Anomaly Traffic Analysis and The Experiment Statistic Model Based on

Size: px
Start display at page:

Download "Anomaly Traffic Analysis and The Experiment Statistic Model Based on"

Transcription

1 Anomaly Traffic Analysis and The Experiment Statistic Model Based on Honeypot 1 Wang Xin-Liang, 2 Lu Nan, 3 Li Hui, 4 Gao Qing-Hua *1, First Author School of Electrical Engineering and Automation, Henan Polytechnic University, [email protected] 2 The Research Institution of China Mobile, [email protected] 3 School of Electrical Engineering and Automation, Henan Polytechnic University, li @163.com 4 School of Electrical Engineering and Automation, Henan Polytechnic University, [email protected] Abstract In order to better assess the scale of suspicious hosts in the botnet, this paper performed an uninterrupted monitoring on the honeypot deployed in the network during the 470 days, and provided the relative experimental statistical model. The model points out that the attacker number of every day can be described by the normal distribution in a relatively short time, and in a relatively long time the attacker can not follow the normal distribution. The distribution statistic model of attacker number can be used to evaluate the security status of network, and can make the limited network resources utilized for the suspicious targets in order to improve the security performance of network better. 1. Introduction Keywords: Honeypot, Scan IP Distribution, Attack Frequency, Botnet Detection Botnets [1-4] refers to a group of compromised computers controlled by the server, causing a huge threat to network security, the national information security. According to the used protocol, the botnet can be divided into three types: the IRC-based botnet, the http-based botnet and the P2P-based botnet. The IRC-based botnet mainly contains SDBo, Agobot, GT-Bot and Rbot; The http-based botnet mainly contains Bobax, Rustock and Clickbot; The P2P-based botnet mainly contains Phatbot, Nugache and Storm [5,6]. If the above botnets are directly detected in the environment of actual high-speed network, it will cause system resources overburdened. The sampling techniques can effectively reduce network traffic that anomaly detection algorithms need to deal with, but it will have a greater impact on the performance of anomaly detection algorithm. The literature [7] proposed an effective packet sampling algorithm that will effectively preserve the fingerprint characteristics of worms and botnets to provide a basis for further deep packets detection. The literature [8] compared the results of scan detection for network traffic before and after sampling, and the used three scan detection algorithm were individually TRWSYN [9], TAPS [10] and entropybased detection algorithm [11, 12]. The experimental results showed that the sampling techniques severely reduced the detection accuracy rate because it caused the loss of the data traffic. The literature [13] mainly focused how packet sampling techniques influenced detectection indicators, and the experimental results showed that the entropy-based worm detection algorithm for sampled network traffic was still able to get a better detection results. The literature [14] proposed a new sampling technology based on flow, which could retained the anomaly data flows as much as possible so that it could ensure the effectiveness of the detection algorithm to a certain extent. For the problems that the sampling techniques cause, if we can obtain suspicious IP collection of botnet from the high-speed network and use it to filter network traffic, the subsequent botnet detection algorithm can effectively reduce the need to handle the network traffic, and can provide a basis for the further botnet detection. The paper obtains the suspicious IP collection of botnet by the honeypot technology, and makes an in-depth analysis on the traffic statistics features of suspicious IP set. By analyzing the anomaly traffic of honeypot, we found that scanning attack was a major type of attack. Journal of Convergence Information Technology(JCIT) Volume8, Number4,Feb 2013 doi: /jcit.vol8.issue4.17

