Network Security - A Parallel 3D Visualization
|
|
|
- May Park
- 5 years ago
- Views:
Transcription
1 P3D: A Parallel 3D Coordinate Visualization for Advanced Network Scans Troy Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, and Raheem Beyah CSC Lab., The School of ECE GT CAP Group, The School of ECE Georgia Institute of Technology Georgia Institute of Technology Atlanta, GA 30332,USA Atlanta, GA 30332, USA {troy.nunnally, pchi7, kulsoom, jcopeland}@gatech.edu {selcuk, rbeyah}@ece.gatech.edu Abstract As network attacks increase in complexity, network administrators will continue to struggle with analyzing security data immediately and efficiently. To alleviate these challenges, researchers are looking into various visualization techniques (e.g., two-dimensional (2D) and three-dimensional (3D)) to detect, identify, and analyze malicious attacks. This paper discusses the benefits of using a stereoscopic 3D parallel visualization techniques for network scanning, in particular, when addressing occlusion-based visualization attacks intended to confuse network administrators. To our knowledge, no 2D or 3D tool exists that analyzes these attacks. Hence, we propose a novel 3D Parallel coordinate visualization tool for advanced network scans and attacks called P3D. P3D uses flow data, filtering techniques, and state-of-the art 3D technologies to help network administrators detect distributed and coordinated network scans. Compared to other 2D and 3D network security visualization tools, P3D prevents occlusion-based visualization attacks (e.g., Windshield Wiper and Port Source Confusion attacks). We validate our tool with use-cases from emulated distributed scanning attacks. Our evaluation shows P3D allows users to extract new information about scans and minimize information overload by adding an extra dimension and awareness region in the visualization. Index Terms Stereoscopic 3D, Security Visualization, Parallel Coordinate I. INTRODUCTION Network administrators are making strong efforts to monitor and protect their network and protect against malicious attackers. These attackers often use scanning and enumeration tools [1] to find more topology information and vulnerable services within a network. Moreover, these attackers attempt to deceive Intrusion Detection Systems (IDSs) and visualization tools by performing stealthy scans such as scanning from multiple hosts on a network, spoofing source and destination hosts, and adding noise (e.g., sending repetitive scans from dozens of spoofed IPs) to trigger false positives and generate misleading information [2]. If these scans are detected before a node is compromised, network administrators could use these scans as precautionary indicators for future attacks, reveal less information about their network, and prevent compromised networks. Furthermore, detecting unusual network behavior could unveil the presence of malicious software and indicate vulnerabilities and compromised machines within a network. In the past, administrators examined and analyzed reconnaissance activity and behavior using textual representations [3]. However, as data volume increases and networks become more complex, the time span for analyzing data will be lengthy. Recently, researchers have attempted to convert abstract network data into visual representations in order to quickly discover and identify malicious activity and network behavior [4]. These visualization techniques take advantage of the visual system s ability to process large amounts of information in order to efficiently represent network characteristics. As a result, humans can efficiently recall and evaluate more visual representations and data more quickly and accurately than textual data, thereby, revealing the Who, What, When, Where, Why, and How behind network attacks in a form which can be easily presented to users. Researchers are looking into visualizing multi-dimensional datasets using 2D visualization techniques including glyphs, color maps, parallel coordinate plots, histograms and scatterplots [5]. However, 2D visualizations of large data sets become occluded and overwhelming, vital data can be potentially overlooked, and common visualization trends can be lost [6]. Furthermore, 2D visualization techniques can cause an information overload rendering the visualizations useless. Some researchers addressed this issue using filtering techniques to remove unwanted data [7]. However, due to inaccuracies of these filtering techniques, significant data is inadvertently removed. Thus, researchers have considered other methods for expanding visualization techniques such as incorporating the z-direction [8]. The addition of the z-direction or depth for 3D allows n 2 more information to be visualized than its 2D counterparts [9], reduces clutter, results in clearer representations, and provides a more precise and accurate global view of the data s structure [10]. Moreover, it has been shown that 3D visualization demonstrates improved performance in spatial memory tasks when visualizing large sets of hierarchical data [11]. These attributes are beneficial when visualizing large IP address spaces and larger sets of data. However, one key challenge for implementing 3D security tools is that they must be designed to accurately depict objects in 3D space on an inherently flat 2D computer screen. Incorrectly portrayed objects are more prone to human error because network administrators would have difficulty formulating concise cognitive decisions. Currently, researchers are using stereoscopic 3D technologies to enhance 3D space and increase awareness in visualizations
