Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
|
|
|
- Ethelbert Whitehead
- 10 years ago
- Views:
Transcription
1 Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute of Technology (KIT)
2 DDoS Huge threat to the Internet New Zealand teenager controlled botnet of million computers (Heise-Online, Nov. 2007) DDoS attacks and worms pose biggest threat to the Internet (Worldwide Infrastructure Security Report, Arbor Networks, 2007) 1.3 million systems send at Ø 19kbit/s each 1 (Source: Arbor Networks) How can you detect and block such low traffic early? Cooperation between detection instances seems promising!
3 On the way to Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 2 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization
4 Distack Framework for Distributed Large-scale Attack Detection Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 3 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization
5 Why can`t we cope with DDoS? 4 Some exemplary issues Little knowledge about global behavior of DDoS Attacks highly distributed. Attack detection and countermeasures mostly not! Few directly reusable results Initial challenge: Complex development and evaluation of mechanisms for local and distributed attack detection and traffic analysis Initial development effort as base for your mechanisms is incredibly high!
6 What you can do with Distack 5 Attack detection and traffic analysis Rapidly implement and run your attack detection and traffic analysis schemes Lots of reusable modules (e.g. sampling, plotting) Run on live traffic or captured traces Comfortable communication between remote instances easier distributed detection Simulations Run your modules transparently in large-scale simulations Integrates seamlessly with the toolkit OMNeT++/INET/ReaSE and that`s not even all
7 even more fun with Distack Distack use-cases Attack detection Traffic analysis Online Offline Simulations Local Distributed Examples Local traffic analysis: easily analyze online traffic and traffic traces Distributed traffic analysis: several measurement points in the network, report to a central instance 6 There is more than distributed attack detection!
8 Distack: Distributed attack detection Framework for distributed attack detection and traffic analysis 7 What it gives to you Fully concentrate on your methods for attack detection and traffic analysis Write once run everywhere: Transparently run your methods, e.g. on a PC or in a simulation environment High reuse through building blocks Great support for your attack detection
9 Rough Architectural Overview Module manager Mechanisms are implemented in small building blocks modules The environment to implement your modules Network manager Abstraction from the network Handles the different ways packets come in Local and remote messaging Communication for the lightweight modules Data-centric communication, local and remote 8 Configuration Flexible way to configure your modules and Distack
10 Distack High-level Architecture 9 Protokoll-Parser Channel ModuleManager MessagingSystem Channel Channel ChannelManager Frame distribution system NetworkManager FrameBuffer reader thread NetworkInterface OMNeT++ Live Traffic Traeces XML-based Configuration Remote Messaging Serialization Deserialization Destinations Sources Communication GIST Sockets API... Utilities Level based Logging Conversion Timer Structures String Operations Routing Table...
11 Lightweight Modules Modules: implement well-defined functionality Small building blocks for high reuse Loaded at runtime on demand Easily configurable (next slide) Perform packet inspection... or other tasks this is where you implement your mechanisms! Channels: linear linked modules Create more complex functionality Channel A Sampling Monitoring Plotting 10 Channel B Protocol filter Statistics
12 Packet Processing in Distack 11 Protokoll-Parser Channel ModuleManager MessagingSystem Channel Channel ChannelManager Frame distribution system NetworkManager FrameBuffer reader thread NetworkInterface OMNeT++ Live Traffic Traces XML-based Configuration Remote Messaging Serialization Deserialization Destinations Sources Communication GIST Sockets API... Utilities Level based Logging Conversion Timer Structures String Operations Routing Table...