2 For network scanning is a prelude of botnet propagation, the collection of abnormal IP obtained by the honeypot will be as the suspicious IP set of botnet to some extent so that it could provide a basis for further botnet anomaly detection. Honeypot used in this paper is constructed by the real host, operating system and the application. Through uninterrupted data monitoring of more than a year, we made a deep analysis on flow characteristics of suspicious IP and statistical regularities of daily suspicious IP number, and provided some statistical models. The models can assess the scale of daily suspicious IP to provide the experimental basis for the detection, control and classification of botnet. 2. Anomaly data acquisition and preprocessing based honeypot 2.1. Data acquisition The anomaly data is obtained by the honeypot deployed in internet data centre. For the honeypot is placed in the data center that the position is more sensitive, it will suffer a variety of attacks. When honeypot is attacked, the other servers in the same network are also very likely to suffer the same attack. So the attack data collected by the honeypot can reflect the circumstances of network attacks to a certain extent. The anomaly data can not be directly collected on the honeypot. Once the honeypot is compromised by the attacker, the attacker will likely turn off the program of data acquisition on the honeypot, and destroy the collected data, so that it would result in a failure of data acquisition. To avoid this situation, this paper will use a special equipment of data acquisition that achieves data acquisition, and this device will be installed on the network exports of internet data centre. So the data packets that external network attacks the honeypot can be collected in real time, even if the honeypot is destroyed by the attacker, it will not affect the anomaly data collection Honeypot configuration The operating system installed on the honeypot is Windows XP SP2, and we installed four kinds of application software that they are individually the Server U6.4, Tomca.0, Remote AnyWhere and VNC. Meanwhile, the system can also open the 3389 port for remote login service, and the access password of the software is a combination of letters, numbers and special characters. Tomca.0 only runs the pages the server owns, and doesn t run external web applications on the web server. During the monitoring, the software normally runs, and no attackers achieve the successful invasion Preprocessing Between March 11, 2009 and June 24, 2010, the equipment of data acquisition performed the continuous monitoring and collected all raw packets of anomaly data. The network traffic analysis system achieved the statistics of flow features on collected packets in accordance with the chronological order, and the results of flow statistics were deposited in the postgre database according to the stream format. The analysis showed that the total collected flows were , TCP data flows were , and abnormal TCP data flows were The normal data flows were produced by the update of the operating system, open services and related software applications. There was not abnormal in the collected UDP packets, and therefore we didn t consider the UDP packets in assessing the network security. The address of honeypot was not open to the outside, and therefore the data flows that all external hosts initiated to access the honeypot were abnormal data, and the abnormal data flows involved in this paper refer to TCP data flows. Definition 1: attacker number. The number of attacker in this paper refers to all exceptions IP number of accessing the honeypot.

3 3. Anomaly data acquisition and preprocessing based honeypot 3.1. Anomaly traffic analysis Attack type The abnormal data captured by honeypot can be divided into scanning attacks and non-scan attack, and the specific contents are as follows: 1) Scan attack SCAN1. The attacker sends a SYN packet to request a connection, and the server returns <RST,ACK> packet to reject the connection. 2) Scan attack SCAN2. The attacker sends SYN packets to request a connection, the server returns <SYN,ACK> packets, and the attacker sends RST packet to close the connection. 3) Scan attack SCAN3. The attacker sends message <SYN,ACK>, and the server returns a RST packet to reject the request. 4) Scan attack SCAN4. The attacker sends the SYN packets to request a connection, and the server returns <SYN,ACK> message. However, the attacker no longer sends a confirmation message, which will lead to establish a semi-connection. 5) Remote anywhere attack. The attacker launches a variety of attacks in 2000 and 22 port that remote anywhere uses. 6) Tomcat attack. The attacker launches a variety of attacks in 8080 port that tomcat uses. 7) Remote login attack. The attacker launches a variety of attacks in 3389 port that remote desktop uses. 8) VNC attack. The attacker launches a variety of attacks in 5900 port that vnc uses. 9) FTP attack. The attacker launches a variety of attacks in 21 port that ftp uses. In this paper, a variety of scanning attack is described by scanning attack Analysis of attacker num Table 1. Time distribution table of attacker number Type of attack Days Mean Standard deviation Minimum Maximum All type of attack Scanning attack Scanning proportion Attack number of remote login attack Attack number of remote login attack of FTP attack Attack number of remote anywhere attack Attack number of tomcat attack Attack number of VNC attack Figure 1 and figure 3 are individually the probability distribution plot of the daily attackers on all types and scanning type. From figure 1, the number of daily attacker is distributed in the less than 200 people, and the distribution is more concentrated. There are a larger number of attackers only in certain days, even up to about 900 people. By the analysis on the raw data, this number of mutations was produced for the server suffered the intensive attack that a number of attackers initiated in some period, for example: the attack of password attempt, and it may be initiated by many zombie hosts in the same botnet. From figure 2, there is the obvious deviation between the normal P-P plot curves and diagonal, that is to say, there exists a significant difference between the cumulative probability of observing and expecting. There exists a obvious difference between the actual curve of distribution and the fitted curve of normal distribution, so the attacker number of all types do not follows a normal distribution.

