Data Mining Techniques in Network Security

Size: px
Start display at page:

Download "Data Mining Techniques in Network Security"

Transcription

1 in Network Security Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek Network Security MI-SIB, ZS 2011/12, Lecture 12 The European Social Fund Prague & EU: We Invest in Your Future

2 Data mining v síťové bezpečnosti Mgr. Rudolf B. Blažek, Ph.D. Katedra počítačových systémů Fakulta informačních technologií České vysoké učení technické v Praze Rudolf Blažek Síťová bezpečnost MI-SIB, ZS 2011/12, Přednáška 12 Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosf

3 Reference Anoop Singhal (Editor) Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security) Springer, 2006 ISBN:

4 Introduction Data Mining in Network Security Do not use signatures, but learn about usage patterns Also viewed as Machine Learning techniques Two basic detection approaches Misuse detection: detection of normal vs. intrusive data flows Anomaly detection: classification algorithms, rare class predictive models, association rules, cost sensitive modeling 4

5 Introduction Data Mining in Network Security Misuse Detection Models of misuse are created automatically Often better rules than manually created signatures Very good for detection of known (or modified) attacks But deciding normal vs. intrusive is human resource intensive Anomaly detection Models of normal behavior are created automatically Deviations from normal behavior are detected automatically Can potentially detect unexpected and unknown attacks 5

6 Introduction Data Mining for Anomaly Detection Advantages Detection of unknown attacks Detection of unusual behavior interesting to IT managers Limitations Possibly very high false alarm rate (FAR) Supervised Detection Models for normal behavior are built from training data Unsupervised Detection No training data, attempts to learn about anomalies automatically 6

7 Introduction Unsupervised Anomaly Detection No training data Attempts to learn about anomalies automatically Algorithms used Statistical methods, clustering, outlier detection, state machines We will focus on unsupervised anomaly detection We will study MINDS, the Minnesota IDS, as an example It will illustrate the usage of data mining techniques 7

8 MINDS MINDS Minnesota Intrusion Detection System 8

9 MINDS Minnesota Intrusion Detection System Abbreviated as MINDS Uses data mining techniques for unsupervised anomaly detection (assigns an anomaly score to each network connection) association pattern analysis (for suspected anomalous network connections) Performance Detects new intrusions that escape signature-based IDSs 9

10 MINDS Minnesota Intrusion Detection System 4 CHAPTER THREE The MINDS System Network Association Pattern Analysis Summary of anomalies Data Capture Device Anomaly Detection Anomaly Scores Analyst Labels Storage Filtering Feature Extraction Known Attack Detection Detected known attacks Figure 3.1: MINDS System Source: Data Warehousing and Data Mining Techniques for Cyber Security Feature name Table 3.1: Time-window based features Feature description 10

11 MINDS Minnesota Intrusion Detection System Data capture Netflow v. 5 (Cisco protocol) Using flow-tools ( Header information only, summarized into (one-way) flows Much less data storage than tcpdump (or e.g. Wireshark) Flow analysis period: 10 min. (1-2 mil. flows) MINDS processing speed Processing of 10 min. data: less than 3 min But unwanted traffic is filtered out before processing 11

12 MINDS MINDS Operation Steps 1. Feature Extraction Basic features: source and destination IP addresses and ports, protocol, flags, number of bytes, number of packets Derived features for a T-seconds time-window: Capture connections with similar recent characteristics Useful to detect sources of high volume connections per unit time (e.g. fast scanning) Derived features for a connection-window: Similar characteristics, but for the last connections from distinct sources (good for e.g. slow scanning) 12

13 MINDS Time-window based features Feature name count-dest count-src count-serv-src count-serv-dest Feature description Number of flows to unique destination IP addresses inside the network in the last seconds from the same source Number of flows from unique source IP addresses inside the net- work in the last seconds to the same destination Number of flows from the source IP to the same destination port in the last seconds Number of flows to the destination IP address using same source port in the last seconds 13

