Mining Frequency Content of Network Traffic for Intrusion Detection

Size: px
Start display at page:

Download "Mining Frequency Content of Network Traffic for Intrusion Detection"

Transcription

1 Mining Frequency Content of Network Traffic for Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Computer Science, and National Center for Forensic Science University of Central Florida, Orlando, FL {mzhou, Abstract This paper presents a novel network intrusion detection method that searches for frequency patterns within the time series created by network traffic signals. The new strategy is aimed for, but not limited to, detecting DOS and Probe attacks. The detection method is based on the observation that such kind of attacks are most likely manipulated by scripted code, which often result in periodicity patterns in either packet streams or the connection arrivals. Thus, by applying Fourier analysis to the time series created by network traffic signals, we could identify whether periodicity patterns exist in the traffic. We demonstrate the effectiveness of this frequency-mining strategy based on the synthetic network intrusion data from the DARPA datasets. The experimental results indicated that the proposed intrusion detection strategy is effective in detecting anomalous traffic data from large-scale time series data that exhibit patterns over time. Our strategy does not depend on prior knowledge of attack signatures, thus it has the potential to supplement any signature-based intrusion detection systems (IDS) and firewalls. Keywords: Network intrusion detection, time series, Fourier transform 1. Introduction Network-based intrusion detection (NID) focuses on network traffic signals passing through the communication infrastructure in an attempt to stop the attacks before they infect the host systems. One approach to intrusion detection is to look for suspicious patterns in the network traffic signals. The network traffic, when recorded in terms of individual network packets, is a series of time-based events from which various time series can be extracted. Typically, a network packet consists of the header information and the packet payload. The packet header includes a rich amount of information including the arrival time, packet length, payload size, protocol, source and destination ports, flags, window size, etc. Based on the header information, various types of time series can be constructed, such as the following: The rate of packet arrivals (in a unit time) The inter-arrival time of the packets The size of the packet payloads The time interval of the initial TCP connection attempt. The number of the distinct IP addresses reached during a time period, etc. Many network attacks are executed by running prewritten scripts, which automate the processes of attempting connections to various ports, sending packets with fabricated payloads, etc. Based on this observation, our intrusion detection strategy looks for periodicity patterns within the above time series. The first four types of time series given above are particularly relevant to the DOS, probe, and password-guessing attacks. The last type may be used in detecting traffic patterns when a worm or virus is spreading itself from an infected computer to other computers. All five time series of traffic signals could exhibit certain frequency patterns over time that distinguish the attack traffic from the normal traffic. We adapted the Fourier analysis technique from signal processing to detect periodic frequency patterns for network intrusion detection. Our experimental results running synthetic network intrusion data from the DARPA datasets indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data from large-scale time series data that exhibit patterns over time. To reduce the processing time for large traffic datasets, Wavelet transform was applied for data dimensionality reduction, which is similar to that used in [1, 2]. The results of applying the Wavelet transform are not reported in this paper. The remainder of the paper is organized as follows. Section 2 describes how to use Fourier analysis to search for periodic frequency patterns. Section 3 describes the process of collecting and preprocessing the traffic data. Section 4 reports the experimental results evaluating the effectiveness of the detection strategy using the DARPA TCPDUMP datasets. Section 5 comments on related work and some issues that need further work. Finally, Section 6 concludes the paper. 2. Mining Periodic Frequency Patterns We adapted the techniques of signal processing and data mining on time-series data to designing intrusion detection

