Anomaly Traffic Analysis and The Experiment Statistic Model Based on
|
|
|
- Agatha Hodge
- 10 years ago
- Views:
Transcription
1 Anomaly Traffic Analysis and The Experiment Statistic Model Based on Honeypot 1 Wang Xin-Liang, 2 Lu Nan, 3 Li Hui, 4 Gao Qing-Hua *1, First Author School of Electrical Engineering and Automation, Henan Polytechnic University, [email protected] 2 The Research Institution of China Mobile, [email protected] 3 School of Electrical Engineering and Automation, Henan Polytechnic University, li @163.com 4 School of Electrical Engineering and Automation, Henan Polytechnic University, [email protected] Abstract In order to better assess the scale of suspicious hosts in the botnet, this paper performed an uninterrupted monitoring on the honeypot deployed in the network during the 470 days, and provided the relative experimental statistical model. The model points out that the attacker number of every day can be described by the normal distribution in a relatively short time, and in a relatively long time the attacker can not follow the normal distribution. The distribution statistic model of attacker number can be used to evaluate the security status of network, and can make the limited network resources utilized for the suspicious targets in order to improve the security performance of network better. 1. Introduction Keywords: Honeypot, Scan IP Distribution, Attack Frequency, Botnet Detection Botnets [1-4] refers to a group of compromised computers controlled by the server, causing a huge threat to network security, the national information security. According to the used protocol, the botnet can be divided into three types: the IRC-based botnet, the http-based botnet and the P2P-based botnet. The IRC-based botnet mainly contains SDBo, Agobot, GT-Bot and Rbot; The http-based botnet mainly contains Bobax, Rustock and Clickbot; The P2P-based botnet mainly contains Phatbot, Nugache and Storm [5,6]. If the above botnets are directly detected in the environment of actual high-speed network, it will cause system resources overburdened. The sampling techniques can effectively reduce network traffic that anomaly detection algorithms need to deal with, but it will have a greater impact on the performance of anomaly detection algorithm. The literature [7] proposed an effective packet sampling algorithm that will effectively preserve the fingerprint characteristics of worms and botnets to provide a basis for further deep packets detection. The literature [8] compared the results of scan detection for network traffic before and after sampling, and the used three scan detection algorithm were individually TRWSYN [9], TAPS [10] and entropybased detection algorithm [11, 12]. The experimental results showed that the sampling techniques severely reduced the detection accuracy rate because it caused the loss of the data traffic. The literature [13] mainly focused how packet sampling techniques influenced detectection indicators, and the experimental results showed that the entropy-based worm detection algorithm for sampled network traffic was still able to get a better detection results. The literature [14] proposed a new sampling technology based on flow, which could retained the anomaly data flows as much as possible so that it could ensure the effectiveness of the detection algorithm to a certain extent. For the problems that the sampling techniques cause, if we can obtain suspicious IP collection of botnet from the high-speed network and use it to filter network traffic, the subsequent botnet detection algorithm can effectively reduce the need to handle the network traffic, and can provide a basis for the further botnet detection. The paper obtains the suspicious IP collection of botnet by the honeypot technology, and makes an in-depth analysis on the traffic statistics features of suspicious IP set. By analyzing the anomaly traffic of honeypot, we found that scanning attack was a major type of attack. Journal of Convergence Information Technology(JCIT) Volume8, Number4,Feb 2013 doi: /jcit.vol8.issue4.17
2 For network scanning is a prelude of botnet propagation, the collection of abnormal IP obtained by the honeypot will be as the suspicious IP set of botnet to some extent so that it could provide a basis for further botnet anomaly detection. Honeypot used in this paper is constructed by the real host, operating system and the application. Through uninterrupted data monitoring of more than a year, we made a deep analysis on flow characteristics of suspicious IP and statistical regularities of daily suspicious IP number, and provided some statistical models. The models can assess the scale of daily suspicious IP to provide the experimental basis for the detection, control and classification of botnet. 