14 MINDS Connection-window based features Feature name count-dest-conn count-src-conn count-serv-srcconn count-serv-destconn Feature description Number of flows to unique destination IP addresses inside the network in the last flows from the same source Number of flows from unique source IP addresses inside the network in the last flows to the same destination Number of flows from the source IP to the same destination port in the last flows Number of flows to the destination IP address using same source port in the last flows 14

15 MINDS MINDS Operation Steps 2. Signature based detection for known attacks Detected attacks are not further analyzed. Not our focus. 3. Anomaly detection Outlier detection assigns an anomaly score to network flows Humans can analyze only the most anomalous connections 4. Association pattern analysis Summarization of highly anomalous network connections Humans decide whether the summaries can be used to create signatures for detection in step 2 15

16 MINDS MINDS Operation Steps 2. Signature based detection for known attacks Detected attacks are not further analyzed. Not our focus. 3. Anomaly detection Outlier detection assigns an anomaly score to network flows Humans can analyze only the most anomalous connections 4. Association pattern analysis Summarization of highly anomalous network connections Humans decide whether the summaries can be used to create signatures for detection in step 2 16

17 MINDS MINDS Anomaly Detection Local Outlier Factor (LOF) Assigned to each data point It is local: outliers with respect to their neighborhood LOF Calculation 1. Compute density of each point s neighborhood 2. Calculate the ratio of the point s density and the density of all its neighbors 3. Find the average of the density ratios over all its neighbors 17

18 Outlier Detection Outlier Detection Minnesota Intrusion Detection System 18

19 considered as outlier. Therefore, the simple nearest Data Mining Techniques Outlier Detection neighbor approaches based on computing the distances fail in these scenarios. However, the example p 1 may be detected as outlier using only the distances to the nearest neighbor. On the other side, LOF is able to capture both outliers (p 1 and p 2 ) due to the fact that it considers the density around the points. 2-D Outlier Detection Example p 2 p 1 Source: Data Warehousing and Data Mining Techniques for Cyber Security Figure 5. Advantages of the LOF approach 3.3. Unsupervised Support Vector Machines. Unlike 2 weeks data. 7 we records. T DoS teard R2L, exam U2R, by a buffe PROB port- Althou advance i unresolve In his cri tioned a n thetic sim using atta lected fro that the b 19

20 than 4, in this case 6. Data Mining Techniques Outlier Detection Local Outlier Factor Calculation Definition 5: (reachability distance of an object p w.r.t. object o) Let k be a natural number. The reachability distance of object Reachability p with respect Distance to object o is defined as reach-dist k (p, o) = max { k-distance(o), d(p, o) }. e given in Figure 1. This is a simng 502 objects. There are 400 obbjects in the cluster C 2, and two this example, C 2 forms a denser wkins' definition, both o1 and o2 jects in C 1 and C 2 should not be. r, we wish to label both o 1 and o 2 framework of distance-based out- k-distance Figure 2 illustrates bodu o is the a distance idea of reachability from the k-th distance closest with point k = 4. qin- tuitively, at most if object k-1 points p is far are away from o (e.g. p 2 in the figure), then the reachability closer than distance q between the two is simply their actual distance. However, if they are sufficiently close (e.g., p p 1 at least k points are 1 in the figure), NOT the actual farther distance than q is replaced by the o k-distance of o. The reason is that in so doing, the statistical fluctuations of d(p,o) for all the it is the diameter of a circle p's close to o can be significantly reduced. The strength of this with k closest neighbors smoothing effect can be controlled by reach-dist the parameter k (p 2, o) k. The higher k = 4 the value of k, the more similar the reachability distances for objects within the same neighborhood. 2 Source: LOF: Identifying Density-Based Local p Outliers ods, particularly with respect to s. These outliers are regarded as reach-dist k (p 1, o) = k-distance(o) 20