2 Traffic data Parsing the new Connection New connection history Variance analysis Average variance of packet size for each connection Generate the time - series data Ignore the trusty Connections Data sequences for each connection DFT Data sequences for all connections Compare with a threshold value Local Frequency pattern Global Frequency pattern Report attacks Figure 1. Strategy of mining periodic frequency patterns strategies. In our research, we focus on three types of time series derived from the network traffic. The first one is the time series on the rates of packet arrivals. The second is the time series of inter-arrival time of network packets. The last one is the time series of the packet payload size. Our observation is that network attacks generated by a bruteforce approach such as the DOS, probes, and password guessing, will create a large number of network packets by the scripted code, which often exhibit regular patterns in the traffic data. In addition, such attacks often use fabricated payloads of a constant size. By identifying these patterns our intrusion detection algorithm attempts to capture anomalous traffic behaviors without prior knowledge of the specific intrusion or attack signatures. Our intrusion strategy could be used in combination with other intrusion strategies. For instance, before applying our intrusion detection strategy we could use the technique introduced in [3] to differentiate the clean and dirty traffic so as to reduce the amount of suspicious traffic that need to be carefully examined by our IDS. The central idea of [3] is based on the observation that under normal situation a machine will make a rather low rate of outgoing connections to new or different machines. Instead, it is more likely to connect to the same IP regularly than to different IPs [4, 5], which is referred to as the locality property of machine interaction. Thus, a connection queue will be built for the protected computers to record all the coming connections, in which connections from familiar IPs would have a higher priority than the connections from the new Ips, and the connections with a higher priority will be passed to their destination without much delay. Our frequency-based detection strategy could be used to watch those unfamiliar connections. There are three major steps in our detection strategy as depicted in Figure 1. First, we construct the connection history for all those connections from the new IPs and record their traffic measures including: the packet size, the inter-arrival time between packets, and the rate of packet arrivals (per unit time) within or among the connections. Second, we apply the discrete Fourier transform (DFT) to the time series data and collect the resulting frequency information. Both the global frequency patterns for all connections in the connection history, and the local frequency patterns for individual connections, are computed using DFT. Finally, by identifying the sharp peaks in the spectrum of DFT results, the algorithm determines if periodic frequency patterns exist in the network traffic. Details of the algorithm are presented in the following subsections. 2.1 History of IP connections In our studies, a network connection includes all the network traffic (packets) sent between two connected IP addresses in a certain time period, which has the following properties: A pair of source and destination IP addresses A single protocol or a set of multiple protocols used at different times during the connection A set of consecutive packets within a connection which are not necessarily sent or received consecutively in terms of time by a machine For each protected computer, we use a firewall to control the connection queue. The firewall will pass connections from familiar IPs, and maintain the history of recent new connections, that is, connections from new IPs will be observed, and their frequency patterns will be computed and recorded. For each connection within a connection history, all of three types of time series mentioned earlier are generated. 2.2 Types of Frequency Patterns The generated time series essentially reflects the way by which packets are sent by the attacker, the packet delivery process would eventually fall into three categories. First, the packets are sent out very randomly, that is, the interarrival time between two consecutive packets would not conform to any repeated, periodic patterns. Second, the packets are sent out at a constant rate. Third, the packets are not sent out at a constant rate, but a periodic pattern exists in the inter-arrival time. We use a simple example to illustrate these three different patterns: Random Inter-arrival time sequence: Constant Inter-arrival time sequence: Periodic Inter-arrival time sequence:

