TELEMETRY NETWORK INTRUSION DETECTION SYSTEM
|
|
|
- Isabella Mosley
- 10 years ago
- Views:
Transcription
1 TELEMETRY NETWORK INTRUSION DETECTION SYSTEM Authors: Nadim Maharjan and Paria Moazzemi Advisors: Dr. Richard Dean, Dr. Farzad Moazzami and Dr. Yacob Astatke Department of Electrical and Computer Engineering Morgan State University ABSTRACT Telemetry systems are migrating from links to networks. Security solutions that simply encrypt radio links no longer protect the network of Test Articles or the networks that support them. The use of network telemetry is dramatically expanding and new risks and vulnerabilities are challenging issues for telemetry networks. Most of these vulnerabilities are silent in nature and cannot be detected with simple tools such as traffic monitoring. The Intrusion Detection System (IDS) is a security mechanism suited to telemetry networks that can help detect abnormal behavior in the network. Our previous research in Network Intrusion Detection Systems focused K-means Clustering algorithm is used for vector quantization of network traffic. This reduces the scope of the problem by reducing the entropy of the network data. In addition, a Hidden-Markov Model (HMM) is then employed to help to further characterize and analyze the behavior of the network into states that can be labeled as normal, attack, or anomaly. Our experiments show that IDS can discover and expose telemetry network vulnerabilities using Vector Quantization and the Hidden Markov Model providing a more secure telemetry environment. Our paper shows how these can be generalized into a Network Intrusion system that can be deployed on telemetry networks. KEYWORDS Intrusion Detection System, Vector Quantization, K-means Clustering, Hidden Markov Model, Security, inet.. INTRODUCTION In response to the rise in network security threats and vulnerabilities, we recommend new strategies for inet (Integrated Network Enhanced Telemetry) to address network vulnerabilities. A Network is just medium transporting telemetry information from Test Articles (TA) to Ground Stations (GS). Telemetry consists of multiple radio links connecting TA and GS with radio
2 network (RfNET). This paper presents the network security risks and security features required in the inet environment []. It may be hard to penetrate into the network without modifying a firewall or router with protection such as Zone Alarm, AVG, and MacAfee. Even so there is a possibility of being attacked in a well-planned network by increasingly sophisticated attackers or hackers. Therefore, we propose the use of a novel Hidden Markov Model (HMM) for detecting attacks and anomalies in the inet network. Figure represents the pictorial representation of the proposed inet network. This represents the current inet network design encrypted at the radio link which protects the data from outsiders but does not restrict the insiders or attackers in the Vehicle Network (vnet) or Ground Network (gnet). Figure : Proposed inet Security Architecture Design [] For that reason, it is necessary to focus on firewalls and network intrusion techniques that will minimize and counter attacks against the network.. RELATED WORK. Network Analyzer Network monitoring is a system that monitors the network and notifies the network administrator. The Network Wireshark Analyzer was chosen to capture network packets and display packet data details []. The Wireshark Sniffer tool has some rich features that help to inspect the packets and to show the layering in the network. In this work Wireshark v.6. was used f Filezilla software was Filezilla is a two way logging communication between server and client which consist of commands send by the client and the server replying those commands.engage Packet Builder v.. was used to simulate the SYN flood attack.. Network Attacks Any network can be vulnerable to attacks or unauthorized activities without proper protection. This paper presents two types of attacks: i) FTP Password Attacks ii) Syn Flood Attacks
3 .. Password Attack Currently, passwords are used as a means of authenticating users as a convenient way to access systems. Attackers try to guess or crack the password in order to get access into the network. Therefore, attacking passwords is one of the most straight forward attack vectors. The password attack is the most common attack where an attacker or hacker can gain unauthorized access to network and hence. As shown below the IDS plays an important role in detecting password failure attempts and alerting the administrator or test center... SYN flood attack A SYN Flood Attack is one of the Denial-of-Service attacks which exploits the use of the buffer space in the TCP/IP protocol and which sends large amounts of TCP connection requests faster than a computer can handle them. Normally there are three steps for TCP/IP handshake Protocol. i. ii. iii..3 Vector Quantization Vector Quantization is a simple training algorithm which is used for data compression by reducing the entropy of the data of the network. Our Vector Quantization uses a stage modified K-means clustering, which is a method of cluster analysis. The piece of the K-means clustering algorithm that consumes the most time is the computation of the nearest neighbors where a new centroid is chosen and is used to replace the previous centroid. The majority of the centroid computation