21 case explicitly but simply assume that there are no duplicates. (To Data Mining Techniques Outlier Detection deal with duplicates, we can base our notion of neighborhood on a k-distinct-distance, defined analogously to k-distance in definition 3, with the additional requirement that there be at least k objects with different spatial coordinates.) Local Outlier Factor Calculation Definition 7: ((local) outlier factor of an object p) Local Outlier Factor of Point p Local Reachability Density of p The (local) outlier factor of p is defined as lrd MinPts ( o) lrd MinPts ( p) o N LOF MinPts () p MinPts () p = N MinPts () p The outlier Definition factor 6: of (local object reachability p captures density the degree of an to object which p) we call p an outlier. The It local is the reachability average density of the of ratio p is of defined the local as reachability density of p and those of p s MinPts-nearest neighbors. It is easy to see that the lower p's local reachability reach-dist density MinPts is, and ( po, the ) higher the local reachability densities o of N p's MinPts-nearest neighbors are, the lrd higher is the MinPts ()1 p MinPts ( p) = LOF value of p. In the N MinPts following ( p) section, the formal properties of LOF are made precise. To simplify notation, we drop the subscript MinPts from reach-dist, lrd and LOF, if no confusion Intuitively, the local reachability density of an object p is the in- arises. verse of the average reachability distance based on the MinPtsnearest neighbors of p. Note that the local density can be if all the Proof 21 L t a T l 5.1 L based outliers, however, it is necessary to compare the densities of The different sets of objects, which means that we have to determine the In spon secti density of sets of objects dynamically. Therefore, we keep MinPts In insid parti as the only parameter and use the values reach-dist MinPts (p, o), for the bors clu o N MinPts (p), as a measure of the volume to determine the density jects bors in in the neighborhood of an object p. MinPts is a parameter be boun labe (k before) Lemm quite note To th re dist-mi clude dist-ma Let ε b Then 5.2 fo (i) (ii) Lem jects it holds

22 Outlier Detection LOF Bounds MinPts = 3 C Proof (Sketch): (a i max o N MinPts p d min d max i min by definition o 1 o N Min d min = 4 i max LOF MinPts (p) 4 Source: LOF: Identifying Density-Based Local Outliers d max = 6 i min LOF MinPts (p) 6 lrd( p) q direct N MinPts by definition o Figure 3: Illustration of theorem 1 1 q N giving rise to tighter bounds. In section 5.3, we will analyze in lrd( o)

23 Outlier Detection In particular, we hope to label o 2 as outlying, but label all objects in the cluster C 1 as non-outlying. Below, we show that for most objects in C 1 its LOF is approximately 1, indicating that they cannot be labeled as outlying. LOF Bounds Lemma 1: Let C be a collection of objects. Let reach-dist-min denote the minimum reachability distance of objects in C, i.e., reachdist-min = min {reach-dist(p, q) p, q C}. Similarly, let reachdist-max denote the maximum reachability distance of objects in C. Let ε be defined as (reach-dist-max/reach-dist-min 1). Then for all objects p C, such that: (i) all the MinPts-nearest neighbors q of p are in C, and (ii) all the MinPts-nearest neighbors o of q are also in C, Source: LOF: Identifying Density-Based Local Outliers it holds that 1/(1 + ε) LOF(p) (1 + ε). Proof (Sketch): For all MinPts-nearest neighbors q of p, reachdist(p, LOF(p) q) reach-dist-min. close to 1 Then if p is the in local the reachability same cluster density as Meaning: it s neighbors of p, as per (not definition an outlier) 6, is 1/reach-dist-min. On the other hand, reach-dist(p, q) reach-dist-max. Thus, the local reach- 23

24 Outlier Detection among the 3-nearest neighbors of p, we in turn find their minimum and maximum reachability distances to their 3-nearest neighbors. In the figure, the indirect min (p) and indirect max (p) values are marked as i min and i max respectively. LOF Bounds Theorem 1: Let p be an object from the database D, and 1 MinPts D. Then, it is the case that direct min ( p) LOF( p) indirect max ( p) directmin ( direct max ( p) indirect min () p... (minimum reachability distance from the ( ( ( ( ( closest MinPts neighbors Source: LOF: Identifying Density-Based Local Outliers directmax (... (maximum such reachability distance indirectmin/max(...( the same for the MinPts closest neighbors ( ( ( ( ( ( of the MinPts closest neighbors 24