3 Each number in the above sequence stands for an interarrival time between two consecutive packets. The case of a constant inter-arrival time would be easy to detect either by analyzing packet arrival rates or the inter-arrival time. When the inter-arrival time is not a constant but is periodic, the packet arrival rates will not necessarily produce periodic patterns since a time unit is an adjustable value depending on the duration of the connection and the sending speed of the traffic. However, applying the DFT to the series of inter-arrival time would be appropriate to capture the periodicity pattern. For the series with a random interarrival time, our intrusion detection strategy will fail. The traffic could be legitimate or could be from a manually operated attack. Another possibility is that the traffic flow is still an automated attack, but is created in a purely random manner. We had simulated the attacks using various DOS and probe tools downloaded from Internet. Some of them use a simple attack strategy, such as flooding a machine by sending packets at a rate based on a user-specified time. Some of them allow the user to specify the scan delay or the time range for a RTT timeout before processing the next packet, which creates a uniformly distributed packet stream. The periodic inter-arrival time patterns would appear in the more sophisticated attacks, which loop through the same random process. However, for attacks that generate the entire traffic stream from a long, single random process (i.e., no repeated use of the same random processes), detection by purely looking for periodic patterns would fail. Possible remedies are discussed in Section Frequency Extraction Fourier Transform is a well-known technique used in signal processing [6]. The Discrete Fourier Transform (DFT) takes the original time series in the time domain, and transforms them into the associated frequency data in the frequency domain. For a given data sequence s(n) where n 0 is a discrete value representing the time, the DFT coefficients F(k) are defined as follows: F( k) = N 1 n= 0 s( n) e j2πkn / N where 0 k N 1, and N is the length of the sequence s(n). Expanding the right-hand side yields N 1 F( k) = s( n) cos(2π kn / N) j s( n)sin(2πkn / N) n= 0 N 1 n= 0 Using the Fast Fourier Transformation (FFT) procedure, the frequency coefficients F(k), 0 k N 1, can be computed in O(N logn) time. 2.4 Global Frequency vs. Local Frequency As mentioned in Figure 1, we create local time series for each separate connection as well as the time series for the multiple connections. Both the local frequency patterns within each single new connection and the global frequency patterns over multiple connections in the connection history list are analyzed. The local frequency patterns can be used in detecting attacks originated from a single source IP targeting a single victim IP. However, when an attack sends packets using multiple spoofed IPs as their source addresses, attempting to evade the intrusion detection systems, we will see many incoming connections to the target, but in fact, the attack traffic is not independent and is possibly originated from one source computer, and we shall search for frequency patterns from arrivals of those connections. On the other hand, the reverse of the above phenomenon is also possible. When a single attacker sends out packets to exploit a group of machines, each victim only receives a part of the exploit traffic. For this situation, the firewalls installed on the gateways for the victim LAN will record all the exploit traffic heading to different victim IPs. Both of these two cases will need the global frequency analysis to detect the one to many or many to one attacks. In reality, when connections are established between different pairs of computers, the connection traffic from one connection is statistically uncorrelated to the connection traffic from the others, so there should be no frequency patterns across the different connections. Therefore, the local frequency patterns are mainly used to identify the uncoordinated attacks occurring in the different connections. 3. Preparing Input Data We have two sources for the network traffic data, one comes from the DARPA TCPDUMP files, which contain intrusion traffic simulating various network attacks [7], the second data source is the synthetic data captured by the network sniffer tool Ethereal [8], which was installed on our local networks that captured both the intrusion traffic and normal traffic. We used the network exploration and auditing tool NMAP [9] to generate the intrusion traffic. For both the TCPDUMP files and Ethereal files, we used our own pre-processing tools to extract the traffic information. After parsing the TCPDUMP files and Ethereal files, we have the information on data packet headers, the flag information, the time distribution, etc. The traffic datasets from the DARPA Lab normally collect a whole day s traffic with a file size of around 500 mega-bytes. To process the traffic file and generate the time series, we chose a sliding window of 20-minute span to slice each dataset into small pieces, with an overlap of three minutes between two consecutive windows. At the end of data parsing and extraction, the time-series data generated within a sliding window would include the following items: (1) Global data sequence of packet arrival rates. (2) Global data sequence of packet inter-arrival time (3) Global data sequence of packet size (4) Local data sequence of packet arrival rates for each connection. (5) Local data sequence of inter-arrival time for each connection. (6) Local data sequence of packet size for each connection. 4. Experimental Studies We report the results on using the DARPA datasets, which are supposed to simulate the attacks across the Internet. In the following we describe the experimental results for three different attacks from the DARPA 1999 week 5 and 4 datasets (abbreviated as L1999w4&w5).. The three