time is spent during the last few runs where the algorithm takes a significant amount of time to converge when the centers are very close to their final locations [3].At this point, the data is normalized and clustered with distance measures representing time and attacks..4 Hidden Markov Model A Hidden Markov Model (HMM) is an extension of the Markov model in which the system being modeled is assumed to be a Markov process with unobserved (hidden) states [5]. In a regular Markov model, the state is directly visible to the observer, and therefore the state transition probabilities are the only parameters. In a hidden Markov model, the states are not directly visible but outputs, dependent on each state, are visible. Each state has a probability distribution over the possible output tokens. Therefore the sequence of tokens generated by an HMM gives some information about the sequence of states [6]. Traditionally, HMMs have been defined by the following quintuple: () Where, N = number of states for the model M = number of distinct observations symbols per state S, i.e. the discrete alphabet size. A = [NxN] state transition probability distribution given in the form of a matrix Aij = {P(Si/Sj)} B = [NxM] observation symbol probability distribution given in by Bjk = {P(Bj/Sk)} 3
4 The structure parameters M and N can be taken out to represent the model in the more commonly used compact notation. The HMM includes the Baum-Welch Algorithm and Viterbi Path Algorithm where the Baum- Welch Algorithm determines a likely previous condition of a system by multiplying different combinations of the probabilities of the system being in any of the defined states and Viterbi algorithm works to choose the most appropriate state sequence that maximizes the likelihood of the state sequence for the given observation sequence [6]..5 Intrusion Detection System (IDS) An IDS is considered an effective line of defense that protects the networks from inside and outside attacks or thefts of any valuable data from the network. Since an attacker can be an insider or outsider, we can place the sensors in the vnet and gnet in the inet environment. The main idea of placing IDS sensor in the network is to establish the perimeter of the network and identify all the possible entry points to the network. The sensors collect protocol based network packets in the network and individual system activity and forward this data to an IDS Server. If a log file pattern is consistent with a possible break, an alarm is triggered and alerts are sent to network administrators. The example of an IDS trigger which we address in our experiment is successive login failures of a network host in a short time frame and continuous flow of SYN flood packets to a particular host. A key feature of IDS is notifying network administrators soon after a compromise occurs. IDS sensors can be placed in workstations, servers, switches, routers, or other network devices.the network level IDS are not designed to track internal attacks, it is used for input and output traffic to trace attacks between nodes, an intelligent system level IDS sniffer is needed for each individual nodes. To ensure log files reach the IDS server, network components with IDS sensors often have additional network cards and/or redundant routes to the IDS server []. The IDS must scale well to handle the volume of network traffic or it will drop packets and might miss an attack.this is why we have proposed the Hidden Markov model discussed later in the paper. 3. METHODOLOGY The proposed strategy applies K-means clustering and the HMM to detect intrusions in the network. Figure (a): Data Flow Diagram of Design Approach (b) Reduction of the entropy of Data 4
5 This paper presents IDS that monitors network traffic, parses the traffic into data streams, and performs the vector quantization and the Viterbi analysis. The figure (a) shows the data flow diagram of IDS whereas the figure (b) shows pyramidal representation of reduction of the entropy of the data. This data flow diagram shows how operational data will be transformed into features that can be used to organize data into Markov States.In the training section, a database is developed that represents a rich set of normal operational network traffic and a subset of attack data where Wireshark Network Analyzer sniffs all live network traffic including normal and attack data. The volume of the network traffic data is so big that it needs to be filtered by reducing the entropy of the data. Entropy is defined as the measure of the uncertainty of a random variable [4]. As a result, it organizes and simplifies the data nece raw data from Wireshark is processed, evaluated and manipulated in the Data Management and Analysis Center (DMAC) in order to bring high quality data using Microsoft Excel and Microsoft Visual Basic. In other words, the traffic is analyzed so as to enable a synthetic traffic generator to create combinations of normal and attack data that fit the statistics of the data and the requirements for training data for the Hidden Markov Model. The filtered data from DMAC is fed into Vector Quantization (V.Q.) for further reduction of the entropy of the data where the data will be mapped into an N dimensional Vector set which will capture the variations seen in the data and provides a discrete set of candidate packets for analysis. In addition, a two stage modified K-means algorithm is used in V.Q. compressing the data by using iterative refinement techniques which finalizes the final centroids of the clusters. Last in sequence but not least in importance, the HMM plays a vital roleindetecting the states with normal data and attack data. 4. EXPERIMENTS AND RESULTS 4. Physical Data Physical Data Model represents the data design of all the data in the network. Wireshark captures the data and analyzes the physical layer of the network connection. This paper presents two The figure 3 represents the pictorial view of both attacks in Wireshark Network Analyzer. Figure 3: Snapshots of Password attack and SYN flood attack 5