25 Outlier Detection LOF Bounds pct = relative distance from the center pct is small for points with neighbors in the same cluster Ḻ -- outlier factor LOF LOF max : pct=10% LOF max : pct=5% LOF max : pct=1% LOF min : pct=5% LOF min : pct=1% 0.00 LOF min : pct=10% proportion direct/indirect Source: LOF: Identifying Density-Based Local Outliers Figure 4: Upper and lower bound on LOF depending on direct/ indirect for different values of pct = Figur 25

26 Outlier Detection LOF Bounds pct = relative distance from the center pct is small for point p with MaxPts neighbors in the same cluster no matter if p is in that cluster or not Thus the bounds are good for both cases Outliers: p is NOT in the same cluster as the closest neighbors LOF is large, bounds are tight Non-outliers LOF is close to 1, bounds are tight 26

27 Data Mining Techniques Outlier Detection sented in previous section , when k = 1. We outlier threshold that will serve to determine w point is an outlier or not. The threshold is based o training data and it is set to 2%. In order to co threshold, for all data points from training data mal behavior data) distances to their nearest nei computed and then sorted. All test data points D k (p)... distance from the point p to its k-th nearest neighbor distances to their nearest neighbors greater than outliers: n points old with are the detected largest as D k outliers. (p) values Other Data Mining Methods for Outlier Detection Distance to the k-th closest neighbor Nearest neighbor (NN) Mahalanobis-distance Based Outlier Same as above with Since k the = 1training data corresponds to normal be is straightforward to compute the mean and th deviation of the normal data. The Mahalanob normal data determined [ref] between in training the particular point p and the mea outliers: n points normal farthest data from is the computed mean μ as: of normal data Mahalanobis-distance Based Outlier Detection Mahalanobis distance: d M = ( p ) ( p ), (Σ... covariance where matrix the of normal is the data) covariance matrix of the nor T Similarly Network to Security the previous approach, MI-SIB, ZS 2011/12, the Lecture thresho

28 Data Mining Techniques Outlier Detection sented in previous section , when k = 1. We outlier threshold that will serve to determine w point is an outlier or not. The threshold is based o training data and it is set to 2%. In order to co threshold, for all data points from training data mal behavior data) distances to their nearest nei computed and then sorted. All test data points D k (p)... distance from the point p to its k-th nearest neighbor distances to their nearest neighbors greater than outliers: n points old with are the detected largest as D k outliers. (p) values Other Data Mining Methods for Outlier Detection Distance to the k-th closest neighbor Nearest neighbor (NN) Mahalanobis-distance Based Outlier Same as above with Since k the = 1training data corresponds to normal be is straightforward to compute the mean and th deviation of the normal data. The Mahalanob normal data determined [ref] between in training the particular point p and the mea outliers: n points normal farthest data from is the computed mean μ as: of normal data Mahalanobis-distance Based Outlier Detection Mahalanobis distance: d M = ( p ) ( p ), (Σ... covariance where matrix the of normal is the data) covariance matrix of the nor T Similarly Network to Security the previous approach, MI-SIB, ZS 2011/12, the Lecture thresho

29 considered as outlier. Therefore, the simple n Data Mining Techniques Outlier Detection neighbor approaches based on computing the distance in these scenarios. However, the example p 1 may b Advantage of LOF-based tected outlier using Detection only the distances to the n neighbor. On the other side, LOF is able to capture outliers (p 1 and p 2 ) due to the fact that it considers the sity around the points. Nearest Neighbor Approach points in C1 are far apart p2 is closer to C2 than that p2 will NOT be detected as an outlier but p1 will LOF Approach considers density of clusters both p1 and p2 WILL be detected as outliers p 2 p 1 Source: Data Warehousing and Data Mining Techniques for Cyber Security Figure 5. Advantages of the LOF approach 3.3. Unsupervised Support Vector Machines. U 29