4 Figure 1. Probability distribution plot of the daily attackers (all types) Figure 2. Normal P-P plot of the daily attackers (all types) From figure 3 and figure 4, the number of scanning attack that the server daily suffered was relatively stable. For the scan attack may mainly be used for collecting vulnerability information, the botnet can not organize the zombie hosts to launch large-scale scanning attacks against the same server after it obtains the vulnerability information. From figure 3, the normal distribution curve can better fit the actual distribution, and from figure 4 there only exists a smaller difference between the cumulative probability of observing and expecting. So the actual distribution on the number of scanning attack is similar with the fitted curve of normal distribution, but it will be deeply discussed below whether the actual distribution can be described by the normal distribution. Figure 3. Probability distribution plot of the daily attackers (scanning attack)

5 Figure 4. Normal P-P plot of the daily attackers (scanning attack) 3.2. Experimental statistical model of attacker num By the distribution statistical analysis on anomaly data of 470 days, the corresponding experimental statistical model is established. The statistical methods use the single-sample K-S test provided by SPSS software, this method is able to use the sample data to infer whether the overall distribution is subject to a theoretical distribution, and it is a test method for goodness of fit. It is described by N that the num of attacker appears every day, the significance level is set to 0.05, and we assume that there isn t significant difference between the actual distribution and normal distribution. In this paper, 60 days are as the basic unit of time that is respectively represented by, t2,... t n, and n 470 / Through the statistical analysis on the daily number of attacker, we found that the number of scanning attack and all attack were not respectively subject to the common distributions such as the normal distribution, Poisson distribution, and so on in the period of 470 days, and there existed a larger fluctuation in the attack number. This paper assumes that the daily number of all attack is represented by x, the daily number of scanning attack is represented by y, the daily proportion of scanning attacker is represented by z, and z x/ y. x and z respectively perform the statistical tests of distribution in accordance with the assumption that they follow the normal distribution, and the test results are shown in table 2, table 3 and table 4. From table 2, the probability P value of x is 0, so x doesn t follow the normal distribution. The probability P values of x, x, x and x are larger than 0.05, so there was no significant difference between the actual distribution and normal distribution in these four time periods. The probability P values of x, x, x t 7 and x are smaller than 0.05, so the hypothesis should be rejected, that is to say, they don t follow the normal distributions in these four time periods. In the first four time period, the number of all attackers is relatively stable, so the number of daily attackers on the honeypot basically maintains around the mean. This shows that during this time, the network security environment is relatively stable, and there is no significant change in the frequency that the honeypot suffers the attacks. In the next four time period, there are more substantial fluctuations on the standard deviation and relative mean of the attacker number, and it does not follow the normal distribution.

6 Table 2. The distribution of attacker number (all attack types) Type of attack Days Mean Standard deviation Probability P value x x x x x x x x t 7 x Table 3. The distribution of attacker number (Scanning attack) Type of attack Days Mean Standard deviation Probability P value y y y y y y y t6 y t7 y Table 4. The distribution of scanning attacker proportion Type of attack Days Mean Standard deviation Probability P value z z z z z z z z t 7 z From table 3, in the period of 470 days the probability P value of y is and smaller than 0.05, so y doesn t follow the normal distribution. However, the probability P values of y, y t 7 and y are larger than 0.05, so in the eight time periods, the number of scanning attackers follows a normal distribution. That is to say, the number of scanning attacker follows a normal distribution in a shorter period of time, and it is likely to fluctuate around the mean. However, in the eight time periods, the mean and variance of the number of scanning attacker are also changing, so it follows a non-stationary distribution, and its probability distribution is as follows:

7 2 1 ( yt ( ) mt ) fy ( yt, ) exp( ), t t, t, t,..., t 2 t 2 t The mean m t i and standard deviation ti of the number of scanning attacker in the different period t are showed in figure 5. The X axis represents the time period t 1,2,3,...,8, and its unit is 60 days; The Y axis represents the mean and standard deviation of the number of scanning attacker. From table 4, the probability P values of z, z, z and z are larger than 0.05, so the scanning attacker proportion follows the normal distribution. However, the probability P values of z, z, z t7 and z are smaller than 0.05, so the hypothesis should be rejected, that is to say, they don t follow the normal distributions in these four time periods. In the first four time periods, the number of other types of attacker is relatively stable, the scanning attacker proportion fluctuates around the mean, and it is less that the scanning attacker proportion is too large or too small. In the next four time periods, there are larger fluctuations on the number of other types of attacker and scanning proportion, so it doesn t follow the normal distribution. In a shorter time period (2 months), the number that the server suffered scanning attack is basically stable around the mean, and the serious deviation from the mean is less. Reflected from the other side, the network environment and network security measures are relatively stable within a short period of time, so the number the server suffered the attack is relatively stable. With the change of time, the network environment and network security measures are also changed, for example: network security measures during the Olympics, will inevitably lead to an overall reduction of network attacks so that the distribution of the attacker number of the server would be also changed. So, it is our next target how the attacker number is influenced by the network security measures. 4. Conclusions Figure 5. The mean and standard deviation of scan attacker num in different period In this paper, we make a deep analysis on the statistical regularities of the abnormal flows of suspicious IP and obtain the experimental statistical models that can provide the experimental statistical basis for assessing the network security situation and suspicious IP scale of botnet. However, when the suspicious IP queue is used to filter high-speed network traffic, if suspicious IP obtained by honeypot is constantly added to suspicious IP queue, it will eventually cause that the fewer network traffic can be filtered for the suspicious IP queue is too large. Based on the statistical regularities of daily suspicious IP and the handling capacity of network traffic in subsequent detection module of botnet, it will be needed to make the in-depth study how to construct the appropriate control strategies for the scale of suspicious IP.