2 [12]. Network security could benefit from the creation of a stereoscopic tool to potentially help reduce error, enhance response rates, and increase awareness of peculiar activity. Accordingly, various industries such as gaming, television, computer-aided design, medical, and video graphics have started introducing numerous stereoscopic 3D technologies and these technologies are becoming more readily available. With the success of stereoscopic 3D in other areas, we believe that interface designers for network security systems should also begin considering and designing stereoscopic 3D tools for complex tasks, large node sets, and port scanning techniques. To the best of our knowledge, no tool exists that enables 3D stereoscopy for advanced port scans and visualization attacks. In this paper, we propose a novel visualization tool called P3D: A Parallel 3D Coordinate Visualization for Advanced Network Scans which uses state-of-the art 3D graphics rendering and a novel 3D parallel coordinate visualization technique in identifying and analyzing distributed scanning attacks intended to thwart network administrators. We illustrate the use of P3D to assist in detection and increased awareness of distributed coordinate attacks. Moreover, by adding an extra dimension in the visualization, P3D prevents information overload and occlusion-based attacks, and administrators can extract new information about the scans. Using the enhanced perception of depth in a stereoscopic 3D environment, P3D includes a stereoscopic awareness region to help bring scans of interest to an administrators s attention without requiring filtering techniques so that significant data is not lost. The rest of this paper is organized as follows. A background on visual cue theory, binocular disparity, and its relationship to port scanning is presented in Section 2. Next, related work is discussed in Section 3. We propose a methodology for P3D for assisting in detecting malicious scanning in local area networks in Section 4. Next, we validate P3D using various use-cases on a local area network, in Section 5. Finally, we conclude the paper and discuss future work in Section 6. II. BACKGROUND A. Visual Cue Theory in Network Security Monoscopic or non-stereoscopic 3D, hereafter known as 3D, refers to the depiction of a 3D environment using 2D perspective projections. Since displays are physically constrained to 2D projections, visual cues are required to adequately represent depth. Simply put, these cues create a perception of 3D objects on a 2D plane. When representing network security data, network parameters become 3D items such as spheres in 3D link graphs or points in 3D scatter plots. These cues are grouped into two categories: monocular and binocular. Monocular cues are depth cues that require only one eye to depict depth whereas binocular depth requires two eyes to depict depth. Some well-known monocular cues in network security visualizations are perspective, size, texture, occlusion, and shadows. Binocular disparity is a primary cue that enables the stereoscopic viewing of objects within a limited distance and is widely used for portraying virtual objects (e.g., images on a computer screen) in real 3D space. As shown in Figure 1, the left and right images are two slightly unique perspectives of one image and this image is perceived to be behind the screen. This concept is used in P3D when generating a 3D environment. Using binocular disparity, we can portray objects to be perceived as in front of the physical monitor. In P3D, the awareness region uses binocular disparity to portray scans in front of the monitor to prevent occlusion attacks from occurring. Fig. 1: 3D Stereoscopic rendering for an image using left and right image. B. Scanning in Network Security Attackers typically perform reconnaissance to gain information and intelligence about vulnerabilities in a network as a precursor to an attack. The addresses and ports scanned give insight into network details and services. If network Intrusion Detection Systems (IDSs) and visualization tools could quickly and accurately observe reconnaissance activities, measures can be taken to prevent network attacks. Attackers have been making visual detection of scans difficult. For instance, attackers can insert malicious data to reduce the effectiveness of a visualization system and overwhelm the administrator [2]. One such technique is an occlusion attack, which refers to attacks meant to obscure the display and hide malicious activity by overwriting old data with new data. As will be shown in Section V, P3D prevents certain occlusion attacks such as Port Source Confusion and the Windshield Wiper attack from occurring and still allows valuable information to be viewed. III. RELATED WORK A. 2D Visualizations for Network Scanning Existing 2D visualizations have been created to visualize network scans. Rumint [13] and parallel coordinate attack visualization (PCAV) [14] propose 2D Parallel Coordinates for detecting unknown large-scale Internet attacks including Internet worms, DDoS attacks and network scanning activities. PCAV uses hash algorithms to detect nine graphical signatures using a detection algorithm in addition to visual human monitoring. Some researchers use techniques such as brushing [15] to give some insight into the behavior of individual source