13 Flexible Configuration 12 How can I configure my modules? <module name="modules"> <submodule name="basicsampling" </submodule>... </module> Module instance Module parameters Library the module is based on Module lib="modulesamplingnoutofn"> instantiation and configuration <configitem name="samplingcount">200</configitem> <configitem Can use module name="selectioncount">1</configitem> libraries multiple times with different configuration! Channel name <module name="channels"> <submodule name="simplemonitoring" stage="1"> <configitem Channels name="1">basicsampling</configitem> and actual use of modules <configitem name="2">...</configitem> </submodule> functionality!... </module> Flexible grouping of small modules into larger Use of the module
14 Communication Modules are leightweight, small, decoupled Enables high reuse, but how can they interact? Data-centric communication between modules Modules register for message they are interested in Modules send out messages Messages delivered to registered modules Module: `Hmm interesting information I got here maybe someone is interested in this` send Remote communication as easy as local Send messages locally, remotely, or both Transparent message distribution to remote Distack instances 13 MessageSynAckBalance msg(291,33); sendmessage(msg,remote_destinations_neighbours);
15 Transparent Abstraction 14 Distrack abstracts from traffic sources Live traffic: buffers handle bursty traffic Traffic traces: replayed with original timing Simulated traffic: packet transformation for OMNeT++ Easy and consistent packet access Traffic live, replayed, or simulated you don t care! Easy and safe access to protocol parsers TcpPacket* tcp = ippacket->getnextpacket(); if(tcp->isflagset(tcppacket::tcp_flag_syn)) port = tcp->getdestport(); Supported protocols Ethernet, ARP, ICMP, IPv4, IPv6, MPLS, TCP, UDP More to come. Easy to implement your own!
16 Integration into simulations Few simulations of DDoS attacks and detection In our opinion the key to understand the global and distributed behavior of DDoS attacks Our simulation toolkit OMNeT++: time discrete simulation environment INET Framework: lots of protocols (TCP, UDP, ) ReaSE: topology, self-similar traffic generation, DDoS zombies 15 Distack is integrated into this toolkit Packet formats Transparent transformation into Distacks protocol parsers Time domain The simulation time runs different! Modules source code compatible just need to recompile
17 Distack is real! Everything presented here is running code! Go and implement some modules Try it out! E.g. analyze a trace file Use the communication between remote instances There are already several modules available 16 Go and do a large-scale simulation Could be DDoS, could be somethings else Find out how easy Distack makes your life! Integrates with ReaSE coming soon in this talk
18 What we are doing with Distack 17 Collaborative Anomaly-based Attack Detection Thomas Gamer, Michael Scharf, and Marcus Schöller, Proceedings of 2nd International Workshop on Self-Organizing Systems (IWSOS 2007), p , Springer, Sep Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances A System for in-network Anomaly Detection Thomas Gamer, Kommunikation in Verteilten Systemen, p , Springer, Bern, Schweiz, Feb Local traffic analysis and attack detection Self-organization of local detection Management and Visualization
19 What we are doing with Distack Management and Visualization 18
20 ReaSE Realistic Simulation Environment Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 19 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization
21 Realistic Simulations We want to understand the global behavior of DDoS attacks evaluate our mechanisms implemented in Distack on a large-scale! Using real systems is extremly costly! Where to get e.g machines from? Use a real network? We will execute DDoS attacks! 20 Simulations Topologies that match todays Internet infrastructure Realistic background traffic, malicious DDoS traffic
22 Network Topology How does todays Internet topology look like? Power-law distribution in node degree Lots of nodes with low node degree Few nodes with high node degree Hierarchical structure Autonomous Systems (stub/transit) with routers Based on Zhoua et al. ICCCAS06, Li et al. SIGCOMM04 stubas transitas 21 transitas stubas stubas
23 Network Traffic Legitimate traffic as well as Self-similar behavior Heavy-tailed ON/OFF intervals as well as packet sizes Reasonable mix of different kinds of traffic Traffic profiles define flow behavior malicious traffic Evaluate the attack detection system Used real-world tools and ported their behavior DDoS attacks: Tribe Flood Network Worm propagations: Code Red v1 22
24 ReaSE Summary ReaSE combines topology and traffic generation for realistic simulation environments Based on up-to-date solutions Includes generation of malicious traffic Integrates with OMNeT++ and INET Framework GUI helps to create topologies define traffic profiles 23
25 PktAnon Traffic Anonymization Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 24 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization
26 PktAnon Traffic Anonymization How it all began: We wanted to record network traffic at an ISP gateway to evaluate the attack detection mechanisms Anonymization of network traffic Sharing recorded traffic traces with third parties Legal reasons, protect users, protect your network infrastructure, 25 Existing tools not flexible enough Have been built out of a specific need PktAnon is generic and fully flexible!