2. Anomaly data acquisition and preprocessing based honeypot 2.1. Data acquisition The anomaly data is obtained by the honeypot deployed in internet data centre. For the honeypot is placed in the data center that the position is more sensitive, it will suffer a variety of attacks. When honeypot is attacked, the other servers in the same network are also very likely to suffer the same attack. So the attack data collected by the honeypot can reflect the circumstances of network attacks to a certain extent. The anomaly data can not be directly collected on the honeypot. Once the honeypot is compromised by the attacker, the attacker will likely turn off the program of data acquisition on the honeypot, and destroy the collected data, so that it would result in a failure of data acquisition. To avoid this situation, this paper will use a special equipment of data acquisition that achieves data acquisition, and this device will be installed on the network exports of internet data centre. So the data packets that external network attacks the honeypot can be collected in real time, even if the honeypot is destroyed by the attacker, it will not affect the anomaly data collection Honeypot configuration The operating system installed on the honeypot is Windows XP SP2, and we installed four kinds of application software that they are individually the Server U6.4, Tomca.0, Remote AnyWhere and VNC. Meanwhile, the system can also open the 3389 port for remote login service, and the access password of the software is a combination of letters, numbers and special characters. Tomca.0 only runs the pages the server owns, and doesn t run external web applications on the web server. During the monitoring, the software normally runs, and no attackers achieve the successful invasion Preprocessing Between March 11, 2009 and June 24, 2010, the equipment of data acquisition performed the continuous monitoring and collected all raw packets of anomaly data. The network traffic analysis system achieved the statistics of flow features on collected packets in accordance with the chronological order, and the results of flow statistics were deposited in the postgre database according to the stream format. The analysis showed that the total collected flows were , TCP data flows were , and abnormal TCP data flows were The normal data flows were produced by the update of the operating system, open services and related software applications. There was not abnormal in the collected UDP packets, and therefore we didn t consider the UDP packets in assessing the network security. The address of honeypot was not open to the outside, and therefore the data flows that all external hosts initiated to access the honeypot were abnormal data, and the abnormal data flows involved in this paper refer to TCP data flows. Definition 1: attacker number. The number of attacker in this paper refers to all exceptions IP number of accessing the honeypot.
3 3. Anomaly data acquisition and preprocessing based honeypot 3.1. Anomaly traffic analysis Attack type The abnormal data captured by honeypot can be divided into scanning attacks and non-scan attack, and the specific contents are as follows: 1) Scan attack SCAN1. The attacker sends a SYN packet to request a connection, and the server returns <RST,ACK> packet to reject the connection. 2) Scan attack SCAN2. The attacker sends SYN packets to request a connection, the server returns <SYN,ACK> packets, and the attacker sends RST packet to close the connection. 3) Scan attack SCAN3. The attacker sends message <SYN,ACK>, and the server returns a RST packet to reject the request. 4) Scan attack SCAN4. The attacker sends the SYN packets to request a connection, and the server returns <SYN,ACK> message. However, the attacker no longer sends a confirmation message, which will lead to establish a semi-connection. 5) Remote anywhere attack. The attacker launches a variety of attacks in 2000 and 22 port that remote anywhere uses. 6) Tomcat attack. The attacker launches a variety of attacks in 8080 port that tomcat uses. 7) Remote login attack. The attacker launches a variety of attacks in 3389 port that remote desktop uses. 8) VNC attack. The attacker launches a variety of attacks in 5900 port that vnc uses. 9) FTP attack. The attacker launches a variety of attacks in 21 port that ftp uses. In this paper, a variety of scanning attack is described by scanning attack Analysis of attacker num Table 1. Time distribution table of attacker number Type of attack Days Mean Standard deviation Minimum Maximum All type of attack Scanning attack Scanning proportion Attack number of remote login attack Attack number of remote login attack of FTP attack Attack number of remote anywhere attack Attack number of tomcat attack Attack number of VNC attack Figure 1 and figure 3 are individually the probability distribution plot of the daily attackers on all types and scanning type. From figure 1, the number of daily attacker is distributed in the less than 200 people, and the distribution is more concentrated. There are a larger number of attackers only in certain days, even up to about 900 people. By the analysis on the raw data, this number of mutations was produced for the server suffered the intensive attack that a number of attackers initiated in some period, for example: the attack of password attempt, and it may be initiated by many zombie hosts in the same botnet. From figure 2, there is the obvious deviation between the normal P-P plot curves and diagonal, that is to say, there exists a significant difference between the cumulative probability of observing and expecting. There exists a obvious difference between the actual curve of distribution and the fitted curve of normal distribution, so the attacker number of all types do not follows a normal distribution.
