators that can be used in condition. We have used mainly matching regular expressions with values of fields extracted from application layer. The following listing shows the example of condition that filter messages of DNS traffic: :DNS_NAME=~".*globalgate.*\.com$" DNS_NAME=~".*ogarape\.com$" DNS_NAME=~".*lac-fessenheim\.org$" DNS_NAME=~".*ndiprintmaking\.ca$" It is possible to filter traffic of discovered addresses that are probably command and control servers as follows (addresses are anonymized): :SRC_IP== x DST_IP== x This condition was applied on HTTP data and we can discovered other potentially infected computers on our network infrastructure that communicate with the given server. 4 Results After few days of monitoring, we have discovered 11 devices connected into the monitored network infrastructure that tried to resolve domain names used by malware samples or to communicate with discovered servers via the HTTP protocol. Except domain names listed in previous section, we found that infected devices tried to query another suspicious domain name dqwdwqwqdqwddqw.cn. In addition, we discovered URLs that appeared in malicious HTTP queries that probably work as keep-alive ping: /so/ and /hr/. Most frequent source and destination IP address that appeared in our observation is from France. The second most frequent addresses belong to subnets of the Czech Republic, to the academic networks. 5 Conclusion Discovering of infected computers on computer network infrastructure is a non-trivial but critically important task for every network operators. Attackers and authors of malicious code try hard to hide not only the running malware in the victim s system but also the traffic that malware produces. It is very difficult maybe impossible to find malicious traffic or traffic originated from infected devices using basic flow records. This paper described the case study of cooperation of department of tools for monitoring and configuration with the forensic laboratory to discover infected devices on the monitored network infrastructure. As a result, 11 infected computers were discovered communicating with suspicious servers. In addition, it could be observed how infected devices communicated with command and control servers to let them know that they are still alive (infected). The whole monitoring was allowed by monitoring infrastructure based on hardware accelerated monitoring probes that can operate at link speed (10 Gbps). Exported information about network traffic was extended by some headers of application protocols such as DNS and HTTP. The resulting flow records were processed by modular Nemea system that is designed for streamwise traffic analysis at near real-time. After 10 days of monitoring, the most active command and control server that communicated from domain name globalgateone.com stopped responding, however, infected computers still continued to send their TCP SYN packets. The infected addresses discovered by our work were reported to members of CSIRT team.
6 Acknowledgments This work was supported by the CESNET Large Infrastructure (LM ) funded by the Ministry of Education, Youth and Sports of the Czech Republic, MOBILITY 7AMB14SK177 Verification and dependability of digital systems design and by CTU in Prague that funded the grant No. SGS15/122/OHK3/1T/18. References [1] Bartos, V., Zadnik, M., Cejka, T.: Nemea: Framework for stream-wise analysis of network traffic. Tech. rep., CESNET (2013) [2] Cejka, T., Bartos, V., Truxa, L., Kubatova, H.: Using Application-Aware Flow Monitoring for SIP Fraud Detection. In: Proc. of 9th International Conference on Autonomous Infrastructure, Management and Security (AIMS15) (2015) [3] Cejka, T., Rosa, Z., Kubatova, H.: Stream-wise detection of surreptitious traffic over dns. In: Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014 IEEE 19th International Workshop on. pp IEEE (2014) [4] CESNET, a. l. e.: FLAB forensic laboratory, [5] CESNET, a. l. e.: IPFIXcol, [6] CESNET, a. l. e.: Nemea, [7] CESNET, a. l. e.: Programmable Hardware, technologies/cards/ [8] Hofstede, R., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: From packet capture to data analysis with netflow and ipfix. IEEE Communications Surveys Tutorials 16(4), (2014) [9] INVEA-TECH a.s.: FlowMon Probe High-performance NetFlow Probe up to 10 Gbps, [10] Kekely, L., Pus, V., Korenek, J.: Software defined monitoring of application protocols. In: INFOCOM, 2014 Proceedings IEEE. pp IEEE (2014) [11] Orebaugh, A., Ramirez, G., Beale, J.: Wireshark & Ethereal network protocol analyzer toolkit. Syngress (2006) [12] Russinovich, M.: Process Monitor v3.1, library/bb aspx [13] Skoudis, E.: Malware: Fighting malicious code. Prentice Hall Professional (2004) [14] Velan, P., Celeda, P.: Next generation application-aware flow monitoring. In: Monitoring and Securing Virtualized Networks and Services, LNCS, vol. 8508, pp Springer (2014) [15] Wojner, C.: ProcDOT Visual Malware Analysis,
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Practical Experience with IPFIX Flow Collectors
Practical Experience with IPFIX Flow Collectors Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Abstract As the number of Internet applications grows, the number
From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik
From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
FlowMon. Complete solution for network monitoring and security. INVEA-TECH [email protected]
FlowMon Complete solution for network monitoring and security INVEA-TECH [email protected] INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Network Monitoring using MMT:
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)
Network Traffic Performance & Security Monitoring Project proposal minimal project Orsenna;Invea-Tech FLOWMON PROBES 1000 & 100 Contents 1. Introduction... 2 1.1. General System Requirements... 2 1.2.
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Detection of DNS Traffic Anomalies in Large Networks
Detection of DNS Traffic Anomalies in Large Networks Milan Čermák, Pavel Čeleda and Jan Vykopal Institute of Computer Science, Masaryk University, Brno Czech Republic, {cermak celeda vykopal}@ics.muni.cz
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Nemea: Framework for stream-wise analysis of network traffic
CESNET Technical Report 9/2013 Nemea: Framework for stream-wise analysis of network traffic VÁCLAV BARTOš, MARTIN ŽÁDNÍK, TOMÁš ČEJKA Received 13. 12. 2013 Abstract Since network anomalies, attacks and
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.
KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Software Defined Monitoring of Application Protocols
IEEE INFOCOM 214 - IEEE Conference on Computer Communications Software Defined Monitoring of Application Protocols Lukáš Kekely, Viktor Puš CESNET a. l. e. Zikova 4, 16 Prague, Czech Republic Email: kekely,[email protected]
Inspecting DNS Flow Traffic for Purposes of Botnet Detection
Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Indexing Full Packet Capture Data With Flow
Indexing Full Packet Capture Data With Flow FloCon January 2011 Randy Heins Intelligence Systems Division Overview Full packet capture systems can offer a valuable service provided that they are: Retaining
Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS [email protected]
Introduction to Network Traffic Monitoring -ICS [email protected] http://www.ics.forth.gr/~markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas () Roadmap Motivation
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
Network Monitoring Based on IP Data Flows Best Practice Document
Network Monitoring Based on IP Data Flows Best Practice Document Produced by CESNET led working group on Network monitoring (CBPD131) Authors: Martin Žádník March 2010 TERENA 2010. All rights reserved.
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Honeypot as the Intruder Detection System
Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Network Security Monitoring and Behavior Analysis Best Practice Document
Network Security Monitoring and Behavior Analysis Best Practice Document Produced by CESNET led working group on network monitoring (CBPD133) Author: Pavel Čeleda September 2011 TERENA 2011. All rights
High-Density Network Flow Monitoring
High-Density Network Flow Monitoring Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Viktor Puš CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected]
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