27 Anonymization profiles 26 Anonymization profiles Allow complete flexibility in the anonymization every protocol field can be anonymized! <TcpPacket> <TcpSourceport anon=anonhashsha1/> <TcpSegnum anon=anonidentity/>... Even more flexibility Input and Output piping ( live anonymization!) Output traces well-formed (checksum, length field) Many anonymization primitives and protocols Current and outlook FreeBSD package, livehex security CD, OpenPacket.org Call to the community for defining standardized anonymization profiles with different security levels
28 Summary and Conslusion Road towards distributed attack detection and understanding the global behavior of DDoS is stony! We have developed tools to flatten this way Did not build them the way we needed them built them generic and flexible Now they simplify our daily work and they can simplify your work! Framework 27 ReaSE PktAnon Realistic Simulation Environment Profile-based Packet Anonymization
29 Thank you for your Attention! /distack Distack A Framework for Large-scale Anomaly-based Attack Detection Thomas Gamer, Christoph P. Mayer, and Martina Zitterbart SECURWARE08, Cap Esterel, France, Aug ReaSE /rease Realistic Simulation Environments for IP-based Networks Thomas Gamer and Michael Scharf, 1 st International Workshop on OMNeT++, Marseille, France, Mar PktAnon /pktanon PktAnon A Generic Framework for Profile-based Traffic Anonymization Thomas Gamer, Christoph P. Mayer, and Marcus Schöller PIK (Journal), Apr 2008.
Large-scale Evaluation of Distributed Attack Detection
Large-scale Evaluation of Distributed Attack Detection Thomas Gamer Institute of Telematics Universität Karlsruhe (TH) Germany [email protected] Christoph P. Mayer Institute of Telematics Universität Karlsruhe
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
Ariba: A Framework for Developing Decentralized Services
Ariba: A Framework for Developing Decentralized Services Christian Hübsch, Christoph P. Mayer, and Oliver P. Waldhorst NGN Service Delivery Platforms and Service Overlays, 13. November 2009, Berlin Institute
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Computer Technology Department, De La Salle University, 2401 Taft Ave., Manila
Local Area Network Analyzer with Multivendor Support without Agents using Switches (LLAMAS) Kristen Cyril B. Aquino 1, Geanne Ross L. Franco 2, Carlos Javier M. Javier 3, Ria Bianca V. Santiago 4, Dannison
JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM
JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM Ms. Babita Saharia 1, Prof. Bhaskar P. C 2 1 Student, Department of Technology, Shivaji University, Kolhapur, (India) 2 Departments
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
inet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity
Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.
Firewall Design Principles Firewall Characteristics Types of Firewalls
Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Application-level simulation for network security
Application-level simulation for network security Stephan Schmidt, Rainer Bye, Joël Chinnow Karsten Bsufka, Ahmet Camtepe and Sahin Albayrak [email protected] DAI-Labor, Berlin Institute of Technology,
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto [email protected] Luís Teixeira INESC Porto, Universidade Católica Portuguesa [email protected] Luís Corte-Real
Software Defined Networking and the design of OpenFlow switches
Software Defined Networking and the design of OpenFlow switches Paolo Giaccone Notes for the class on Packet Switch Architectures Politecnico di Torino December 2015 Outline 1 Introduction to SDN 2 OpenFlow
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski [email protected]
Distributed Systems Firewalls: Defending the Network Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
CaptIO Policy-Based Security Device
The Leader in Denial of Service Prevention CaptIO Policy-Based Security Device The CaptIO Policy-Based Security Device automatically detects, identifies, validates, and stops Denial of Service attacks
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
An Architecture for Concurrent Future Networks
An Architecture for Concurrent Future Networks Future Internet 2008 Karlsruhe, 11.11.2008 Lars Völker, Denis Martin, Ibtissam El Khayat, Christoph Werle, Martina Zitterbart (Universität Karlsruhe (TH)
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Tools for Peer-to-Peer Network Simulation
Tools for Peer-to-Peer Network Simulation draft-irtf-p2prg-core-simulators-00.txt Alan Brown and Mario Kolberg University of Stirling, UK IETF65 P2PRG - March 24, 2006 1 Overview Provide survey of tools
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Quality of Service and Denial of Service
Quality of Service and Denial of Service Stanislav Shalunov, Benjamin Teitelbaum ACM SIGCOMM RIPQOS Workshop, Karlsruhe, Germany, 2003-08-27 QoS Congestion Regulator Many factors might affect outcome of
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
Data Sheet. DPtech Anti-DDoS Series. Overview
Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
TREK GETTING STARTED GUIDE
TREK GETTING STARTED GUIDE September 2014 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