4 Figure 1. Probability distribution plot of the daily attackers (all types) Figure 2. Normal P-P plot of the daily attackers (all types) From figure 3 and figure 4, the number of scanning attack that the server daily suffered was relatively stable. For the scan attack may mainly be used for collecting vulnerability information, the botnet can not organize the zombie hosts to launch large-scale scanning attacks against the same server after it obtains the vulnerability information. From figure 3, the normal distribution curve can better fit the actual distribution, and from figure 4 there only exists a smaller difference between the cumulative probability of observing and expecting. So the actual distribution on the number of scanning attack is similar with the fitted curve of normal distribution, but it will be deeply discussed below whether the actual distribution can be described by the normal distribution. Figure 3. Probability distribution plot of the daily attackers (scanning attack)
5 Figure 4. Normal P-P plot of the daily attackers (scanning attack) 3.2. Experimental statistical model of attacker num By the distribution statistical analysis on anomaly data of 470 days, the corresponding experimental statistical model is established. The statistical methods use the single-sample K-S test provided by SPSS software, this method is able to use the sample data to infer whether the overall distribution is subject to a theoretical distribution, and it is a test method for goodness of fit. It is described by N that the num of attacker appears every day, the significance level is set to 0.05, and we assume that there isn t significant difference between the actual distribution and normal distribution. In this paper, 60 days are as the basic unit of time that is respectively represented by, t2,... t n, and n 470 / Through the statistical analysis on the daily number of attacker, we found that the number of scanning attack and all attack were not respectively subject to the common distributions such as the normal distribution, Poisson distribution, and so on in the period of 470 days, and there existed a larger fluctuation in the attack number. This paper assumes that the daily number of all attack is represented by x, the daily number of scanning attack is represented by y, the daily proportion of scanning attacker is represented by z, and z x/ y. x and z respectively perform the statistical tests of distribution in accordance with the assumption that they follow the normal distribution, and the test results are shown in table 2, table 3 and table 4. From table 2, the probability P value of x is 0, so x doesn t follow the normal distribution. The probability P values of x, x, x and x are larger than 0.05, so there was no significant difference between the actual distribution and normal distribution in these four time periods. The probability P values of x, x, x t 7 and x are smaller than 0.05, so the hypothesis should be rejected, that is to say, they don t follow the normal distributions in these four time periods. In the first four time period, the number of all attackers is relatively stable, so the number of daily attackers on the honeypot basically maintains around the mean. This shows that during this time, the network security environment is relatively stable, and there is no significant change in the frequency that the honeypot suffers the attacks. In the next four time period, there are more substantial fluctuations on the standard deviation and relative mean of the attacker number, and it does not follow the normal distribution.