6 4. Data Management and Analysis Center The Data Management and Analysis Center is the system where data is collected, processed, evaluated and manipulated. For this experiment, Microsoft excel was used to manipulate, interpret and analyze the data. The following table represents the data fields of the database that was used in this experiment. Table : Data fields of the database Column Data Type Sequence Time 3 Source IP 4 Destination IP 5 Protocol 6 Length 7 Info Table : Flags for Network Traffic Data Attack/Data Flags Normal Traffic Data, as seen in Wireshark, in figure 3. It is possible but time-consuming to drag out each line in order to detect the attacks. Therefore, we use Visual Basic (VB) programming which makes much easier and provides the results quickly. To put it simply, using VB in excel can help to automate repetitive tasks. However, we wrote new algorithms in VB code by analyzing statistical characteristics of the data. While analyzing the behavior of the data, flags were set up for each attack to support testing. Table represents the flags for each attack and the normal traffic data. Figure 4: (a) Scatterplot Plot for flags (b) Original Data Plot Besides generating the flags for the network data, the time delta was calculated as well. Time delta is the time difference between the first packet and the second packet in the network. Wireshark captures the live network traffic data running over the time by measuring numerous 6
7 discrete time calculations in order to simulate the smooth behavior of the network. At this time, ained in the above figure 4 (a) and (b). 4.3 Vector Quantization Vector Quantization is a complex and challenging structure that is key to the design. The Vector Quantization dramatically reduces the entropy of the data by identifying critical fields within the data packets as individual dimension in an N dimensional space. The K-means clustering algorithm is one of the most widely used clustering algorithms that is based on an iterative scheme for minimizing the mean squared distance between each point and its nearest center point in the cluster also known as the cluster centroid. The centroid is obtained by computing the average distance between all points in the cluster. The general K-means clustering algorithm is shown in Table 3[3]: Table 3: K-means Clustering steps Step : choose the number of clusters k Step : Randomly generate k cluster and assign random centers for each Step 3: Classify or assign each node to the closest center Step 4: Re-compute the new centroid for each k cluster Step 5: Repeat step3 and 4 until convergence criteria is met (centroids do not change anymore) Step 6: Return the final values of the centroids for each cluster. The figure 5 represents the scatterplot of randomly generated cluster. The K-means clustering continues until a final convergence criterion is met so that it returns the final value of the centroids for each cluster in the network as shown in figure 6. There are nine centroids to capture the whole data in the network demonstrating one dimensional cluster that represents twodimensional space. 6 Scatter plot 4 Final centroids In-Phase Figure 5: Scatterplot of randomly generated cluster In-Phase Figure 6: Scatterplot of the Final Centroids 7
8 Figures 7 and 8 characterize one dimensional data for each centroid in different illustrations: One dimension data 5 Histogram Representation of Each Centroid Time Figure 7: VQ Output: One Dimensional Data Centroids Figure 8: Histogram Representation of Data 4.3 Hidden Markov Model (HMM) The not HMM. The Hidden Markov Model will enable us to develop a statistical profile of the traffic network. Using coded algorithms we will analyze the traffic information obtained from the network packet fields. The HMM toolbox developed at MIT was adapted to this project. This HMM toolbox incorporates both Baum-Welc all the features needed to accomplish the target of our project. Therefore, given a series of observation data and some random HMM inputs to start from, the HMM toolbox should be able to estimate the most likely state transitions (Viterbi Path) as well as optimized HMM parameters []. During Vector Quantization, the original data were quantized into new centroids. This training data is now introduced into the HMM. Although Baum-Welch maximizes the loglikelihood for training sequences, it can overresults compared with HMMs that have experienced fewer training cycles [7]. 35 Plot for -ve Log-Likelihood for Iterations Iteration Number Figure 9: Log-likelihood vs. iteration Figure : 5-State in HMM identifying attacks 8