3 IP addresses. Brushing selects a specific coordinate or group of coordinates to focus on specific behaviors. However, brushing may become tedious when trying to select the behavior of one coordinate out of multiple coordinates. Scanveiwer [16] combines scatterplots, parallel coordinates, histograms and color maps into a single tool. However, occlusions due to large volumes of datasets result in cluttered visualizations and may cause data to be overlooked. In contrast to these techniques, P3D uses an awareness region mechanism to highlight important data and expand the visualization by using the 3rd dimension to help prevent occlusions. B. 3D Visualizations for Network Scanning Existing 3D visualizations visualize data from IDSs [17] using techniques such as iconic tree structures, bar charts [18], and 3D scatter plots [8]. In addition, researchers have used various techniques to represent a larger number of attributes such as the size of a packet s payload in bytes, the number of packets, and interarrival time. The primary benefit of these visualizations is that they adequately portray generalizations of a network s behavior. PortVis [19] is a visualization tool that aids in detecting large-scale network security events and port activity. NetBytes Viewer [20] visualizes the historical network flow data per port of an individual host machine or subnet on a network using a 3D impulse graph plot. These tools only consider the 4- tuple: source IP, destination IP, source port, and destination port. Thus, these security events show a small amount of detail and only display the counts of activities rather than the activities themselves. Our tool enhances NetBytes Viewer by incorporating TCP fields such as RST, FIN, ACK, SYN and fragmentation bits. Various scanning events, such as stealthy intrusions at the firewall and IDS, can also be detected and identified. The Spinning Cube of Potential Doom [8] uses 3D scatter plots to represent network activity on three axes: the destination IP of the local network on the x-axis, the destination port on the y-axis, and the source IP on the z-axis. The color of the glyphs distinguishes the type of the connection (e.g., UDP or TCP). Their 3D scatter plots are useful in determining interesting patterns such as clusters or correlations for data using five parameters: source and destination IPs, source and destination ports, and connection type. Since the visualization is limited to five parameters, decoys cannot be detected without more parameters such as TCP flags and flow data. As a result, a deeper analysis of scanning behavior is not possible. P3D addresses these limitations by visualizing and incorporating more data, allowing it to help uniquely characterize port scans and further understand scanning activity. Additionally, P3D uses a stereoscopic region to increase awareness and reduce data overload. A. System Design IV. P3D ARCHITECTURE In order to display and detect stealthy scans, we have designed and implemented P3D. P3D uses the FRE3DS framework [21] to convert textual packet captures into a 3D visualization with stereoscopic 3D support and interactive techniques such as zooming and panning. The P3D system consists of 5 components: Parser, Converter, Detector, Database, and Visualizer as illustrated in Figure 2. Network packets are sent to the Parser. The Parser then extracts and filters relevant parameters from the packets and sends this data to the Converter. The data is filtered as follows: IP, Average Packet Size, Source and Destination Port, IP ID, Fragmentation bit, Timestamp, and TCP header flags such as SYN, FIN, URG, and PSH, and ACK. Extracting relevant data as opposed to storing entire network packets reduces data sizes and results in more efficient data management. The Converter converts the parameters from P3D Flow packets into the MySQL format and inserts them into a MySQL database. Fig. 2: System Design of P3D. A P3D flow packet is a compacted data format that contains information about a flow. A P3D flow is defined as a network connection between two nodes or a set of packets with the same source IP, destination IP, source port, and destination port. Within a P3D flow packet, a sequential record of TCP flags is recorded between the source and destination to help determine the type of scan or connection. Next, the P3D flow data is sent to the Detector. The Detector examines each flow packet and categorizes the connection as various scans such as FIN, ACK, SYN, and Ping scans. These scans are commonly used to bypass firewalls and subvert IDSs. Then, the Detector performs fixed-time detection and categorizes the scan by examining the flow packets between the two hosts. For example, if there are at least 15 destination ports scanned in 15 seconds, then the Detector categorizes the connection as an aggressive port scan. 1 P3D uses the C++ Object Oriented Model-View-Controller paradigm for higher modularity and extensibility in the Visual- 1 This rate is used commonly in IDS configurations such as Snort [22].