6 Table 2. The distribution of attacker number (all attack types) Type of attack Days Mean Standard deviation Probability P value x x x x x x x x t 7 x Table 3. The distribution of attacker number (Scanning attack) Type of attack Days Mean Standard deviation Probability P value y y y y y y y t6 y t7 y Table 4. The distribution of scanning attacker proportion Type of attack Days Mean Standard deviation Probability P value z z z z z z z z t 7 z From table 3, in the period of 470 days the probability P value of y is and smaller than 0.05, so y doesn t follow the normal distribution. However, the probability P values of y, y t 7 and y are larger than 0.05, so in the eight time periods, the number of scanning attackers follows a normal distribution. That is to say, the number of scanning attacker follows a normal distribution in a shorter period of time, and it is likely to fluctuate around the mean. However, in the eight time periods, the mean and variance of the number of scanning attacker are also changing, so it follows a non-stationary distribution, and its probability distribution is as follows:
7 2 1 ( yt ( ) mt ) fy ( yt, ) exp( ), t t, t, t,..., t 2 t 2 t The mean m t i and standard deviation ti of the number of scanning attacker in the different period t are showed in figure 5. The X axis represents the time period t 1,2,3,...,8, and its unit is 60 days; The Y axis represents the mean and standard deviation of the number of scanning attacker. From table 4, the probability P values of z, z, z and z are larger than 0.05, so the scanning attacker proportion follows the normal distribution. However, the probability P values of z, z, z t7 and z are smaller than 0.05, so the hypothesis should be rejected, that is to say, they don t follow the normal distributions in these four time periods. In the first four time periods, the number of other types of attacker is relatively stable, the scanning attacker proportion fluctuates around the mean, and it is less that the scanning attacker proportion is too large or too small. In the next four time periods, there are larger fluctuations on the number of other types of attacker and scanning proportion, so it doesn t follow the normal distribution. In a shorter time period (2 months), the number that the server suffered scanning attack is basically stable around the mean, and the serious deviation from the mean is less. Reflected from the other side, the network environment and network security measures are relatively stable within a short period of time, so the number the server suffered the attack is relatively stable. With the change of time, the network environment and network security measures are also changed, for example: network security measures during the Olympics, will inevitably lead to an overall reduction of network attacks so that the distribution of the attacker number of the server would be also changed. So, it is our next target how the attacker number is influenced by the network security measures. 4. Conclusions Figure 5. The mean and standard deviation of scan attacker num in different period In this paper, we make a deep analysis on the statistical regularities of the abnormal flows of suspicious IP and obtain the experimental statistical models that can provide the experimental statistical basis for assessing the network security situation and suspicious IP scale of botnet. However, when the suspicious IP queue is used to filter high-speed network traffic, if suspicious IP obtained by honeypot is constantly added to suspicious IP queue, it will eventually cause that the fewer network traffic can be filtered for the suspicious IP queue is too large. Based on the statistical regularities of daily suspicious IP and the handling capacity of network traffic in subsequent detection module of botnet, it will be needed to make the in-depth study how to construct the appropriate control strategies for the scale of suspicious IP.
8 5. Acknowledgements This paper is supported by the National Natural Science Foundation of China (Grant Nos ), Doctor Fund of Henan Polytechnic University (Grant No B ) and Henan Province Open Laboratory for Control Engineering Key Disciplines (Grant No KG ). 6. References [1] Du Yue-Jin, Cui Xiang, Malicious botnet and its illumination on computer security, China Data Communication, vol. 7, no. 5, pp.9-12, [2] Genevieve Bartlett, John Heidemann, Christos Papadopoulos, Low-rate, flow-level periodicity detection, 2011 IEEE Conference on Computer Communications Workshops, pp , [3] Tung-Ming Koo, Hung-Chang Chang, Wen-Chi Liao, Estimating the Size of P2P Botnets, International Journal of Advancements in Computing Technology, vol. 4, no. 12, pp , [4] Cheng Binlin, Fu Jianming, Yin Zhiyi, Heap Spraying Attack Detection Based on Sled Distance, International Journal of Digital Content Technology and its Applications, vol. 6, no. 14, pp , [5] Julian B Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, and David Dagon, Peer-to-peer botnets: Overview and case study, In Proceedings of USENIX HotBots 07, pp.1-8, [6] Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, and Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm, In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08), pp.1-9, [7] Lothar Braun, Gerhard Münz, Georg Carle, Packet Sampling for Worm and Botnet Detection in TCP Connections, Network Operations and Management Symposium (NOMS), pp , [8] Jianning Mai, Ashwin Sridharan, Chen-nee Chuah, et al., Impact of packet sampling on portscan detection, IEEE Journal on Selected Areas in Communication, vol. 24, no. 12, pp , [9] Jaeyeon Jung, Vern Paxson, Arthur W Berger, and Hari Balakrishnan, Fast Portscan Detection Using Sequential Hypothesis Testing, In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp , [10] Avinash Sridharan, Tao Ye, Supratik Bhattacharyya, Connectionless port scan detection on the backbone, Performance, Computing, and Communications Conference, pp , [11] Anukool Lakhina, Mark Crovella, Christophe Diot, Mining anomalies using traffic feature distributions, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp , [12] Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya, Profiling internet backbone traffic: Behavior models and applications, In ACM Sigcomm, vol. 35, no. 4, pp , [13] Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, et al., Impact of packet sampling on anomaly detection metrics, Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp , [14] George Androulidakis, Symeon Papavassiliou, Improving network anomaly detection via selective flow-based sampling Communications, IET, vol. 2, no. 3, pp , 2008.