8 5. Acknowledgements This paper is supported by the National Natural Science Foundation of China (Grant Nos ), Doctor Fund of Henan Polytechnic University (Grant No B ) and Henan Province Open Laboratory for Control Engineering Key Disciplines (Grant No KG ). 6. References [1] Du Yue-Jin, Cui Xiang, Malicious botnet and its illumination on computer security, China Data Communication, vol. 7, no. 5, pp.9-12, [2] Genevieve Bartlett, John Heidemann, Christos Papadopoulos, Low-rate, flow-level periodicity detection, 2011 IEEE Conference on Computer Communications Workshops, pp , [3] Tung-Ming Koo, Hung-Chang Chang, Wen-Chi Liao, Estimating the Size of P2P Botnets, International Journal of Advancements in Computing Technology, vol. 4, no. 12, pp , [4] Cheng Binlin, Fu Jianming, Yin Zhiyi, Heap Spraying Attack Detection Based on Sled Distance, International Journal of Digital Content Technology and its Applications, vol. 6, no. 14, pp , [5] Julian B Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, and David Dagon, Peer-to-peer botnets: Overview and case study, In Proceedings of USENIX HotBots 07, pp.1-8, [6] Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, and Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm, In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08), pp.1-9, [7] Lothar Braun, Gerhard Münz, Georg Carle, Packet Sampling for Worm and Botnet Detection in TCP Connections, Network Operations and Management Symposium (NOMS), pp , [8] Jianning Mai, Ashwin Sridharan, Chen-nee Chuah, et al., Impact of packet sampling on portscan detection, IEEE Journal on Selected Areas in Communication, vol. 24, no. 12, pp , [9] Jaeyeon Jung, Vern Paxson, Arthur W Berger, and Hari Balakrishnan, Fast Portscan Detection Using Sequential Hypothesis Testing, In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp , [10] Avinash Sridharan, Tao Ye, Supratik Bhattacharyya, Connectionless port scan detection on the backbone, Performance, Computing, and Communications Conference, pp , [11] Anukool Lakhina, Mark Crovella, Christophe Diot, Mining anomalies using traffic feature distributions, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp , [12] Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya, Profiling internet backbone traffic: Behavior models and applications, In ACM Sigcomm, vol. 35, no. 4, pp , [13] Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, et al., Impact of packet sampling on anomaly detection metrics, Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp , [14] George Androulidakis, Symeon Papavassiliou, Improving network anomaly detection via selective flow-based sampling Communications, IET, vol. 2, no. 3, pp , 2008.

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

A Method for Port Scanner Detection on a Mobile Network

A Method for Port Scanner Detection on a Mobile Network A Method for Port Scanner Detection on a Mobile etwork Sekwon Kim, Joohyung Oh, Inho Kim, and Chaetae Im Korea Internet Security Center Korea Internet & Security Agency IT Venture Tower, Jungdaero 135,

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

Network reconnaissance and IDS

Network reconnaissance and IDS Network reconnaissance and IDS CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Let s play over the network Target

More information

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1 Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing

More information

Protecting DNS Query Communication against DDoS Attacks

Protecting DNS Query Communication against DDoS Attacks Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,

More information

2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1

2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1 ASE 2014 ISBN: 978-1-62561-000-3 1 Network Traffic Analysis of ZeroAccess Bot Shree Garg, Anil K. Sarje, Sateesh K. Peddoju Department of Computer Science & Engineering Indian Institute of Technology Roorkee,

More information

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Joint Entropy Analysis Model for DDoS Attack Detection

Joint Entropy Analysis Model for DDoS Attack Detection 2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY

DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY Kamal Shah and Tanvi Kapdi Thakur College of Engineering and Technology, Mumbai University, Mumbai-400101, India ABSTRACT Network anomaly detection is

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

Detecting peer-to-peer botnets

Detecting peer-to-peer botnets Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme , pp.81-90 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.09 Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1, 2, Lei Yang 1 and Jin Wang 1 1 School of Computer

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection Adaptability of IRC Botnet Detection Method to P2P Botnet Detection Ji, Yuan Department of Electrical Engineering and Computer Science University of California, Irvine [email protected] John, Robin Department

More information

Behaviour Based Worm Detection and Signature Automation

Behaviour Based Worm Detection and Signature Automation Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie

More information

highly predictive blacklisting

highly predictive blacklisting J i a n Z h a n g, P h i l l i p P o r r a s, a n d Johannes Ullrich highly predictive blacklisting Jian Zhang is an assistant professor in the department of computer science at Louisiana State University.