4 izer. We used a custom OpenGL class within a QT framework for its cross-platform capabilities. Therefore, it can compile and run on Windows, GNU/Linux and Mac OS X operating systems. We use the Framework for Rendering Enhanced 3D Stereoscopic Visualization (FRE3DS) [21]. This framework is useful for producing rapid customized 3D visualizations with stereoscopic support so that network administrators can easily and quickly develop various visualizations to efficiently investigate data. To render the content in stereoscopic 3D, we used an Nvidia Quadro 2000, Nvidia RF 3D Vision Pro Shutter Glasses, and a 120 Hz Asus 3D monitor for 60Hz screen rendering per eye. B. Visualization Design Currently, no 3D or 2D visualization tool exists that prevents the occlusion-based visualization attacks discussed in this paper. Using 2D planes in P3D instead of 1D axes allows administrators to understand the relationship between source IP and source port. Figure 3 shows a 2D and 3D representation of P3D. Figure 3.a shows two adjacent planes to portray the relationship between source port, source IP, destination port, and destination IP. connection in a flow. For example, the color green means the source attempts to perform a TCP 3-way handshake. Figure 3b clearly shows that one source IP address is scanning from 5 source ports to 5 destination ports on a single destination IP as portrayed by consecutive horizontal lines and another source IP is scanning from one port to 5 destination ports as portrayed by a fan pattern. Such a scan goes undetected on most traditional visual IDS systems. In 2D Parallel coordinate systems, the relationship between source IPs, source ports, destination IP, and destination ports is lost. The 3D coordinate system design easily allows for the administrators to uniquely distinguish the scans from different hosts scanning from the same port and detect more advanced techniques such as occlusion attacks. The 3D Visualizer creates the left and right cameras, offaxis frustum, and other components essential for rendering in an stereoscopic OpenGL environment. The 3D environment renders a stereoscopic visualization into two regions: the Coordinate Region (CR) and the Awareness Region (AR). (a) 2D representation of a single destination IP using planes. Fig. 4: Sideview of P3D. (b) P3D scan to a single destination IP. Fig. 3: P3D Visualization Design. As shown in Figure 3.b, an aerial perspective of P3D is based on the x, y, and z coordinate systems consisting of two planes and colored links based on connections (e.g., green denotes TCP connect() call) between the planes. The aerial perspective allows users to use features such as pan, rotate, and translate to faster identify anomalies on the network than its 2D counterparts. One plane represents a range of source IPs along the z-axis and a range of destination ports along the y-axis, and the other plane represents a range of destination IPs and Ports. The ports range from 0 to and the IP range depends on the network. The Awareness Region is the stereoscopic portion of the visualization that appears in front of the screen. The colored (green) line denotes the TCP 1) Coordinate Region: The Coordinate Region (CR) is used to detect stealthy scans, bogus scans, distributed scans and scans meant to bypass the firewall including SYN, ACK, and FIN scans by coloring the connection link. Using stereoscopic 3D, P3D is specially designed to handle more data than the traditional 2D plots. 2) Awareness Region: The Awareness Region (AR) is a stereoscopic area that shows a subset of IPs with the highest priority. P3D uses a detection mechanism to determine interesting scans and prioritized IPs by analyzing the TCP/IP attributes in the flow. The detection mechanism visually groups nodes based on various categories: e.g., stealth SYN scanning, ACK scanning, and FIN scanning. Another option is grouping the nodes based into prioritized IPs. Since AR contains IPs and scanning categorization with the highest priority, stereoscopic technologies are used to enhance awareness of vulnerable nodes. These nodes awareness is enhanced by positioning the nodes within the focal length into the AR. As a result, with stereoscopic technologies, the nodes within the AR are perceived in front of the physical screen. The groups of nodes allow the administrator to determine which nodes are scanning and being scanned within a network and distinguishes which nodes are potentially compromised.