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
A Method for Port Scanner Detection on a Mobile Network
A Method for Port Scanner Detection on a Mobile etwork Sekwon Kim, Joohyung Oh, Inho Kim, and Chaetae Im Korea Internet Security Center Korea Internet & Security Agency IT Venture Tower, Jungdaero 135,
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
Network reconnaissance and IDS
Network reconnaissance and IDS CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Let s play over the network Target
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
Protecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1
ASE 2014 ISBN: 978-1-62561-000-3 1 Network Traffic Analysis of ZeroAccess Bot Shree Garg, Anil K. Sarje, Sateesh K. Peddoju Department of Computer Science & Engineering Indian Institute of Technology Roorkee,
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Joint Entropy Analysis Model for DDoS Attack Detection
2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY
DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY Kamal Shah and Tanvi Kapdi Thakur College of Engineering and Technology, Mumbai University, Mumbai-400101, India ABSTRACT Network anomaly detection is
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis
Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
, pp.81-90 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.09 Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1, 2, Lei Yang 1 and Jin Wang 1 1 School of Computer
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Adaptability of IRC Botnet Detection Method to P2P Botnet Detection
Adaptability of IRC Botnet Detection Method to P2P Botnet Detection Ji, Yuan Department of Electrical Engineering and Computer Science University of California, Irvine [email protected] John, Robin Department
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
highly predictive blacklisting
J i a n Z h a n g, P h i l l i p P o r r a s, a n d Johannes Ullrich highly predictive blacklisting Jian Zhang is an assistant professor in the department of computer science at Louisiana State University.
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 571-578 (2005) Short Paper Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network Department of Computer Science and Information
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
P2P-BDS: Peer-2-Peer Botnet Detection System
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Flow-based Worm Detection using Correlated Honeypot Logs
Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
Accurate Anomaly Detection using Adaptive Monitoring and Fast Switching in SDN
I.J. Information Technology and Computer Science, 2015, 11, 34-42 Published Online October 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.11.05 Accurate Anomaly Detection using Adaptive
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION 1 OMAR E. ELEJLA, 2 AMAN B. JANTAN, 3 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 [email protected],
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
A Novel Method to Defense Against Web DDoS
A Novel Method to Defense Against Web DDoS 1 Yan Haitao, * 2 Wang Fengyu, 3 Cao ZhenZhong, 4 Lin Fengbo, 5 Chen Chuantong 1 First Author, 5 School of Computer Science and Technology, Shandong University,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
DDoS Attacks and Defenses Overview
DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Slow Port Scanning Detection
Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American
A COMBINED METHOD FOR DETECTING SPAM
International Journal of Computer Networks & Communications (IJCNC), Vol.1, No.2, July 29 A COMBINED METHOD FOR DETECTING SPAM MACHINES ON A TARGET NETWORK Tala Tafazzoli and Seyed Hadi Sadjadi,, Faculty
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Detection of Botnets Using Honeypots and P2P Botnets
Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks Jae-Hyun Jun School of Computer Science and Engineering Kyungpook National University [email protected] Cheol-Woong Ahn
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