30 MINDS Performance MINDS Performance 30

31 MINDS Performance Computational Complexity Neighborhoods around all data points: Calculate distances between all pairs of data points This is O (n 2 ) calculation computationally infeasible for millions of data points. Sampling a training data set from the observed data Compare all data points to this small set, Reduced complexity: O ( data size x sample size ) Additional benefit: anomalous behavior will not be seen often in the sample, so it will not be mistaken with normal behavior 31

32 MINDS Performance Performance of MINDS Worms October 10, 2002: MINDS detected two activities of the slapper worm that were not identified by SNORT since they were new variations of an existing worm code Scanning and DoS activities August 9, 2002: CERT/CC issued an alert for widespread scanning and possible denial of service activity targeted at the Microsoft-DS service on port 445/TCP August 13, 2002: Network connections related to such scanning were the top ranked outliers in MINDS The port scan module of SNORT failed (slow scanning) 32

33 MINDS Performance Performance of MINDS Policy Violations August 8 and 10, 2002: MINDS detected a machine running a Microsoft PPTP VPN server, and another one running a FTP server on non-standard ports. Both policy violations were the top ranked outliers since they are not allowed, and therefore very rare. 33

34 MINDS Performance Performance of MINDS Policy Violations February 6, 2003: unsolicited ICMP echo reply messages to a computer previously infected with Stacheldract worm (a DDoS agent) were detected by MINDS. The infected machine has been removed from the network, but other infected machines outside the local network were still trying to talk to the previously infected machine. 34

35 MINDS Performance Performance of MINDS vs. SNORT Scanning SNORT rule: 3 seconds window / more than 4 destination IPs for one source IP SNORT requires longer windows for slow scans MINDS detects fast and slow scans automatically MINDS detects outbound scans, SNORT does not by default Policy Violations SNORT requires a rule for each violation MINDS detect any rare unusual behavior 35

36 Mining Association Rules Mining Association Rules Summarizing Anomalous Connections Using Association Rules 36

37 Mining Association Rules Summarizing Anomalous Connections Using Association Rules Association Rules Implications X Y (for binary features X and Y) Example: {Breat, Butter} {Milk} Mining Association Rules Find all rules with specified support (percentage in data) And with specified confidence = estimate of P(Y X) Extracted rules The support of extracted rules is called Frequent Item Set 37

38 Mining Association Rules Summarizing Anomalous Connections Using Association Rules Example rule: {Bread, Butter} {Milk} Assume 10% transactions contain bread and butter 6% of the transactions contain bread, butter, and milk Support of the rule Percentage of data with the rule: 6% Confidence of the rule Estimate of P({Milk} {Bread, Butter}): 6% / 10% = 60% 38

39 Mining Association Rules Summarizing Anomalous Connections Using Association Rules Example rule: {Bread, Butter} {Milk} Support of the rule: 6% Confidence of the rule: 60% If requirement is 1% support and 50% confidence then the rule will be extracted Frequent Item Set: {Bread, Butter, Milk} 39

40 Mining Association Rules Summarizing Anomalous Connections Using Association Rules Association patterns specified as frequent item sets or association rules Summary of detected anomalous flows:x Humans can analyze the summary E.g. a frequent set for scanning: {srcip= X, dstport = Y } This is a candidate signature for a signature-based system Constructing a profile of normal network traffic: Identify sets of features that are found in normal traffic E.g. web browsing: {protocol=tcp, dstport=80, NumPackets=3... 6} 40

41 Mining Association Rules Challenges in Mining Association Rules Imbalanced class distribution Small support for attack, large for normal traffic Binarization and grouping of attribute values Supervised or unsupervised Pruning the redundant patterns Must be subsets with similar support Finding discriminating patterns Patterns that identify attacks and normal traffic Grouping the discovered patterns 41

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract Intrusion detection corresponds