5 V. PERFOMANCE EVALUATION In this section, we evaluate P3D based on use-case scenarios for occlusion-based visualization attacks. Next, we discuss similarities and differences between 2D parallel coordinate visualization tool Rumint [13] and P3D. Rumint s 2D parallel coordinate technique is used for comparison because this technique, like P3D, has no theoretical limit in the number of network parameters that can be visualized. Additionally, 2D parallel coordinate visualization has, until P3D, led to a quicker understanding and a more informational graph over that of a 2D/3D scattered plot matrix [14]. A. Source Port Confusion Attack One occlusion attack is source port confusion. 2D Parallel coordinate visualizations become confusing when multiple source nodes (with different IPs) share the same port [2]. This attack is important because it prevents users from understanding how each individual node is behaving on the network in comparison to other nodes. attacks fool most visualization systems by sending a mixture of bogus and real TCP connections. P3D allows users to distinguish the source and destination relationship between 4-tuple connections (source IP, source port, destination IP, destination port). This distinction allows administrators to quickly determine which host is sending malicious or benign data and prioritize the IP to prevent occlusion. For example, Figure 5 shows a simulated coordinated botnet attack of 100 nodes, ranging from to , attacking destination IP address on port In the 2D case [13], as shown in Figure 5.a, the visualization causes confusion and can be misleading because it is difficult to distinguish whether the scan is coming from one source host, multiple source hosts, or all source hosts. P3D (Figure 5.b) clearly shows that 3 IP addresses, and , and are performing scans while the other IPs are performing a Distributed Denial of Service (DDoS) attack on port In result, we can better pinpoint the behavior of individual targeted source IPs in the network than its 2D counterpart. B. Windshield Wiper Occlusion Attack (a) Rumint [13] 2D Source Port Confusion Visualization. (b) P3D Source Port Confusion Visualization. Fig. 5: Use Case 1: Source Port Confusion. Most network scanner tools contain the ability to forge various packets (e.g., RST packets) from spoofed source and destination IP addresses as though they are coming from protected hosts behind the firewall. Although current visualization IDSs detect most script kiddies scanning activity, more advanced attackers can use source port confusion attacks to perform distributed scans from botnets to subvert IDSs. These Another example of an occlusion attack is the Windshield Wiper attack [2], which attempts to completely obscure a visualization system s output by manipulating packet header fields in a coordinated way. Figure 6 is presented to better portray the detection of the extremely stealthy nodes within the visualization. This attack is created using a packet crafting tool hping [23] and each packet is generated using the equivalent source and destination ports from 40,000-60,000 on a network. Figure 6.b shows a visualization of LAN network using P3D. Within the P3D visualization in Figure 6.b, the Windshield Wiper attack is detected by a resulting diagonal rectangular pattern in the CR. Unlike in the port source confusion scenario, the Windshield Wiper attack can obscure a range of ports rather than one port. To perform such an attack, attackers send much more data onto the network than a source port confusion scenario on a network. For this reason, the Windshield Wiper attack is considered more data intensive. In result, the Detector applies a filtering algorithm to prioritize scans into the stereoscopic AR. This helps prevent data intensive occlusion attacks such as the Windshield Wiper attack while still maintaining other network activity without removing data. This region uses 3D technologies in the Visualizer to enhance the awareness of the scan by perceiving the scan in front of the computer monitor. Our visualization clearly shows a scan in the stereoscopic AR. On the other hand, in Figure 6.a, we applied a the same filtering algorithm to detect the prioritized IP and use brushing to portray the scan in blue. However, in the 2D case [13], occlusion occurs and the scan from ip in the 2D visualization is completely hidden. VI. CONCLUSIONS AND FUTURE WORK In this paper, we discussed the use of 2D/3D visualizations to analyze multidimensional data and introduced a format