9 Figure 9 shows the negative log-likelihood versus the number of Baum-Welch iterations in an experiment. In this instance the best generalization performance was found after 5 iterations. The training data obtained from the VQ was fed into HMM. The training data goes through the Baum-Welsh algorithm which optimizes the model parameters. Now,the Viterbi algorithm uses these model parameters to determine the states of the network as seen in Figure. Figure highlights both attacks (Password attack and SYN flood attack) with their respective states and 4. Password attacks are more likely to seem like impulse responses because the interval for password login failure attempt was really small based on time delta. The result emits the discrete output of Password attack. Since it is already known that the SYN flood attack normally sends a large amount of TCP connection requests faster than a computer can handle, HMM traces continuous pattern of those SYN packets and pulls out the results with help of Viterbi algorithm Original Data Plot.9 Password Attack SYN flood Attack Observation Figure : Original Data Plot Data Figure : Probability of Attacks We now verify the probability of attack states with original data plot. Figure exhibits the probability of a respectively. Comparing probability of attacks and original data plot, it can be plainly seen that patterns of traces of the attacks by HMM on figure matches with the patterns of section of the probability of attacks and original data plot. While comparing and analyzing with the original data, it is much easier to say that the state is under attack or not. Furthermore, when the data is analyzed by a Hidden Markov Model,it will find Markov behavior in the traffic with A and B matrices. The A matrix will identify the state transition probabilities for the K Markov states. The B matrix will characterize the probabilities of specific vectors given the states. 5. CONCLUSION To recapitulate, the proposed IDS discovered and exposed the telemetry network vulnerabilities to the Markov Model providing a more secure telemetry environment. This paper showed how these can be generalized into a Network Intrusion System which can be deployed on telemetry networks for many more attacks. To run through the experiment, the live network packets were 9
10 captured in Wireshark Network Analyzer. Subsequently, data were collected, processed, evaluated and manipulated in the Data Management and Analysis Center with help of Microsoft Excel and Microsoft Visual Basic. In the Data Management and Analysis Center, time delta, different categories. The data from Data Management Analysis Center was fed into Vector Quantization so as to compress the data by reducing the entropy of the data. The final centroids were calculated based on old centroids and fed into HMM. The training data from HMM was passed into the Baum-Welsh algorithm which optimized the model parameters. Then, the Viterbi algorithm used these model parameters to determine the states of the network. As a final point, a statistical method for these attacks IDS hit an alarm detecting these attacks, the network administrator could be notified. This work successfully extended earlier efforts that identified single attacks. Future work will look towards extending this process to large sets of data, protocols and attacks. 6. ACKNOWLEDGEMENTS The authors would like to express appreciation to TRMC, SRC and CSC for their support for this effort and heartfelt gratitude to our advisors, Dr. Dean, Dr. Moazzami, Dr. Astatke and my colleagues, Abiola Odesanmi and Sandarva Khanal for providing such fruitful discussions, comments and support. 7. REFERENCES [] Abiola Odesanmi, Secure Telemetry: Intrusion Detection Engine with Hidden Markov Model, Morgan State University, Baltimore, MD, Final Project Report July. [] Richard Sharpe & Ed Warnicke, [3] YacobAstatke, Quality of service Management in Mixed Wireless Networks using the Morgan State University, Baltimore, PhD Thesis. [4] Thomas M. Cover and Joy A. Thomas, Elements of Information Theory, nd ed. Hoboken, New Jersey: John Wiley and Sons, 6. [6] Sandarva Kha Aeronautical Channel Modeling for Packet Networks, Morgan State University, Baltimore, MD, Final Project Report May. [7]Kyoung-Jae Won, Adam Prügel- Genetic Algorithm for Biological Sequence Analysi <
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
HMM Profiles for Network Traffic Classification
HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218 Overview Problem Description
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
IRENE. Intelligence between POS terminal and authorization system. Gateway. Increased security, availability and transparency.
Gateway IRENE INTELLIGENT ROUTER FOR ENHANCED NETWORKING WITH ETHERNET PROTOCOLS Intelligence between POS terminal and authorization system Increased security, availability and transparency. »»» MORE INSIGHT
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE.
OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE Abstract With the boom in electronic commerce and the increasing global interconnectedness
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Network Security Using Hybrid Port Knocking
8 Network Security Using Hybrid Port Knocking Dr. Hussein Al-Bahadili and Dr. Ali H. Hadi, Arab Academy for Financial Sciences, faculty of Information Technology, Amman Jordan Arab Academy for Financial
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