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],

More information

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Multifaceted Approach to Understanding the Botnet Phenomenon

Multifaceted Approach to Understanding the Botnet Phenomenon Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

Detecting P2P-Controlled Bots on the Host

Detecting P2P-Controlled Bots on the Host Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network

Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 571-578 (2005) Short Paper Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network Department of Computer Science and Information

More information

A Flow-based Method for Abnormal Network Traffic Detection

A Flow-based Method for Abnormal Network Traffic Detection A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,

More information

A System for in-network Anomaly Detection

A System for in-network Anomaly Detection A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily

More information

Analysis of Network Packets. C DAC Bangalore Electronics City

Analysis of Network Packets. C DAC Bangalore Electronics City Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

P2P-BDS: Peer-2-Peer Botnet Detection System

P2P-BDS: Peer-2-Peer Botnet Detection System IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Flow-based Worm Detection using Correlated Honeypot Logs

Flow-based Worm Detection using Correlated Honeypot Logs Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058

More information

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Time-Frequency Detection Algorithm of Network Traffic Anomalies 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies

More information

A Novel Visualization Method for Detecting DDoS Network Attacks

A Novel Visualization Method for Detecting DDoS Network Attacks A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;

More information

Accurate Anomaly Detection using Adaptive Monitoring and Fast Switching in SDN

Accurate Anomaly Detection using Adaptive Monitoring and Fast Switching in SDN I.J. Information Technology and Computer Science, 2015, 11, 34-42 Published Online October 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.11.05 Accurate Anomaly Detection using Adaptive

More information

Intrusion Detection & SNORT. Fakrul Alam [email protected]

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through

More information

Flow-based detection of RDP brute-force attacks

Flow-based detection of RDP brute-force attacks Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

A Critical Investigation of Botnet

A Critical Investigation of Botnet Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION

THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION 1 OMAR E. ELEJLA, 2 AMAN B. JANTAN, 3 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 [email protected],

More information

Symptoms Based Detection and Removal of Bot Processes

Symptoms Based Detection and Removal of Bot Processes Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

A Novel Method to Defense Against Web DDoS

A Novel Method to Defense Against Web DDoS A Novel Method to Defense Against Web DDoS 1 Yan Haitao, * 2 Wang Fengyu, 3 Cao ZhenZhong, 4 Lin Fengbo, 5 Chen Chuantong 1 First Author, 5 School of Computer Science and Technology, Shandong University,

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]

More information

2010 Carnegie Mellon University. Malware and Malicious Traffic

2010 Carnegie Mellon University. Malware and Malicious Traffic Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working

More information

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

Intrusion Forecasting Framework for Early Warning System against Cyber Attack Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as

More information

DDoS Attacks and Defenses Overview

DDoS Attacks and Defenses Overview DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

Slow Port Scanning Detection

Slow Port Scanning Detection Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American

More information

A COMBINED METHOD FOR DETECTING SPAM

A COMBINED METHOD FOR DETECTING SPAM International Journal of Computer Networks & Communications (IJCNC), Vol.1, No.2, July 29 A COMBINED METHOD FOR DETECTING SPAM MACHINES ON A TARGET NETWORK Tala Tafazzoli and Seyed Hadi Sadjadi,, Faculty

More information

Usage of Netflow in Security and Monitoring of Computer Networks

Usage of Netflow in Security and Monitoring of Computer Networks Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

Detection of Botnets Using Honeypots and P2P Botnets

Detection of Botnets Using Honeypots and P2P Botnets Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.

More information

Advanced Honeypot Architecture for Network Threats Quantification

Advanced Honeypot Architecture for Network Threats Quantification Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,

More information

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks Jae-Hyun Jun School of Computer Science and Engineering Kyungpook National University [email protected] Cheol-Woong Ahn

More information

Keywords Attack model, DDoS, Host Scan, Port Scan

Keywords Attack model, DDoS, Host Scan, Port Scan Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection

More information