6 (a) Rumint [13] 2D Windshield Wiper Occlusion Attack. (b) P3D Windshield Wiper Occlusion Attack. Fig. 6: Use Case 2: Windshield Wiper Occlusion Attack. suitable for simplified human interpretation and analysis. Although there have been several studies on 2D/3D visualization techniques for network analysis, there has been little work on visualization techniques aimed at understanding and analyzing scans or attacks used to mislead and overwhelm the user for large networks. P3D allows administrators to absorb and perceive large amounts of visual information, particularly when the 3D senses are enabled by binocular vision. It renders both monocular and binocular depth cues to enhance the administrator s user experience, perform faster analysis of the network vulnerability data, reduce clutter, and increase efficiency. P3D uses the FRE3DS framework [21] to reveal vital scanning characteristics of data and determine correlations between data and attacker nodes on a network. P3D is essential for strategically determining distributed coordinated attacks. Specifically, we showed that using P3D, it is less likely to obscure data through occlusion attacks particularly meant to visually overwhelm the user. In the future, we plan to apply our visualization design to the IPv6 address space, implement other depth cues, user interactions, and evaluate their effects on users. REFERENCES [2] G. Conti, M. Ahamad, and J. Stasko, Attacking Information Visualization System Usability Overloading and Deceiving the Human, in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2005, pp [3] S. Kakuru, Behavior Based Network Traffic Analysis Tool, in Proceedings of the 3rd IEEE International Conference on Communication Software and Networks (ICCSN), May 2011, pp [4] J. Goodall, Visualization is Better! A Comparative Evaluation, in Proceedings of the 6th International Workshop on Visualization for Cyber Security (VizSEC), Oct. 2009, pp [5] D. Keim, Information Visualization and Visual Data Mining, IEEE Transactions on Visualization and Computer Graphics, pp. 1 8, Mar [6] A. Carvajal, Quantitative Comparison between the Use of 3D vs 2D Visualization Tools to Present Building Design Proposals to Non-Spatial Skilled End Users, in Proceedings of the 9th International Conference on Information Visualisation (IV), 2005, pp [7] D. Stott, L. Greenwald, O. Kreidl, and B. DeCleene, Tolerating Adversaries in the Estimation of Network Parameters from Noisy Data: A Nonlinear Filtering Approach, in Proceedings of the IEEE Conference on Military Communications (MILCOM), Oct. 2009, pp [8] S. Lau, The Spinning Cube of Potential Doom, Commun. ACM, vol. 47, no. 6, pp , Jun [9] C. Ware, Information Visualization Perception for Design. Morgan Kaufmann, 2004, vol. 1. [10] H. Koike and K. Ohno, SnortView: Visualization System of Snort Logs, in Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp [11] A. Cockburn, Revisiting 2D vs 3D Implications on Spatial Memory, in Proceedings of the 5th Conference on Australasian User Interface, 2004, pp [12] G. Hubona, P. Wheeler, G. Shirah, and M. Brandt, The Relative Contributions of Stereo, Lighting, and Background Scenes in Promoting 3D Depth Visualization, ACM Transactions on Computer-Human Interaction, vol. 6, no. 3, pp , Sep [13] G. Conti and K. Abdullah, Passive Visual Fingerprinting of Network Attack Tools, in Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security(VizSEC/DMSEC), 2004, pp [14] H. Choi, H. Lee, and H. Kim, Fast Detection and Visualization of Network Attacks on Parallel Coordinates, Computers and Security, vol. 28, no. 5, pp , [15] H. Hauser, F. Ledermann, and H. Doleisch, Angular Brushing of Extended Parallel Coordinates, in Proceedings of the IEEE Symposium on Information Visualization (InfoVis), 2002, pp [16] Z. Jiawan, L. Liang, L. Liangfu, and Z. Ning, A Novel Visualization Approach for Efficient Network Scans Detection, in Proceedings of the International Conference on Security Technology (SECTECH), Dec. 2008, pp [17] I. Xydas, G. Miaoulis, P. Bonnefoi, D. Plemenos, and D. Ghazanfarpour, 3D Graph Visualization Prototype System for Intrusion Detection: A Surveillance Aid to Security Analysts, in Proceedings of the 9th International Conference on Computer Graphics and Artificial Intelligence, May [18] A. Oline and D. Reiners, Exploring Three-Dimensional Visualization for Intrusion Detection, in Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC), Oct. 2005, pp [19] J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen, Portvis: A Tool for Port-based Detection of Security Events, in Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp [20] T. Taylor, S. Brooks, J. Mchugh, and S. Brooks, Netbytes viewer: An entitybased netflow visualization utility for identifying intrusive behavior, in Proceedings of the 2007 Workshop on Visualization for Computer Security (VizSec), 2008, pp [21] T. Nunnally, A. S. Uluagac, J. Copeland, and R. Beyah, 3DSVAT: 3D Stereoscopic Vulnerability Assessment Tool for Network Security, in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN), [22] Snort. Snort. [Online]. Available: [23] S. Sanfilippo. (2006) Hping2. [Online]. Available: [1] J. Gadge and A. Patil, Port Scan Detection, in Proceedings of the IEEE International Conference on Networks (ICON), Dec. 2008, pp. 1 6.