More information

Protecting Against Cyber Threats in Networked Information Systems

Protecting Against Cyber Threats in Networked Information Systems Protecting Against Cyber Threats in Networked Information Systems L. Ertoz a,b, A. Lazarevic a,b, E. Eilertson a,b, Pang-Ning Tan a,b, Paul Dokas a,, V. Kumar a,b, Jaideep Srivastava a,b a Dept. of Computer

More information

Statistical Aspects of Intrusion Detection II

Statistical Aspects of Intrusion Detection II Statistical Aspects of Intrusion Detection II Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011

More information

Chapter 3: Cluster Analysis

Chapter 3: Cluster Analysis Chapter 3: Cluster Analysis 3.1 Basic Concepts of Clustering 3.2 Partitioning Methods 3.3 Hierarchical Methods 3.4 Density-Based Methods 3.5 Model-Based Methods 3.6 Clustering High-Dimensional Data 3.7

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Network Traffic and Intrusion Simulations II

Network Traffic and Intrusion Simulations II Network Traffic and Intrusion Simulations II Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

On Entropy in Network Traffic Anomaly Detection

On Entropy in Network Traffic Anomaly Detection On Entropy in Network Traffic Anomaly Detection Jayro Santiago-Paz, Deni Torres-Roman. Cinvestav, Campus Guadalajara, Mexico November 2015 Jayro Santiago-Paz, Deni Torres-Roman. 1/19 On Entropy in Network

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AUTONOMOUS NETWORK SECURITY FOR UNSUPERVISED DETECTION OF NETWORK ATTACKS MS. PRITI

More information

Discovering Local Subgroups, with an Application to Fraud Detection

Discovering Local Subgroups, with an Application to Fraud Detection Discovering Local Subgroups, with an Application to Fraud Detection Abstract. In Subgroup Discovery, one is interested in finding subgroups that behave differently from the average behavior of the entire

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS

MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory

More information

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based

More information

Analysis of a Distributed Denial-of-Service Attack

Analysis of a Distributed Denial-of-Service Attack Analysis of a Distributed Denial-of-Service Attack Ka Hung HUI and OnChing YUE Mobile Technologies Centre (MobiTeC) The Chinese University of Hong Kong Abstract DDoS is a growing problem in cyber security.

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes

Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes Basil AsSadhan, Hyong Kim, José M. F. Moura, Xiaohui Wang Carnegie Mellon University Electrical and Computer Engineering Department

More information

Hybrid Intrusion Detection System Using K-Means Algorithm

Hybrid Intrusion Detection System Using K-Means Algorithm International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Hybrid Intrusion Detection System Using K-Means Algorithm Darshan K. Dagly 1*, Rohan

More information

Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering

Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering Risto Vaarandi and Krlis Podiš Copyright 2010 IEEE. Personal use of this material is permitted. However, permission to

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Network Monitoring for Cyber Security

Network Monitoring for Cyber Security Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions

More information

Summarization - Compressing Data into an Informative Representation

Summarization - Compressing Data into an Informative Representation Under consideration for publication in Knowledge and Information Systems Summarization - Compressing Data into an Informative Representation Varun Chandola and Vipin Kumar Department of Computer Science,

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

Intrusion Forecasting Framework for Early Warning System against Cyber Attack Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting

More information

Data Mining for Cyber Security

Data Mining for Cyber Security Book chapter in Data Warehousing and Data Mining Techniques for Computer Security, Springer, 2006 Data Mining for Cyber Security Varun Chandola, Eric Eilertson, Levent Ertöz, György Simon and Vipin Kumar

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Stateful Firewalls. Hank and Foo

Stateful Firewalls. Hank and Foo Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

KEITH LEHNERT AND ERIC FRIEDRICH

KEITH LEHNERT AND ERIC FRIEDRICH MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They

More information

CSC574 - Computer and Network Security Module: Intrusion Detection

CSC574 - Computer and Network Security Module: Intrusion Detection CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus

More information

Analysis of Denial of Service Attack Using Proposed Model

Analysis of Denial of Service Attack Using Proposed Model Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support

More information

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006 CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker

More information

Firewalls & Intrusion Detection

Firewalls & Intrusion Detection Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Traffic Anomaly Detection Using K-Means Clustering

Traffic Anomaly Detection Using K-Means Clustering Traffic Anomaly Detection Using K-Means Clustering Gerhard Münz, Sa Li, Georg Carle Computer Networks and Internet Wilhelm Schickard Institute for Computer Science University of Tuebingen, Germany Abstract

More information

Analysis of Network Packets. C DAC Bangalore Electronics City

Analysis of Network Packets. C DAC Bangalore Electronics City Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com Intrusion Detection & SNORT Fakrul Alam fakrul@bdhbu.com Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through

More information

Deployment of Snort IDS in SIP based VoIP environments

Deployment of Snort IDS in SIP based VoIP environments Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal Jaroslav.Dockal@unob.cz K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes

More information

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection 2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Analysis of a DDoS Attack

Analysis of a DDoS Attack Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and

More information

OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE.

OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE. OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE Abstract With the boom in electronic commerce and the increasing global interconnectedness

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India

More information

Intrusion Detection Systems

Intrusion Detection Systems CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Intrusion Detection Systems CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION

ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio lzhang@cs.utsa.edu, Greg.White@utsa.edu

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information

Neural networks vs. decision trees for intrusion detection

Neural networks vs. decision trees for intrusion detection Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France Bouzida@tcl.ite.mee.com Frédéric Cuppens Département

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS) ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS) Aleksandar Sokolovski Faculty Of Informatics, European University Skopje, Macedonia Saso Gelev Faculty Of Informatics, European

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

CS 5410 - Computer and Network Security: Intrusion Detection

CS 5410 - Computer and Network Security: Intrusion Detection CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015 Locked Down You re using all the techniques we will talk about over the course of the semester: Strong access

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Keywords Attack model, DDoS, Host Scan, Port Scan

Keywords Attack model, DDoS, Host Scan, Port Scan Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection

More information

Flow Based Traffic Analysis

Flow Based Traffic Analysis Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City murali@ncb.ernet.in Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode

More information

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook

More information

Detecting Flooding Attacks Using Power Divergence

Detecting Flooding Attacks Using Power Divergence Detecting Flooding Attacks Using Power Divergence Jean Tajer IT Security for the Next Generation European Cup, Prague 17-19 February, 2012 PAGE 1 Agenda 1- Introduction 2- K-ary Sktech 3- Detection Threshold

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

C. Universal Threat Management C.4. Defenses

C. Universal Threat Management C.4. Defenses UTM I&C School Prof. P. Janson September 2014 C. Universal Threat Management C.4. Defenses 1 of 20 Over 80 000 vulnerabilities have been found in existing software These vulnerabilities are under constant

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Announcements. Lab 2 now on web site

Announcements. Lab 2 now on web site Lab 2 now on web site Announcements Next week my office hours moved to Monday 4:3pm This week office hours Wednesday 4:3pm as usual Weighting of papers for final discussion [discussion of listen] Bro:

More information

Chapter 2. Background. 2.1 Anomalies in Network. 2.1.1 Performance Related Anomalies

Chapter 2. Background. 2.1 Anomalies in Network. 2.1.1 Performance Related Anomalies Chapter 2 Background This chapter includes three parts, viz., basics of network anomalies, detection of such anomalies and evaluation criteria for detection methods. It presents definition, causes, sources,

More information

FortiGate IPS Guide. Intrusion Prevention System Guide. Version 1.0 30 November 2004 01-28007-0080-20041130

FortiGate IPS Guide. Intrusion Prevention System Guide. Version 1.0 30 November 2004 01-28007-0080-20041130 FortiGate IPS Guide Intrusion Prevention System Guide Version 1.0 30 November 2004 01-28007-0080-20041130 Copyright 2004 Fortinet Inc. All rights reserved. No part of this publication including text, examples,

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information