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
A LITERATURE REVIEW OF NETWORK MONITORING THROUGH VISUALISATION AND THE INETVIS TOOL
A LITERATURE REVIEW OF NETWORK MONITORING THROUGH VISUALISATION AND THE INETVIS TOOL Christopher Schwagele Supervisor: Barry Irwin Computer Science Department, Rhodes University 29 July 2010 Abstract Network
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Teryl Taylor, Stephen Brooks and John McHugh Abstract NetBytes Host Viewer is an interactive visualization
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
!NAVSEC':!A!Recommender!System!for!3D! Network!Security!Visualiza<ons!
!:!A!Recommender!System!for!3D! Network!Security!Visualiza
Visual Firewall: Real-time Network Security Monitor
Visual Firewall: Real-time Network Security Monitor Chris P. Lee Georgia Tech CSC Jason Trost Georgia Tech CS Dept Nicholas Gibbs Georgia Tech CS Dept Raheem Beyah Georgia Tech CSC John A. Copeland Georgia
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
An Adaptable Innovative Visualization For Multiple Levels of Users
World Applied Sciences Journal 15 (5): 722-727, 2011 ISSN 1818-4952 IDOSI Publications, 2011 An Adaptable Innovative Visualization For Multiple Levels of Users Doris Hooi-Ten Wong and Sureswaran Ramadass
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 1-12-2006 A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Network visualization
Whether you are a security analyst, system administrator or technical manager, chances are you are confronted with an overwhelming sea of security related data. Typically, we analyze this data with textual
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
Interactive Data Mining and Visualization
Interactive Data Mining and Visualization Zhitao Qiu Abstract: Interactive analysis introduces dynamic changes in Visualization. On another hand, advanced visualization can provide different perspectives
Network Forensics: Detection and Analysis of Stealth Port Scanning Attack
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 33 42 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Network
Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization
Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization Gregory Conti College of Computing [email protected] Kulsoom Abdullah Department of Electrical and
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
1.0 Introduction. 2.0 Data Gathering
Nessus Scanning 1.0 Introduction Nessus is a vulnerability scanner, a program that looks for security bugs in software. There is a freely available open source version which runs on Unix. Tenable Security
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization Sven Krasser, Member, IEEE; Gregory Conti, Member, IEEE; Julian Grizzard, Member, IEEE; Jeff Gribschaw, Member,
1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation Heena Salim Shaikh, Parag Ramesh Kadam, N Pratik Pramod Shinde, Prathamesh Ravindra Patil,
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
3D Data Visualization / Casey Reas
3D Data Visualization / Casey Reas Large scale data visualization offers the ability to see many data points at once. By providing more of the raw data for the viewer to consume, visualization hopes to
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Big Data: Rethinking Text Visualization
Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Coordinated Scan Detection
Coordinated Scan Detection Carrie Gates CA Labs, Islandia, NY [email protected] Abstract Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?
Network Scanning What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide? Where will our research go? Page : 1 Function - attacker view What hosts
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Information Visualization Multivariate Data Visualization Krešimir Matković
Information Visualization Multivariate Data Visualization Krešimir Matković Vienna University of Technology, VRVis Research Center, Vienna Multivariable >3D Data Tables have so many variables that orthogonal
Flamingo: Visualizing Internet Traffic
Flamingo: Visualizing Internet Traffic Jon Oberheide, Michael Goff, Manish Karir Networking Research and Development Merit Network Inc. Ann Arbor, MI 48104 USA {jonojono,goffm,mkarir}@merit.edu Abstract
Network Security Incident Analysis System for Detecting Large-scale Internet Attacks
Network Security Incident Analysis System for Detecting Large-scale Internet Attacks Dr. Kenji Rikitake Security Advancement Group NICT, Japan September 6, 2005 Our goals Collaborative monitoring, centralized
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System Daisuke Inoue [email protected] Koei Suzuki [email protected] Mio Suzuki [email protected] Masashi Eto [email protected] Koji
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
FLOVIS: A NETWORK SECURITY VISUALIZATION FRAMEWORK
FLOVIS: A NETWORK SECURITY VISUALIZATION FRAMEWORK by Teryl Taylor Submitted in partial fulfillment of the requirements for the degree of Master of Computer Science at Dalhousie University Halifax, Nova
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