4 Connection 0 Connection 1 Connection 2 Connection 3 Connection 4 Connection 5 (a) (b) Figure 3: (a) Local frequency patterns on inter-arrival-time for the first 9 connections in the portsweep attack. (b) The global frequency pattern on inter-arrival time of the portsweep attack, which includes 18 connections. Figure 2: Frequency patterns on inter-arrival time for each connection in the ProccessTable attack. attacks are ProcessTable, Portsweep, and Dictionary attack. The first one is a DOS attack; the other two belong to Probe and remote-to-root attacks, respectively. A detailed description of the attacks could be found in [10]. 4.1 The ProcessTable Attack The ProcessTable attack is a TCP connection based attack, which may attack various network services by launching a huge number of TCP/IP connections to a particular port in a short period. For each incoming TCP/IP connection, the underlying Unix system allocates a new process to handle it. Therefore, it is possible to completely fill a target machine's process table with a large number of network service instantiations, eventually rendering the system lifeless until the attack terminates or is killed by the system administrator [10]. In our studies, we used the DARPA TCPDUMP file that contains the ProcessTable attack packets, which contains slightly less than 2 minutes of data with a total of 5526 data packets. Our intrusion detection (frequency mining) algorithm constructs the connection history table for the target computer zeno.eyrie.af.mil. The record of each connection includes all the statistical features of the connection, and the IP address that identifies the connection. The DFT is then applied to two time series created: the packet arrival rates series and the inter-arrival time series. The variance of the packet size is calculated. Based on the output from DFT coefficients, the frequency patterns of each connection are plotted in Figure 2. There are a total of 12 connections in the connection history table. Five of them have less than 20 packets. We plot the frequency information on six connections that are long enough to bear meaningful DFT analysis. From Figure 2 we could see that the patterns for connections 0 and 1 show distinct frequency peaks, whereas the rest of them do not. In fact, the first connection is the processtable attack that we were expected to find, and as a byproduct, we also detected a Probe attack in connection 1, which probes the ports ranging from 1794 to The attacker s IP address was identified as hobbes.eyrie.af.mil ( ). 4.2 The Portsweep Attack and Dictionary Attack Connection 0 Connection 1 Connection 2 Connection 3 Connection 4 Connection 5 Figure 4: Frequency patterns on inter-arrival time for each connection in the Dictionary attack. The source data for Portsweep traffic is from the Tuesday data of L1999w5 outside data. The attacker sends a small number of packets to each of 38 different destinations. The local frequency patterns for each separate connection didn t reveal much information as depicted in Figure 3 (a). Since the attacking process to each target lasts a very short time (about 3 seconds) and used very few packets (around 10 packets), there is no obvious peak in the local frequency patterns (except for that all the local frequency patterns are very similar to each other). However, the global frequency pattern for all connections originated from the same IP (attacker) shows an obvious sharp peak depicted in Figure 3(b). All the variances of the packet size for each separate connection are zero except for the connection with , which has a variance of We identified the IP address as a suspicious attacker. In addition to the DOS and Probe attacks, other types of attack such as the Dictionary attack, which belongs to the type of remote-to-root attack, also falls into the scripted attack category. Figure 4 is the frequency pattern for the dictionary attack, data originally from Monday of L1999w5 TCPDUMP data. There are a total of 11 connections to the victim. We give our experimental result on their frequencies in Figure 4. There is an obvious frequency pattern for connection 1. The variance of the packet size is , the sending speed is very high, 5265 packets sent out in seconds. We confirmed that this connection is for a password guessing attack, which tried different username/password combinations to the telnet service.

5 Attack Name Type Manual Attack Duration Total Time Frequency found? /Auto (DFT) pingofdeath DOS Man 0:00: Y packets/unit time Dosnuke DOS Auto 0:16: Y inter-arrival time Apach2 DOS Man 0:11: Y packets/unit time Syslogd DOS Auto 0:15: N didn t find apparent frequency pattern Neptune DOS Auto 0:06: Y inter-arrival time Crashiis DOS Auto 0:00: N totally only two connections to victim: , and each connection has only 7 and 5 packets Selfping DOS Auto 0:03: Y packets/unit time ProcessTable DOS Auto 0:02: Y inter-arrival time Sshprocess Table DOS Auto 0:00:8-0:00: Y inter-arrival time & packets/unit time Back DOS Auto 0:05:00-0:20: Y packets/unit time Udpstorm DOS Auto 0:15: N didn t find apparent frequency pattern mailbomb DOS Auto 0:04: Y packets/unit time Dict RLA Auto 0:00:10-0:08: Y inter-arrival time Guesstelnet RLA auto 0:03: Y inter-arrival time & packets/unit time Ipsweep Probes auto 0:00:01* N single packet sent to each IP from different sources IP Portsweep Probes auto 0:04: Y inter-arrival time & packets/unit time queso Probes auto 0:00:01* Y inter-arrival time (a large time gap exists in the middle of the attack though) tcpreset Probes auto 0:10: Y packets/unit time nmap Probes auto 0.04: Y packets/unit time & inter-arrival time teardrop Probes auto 0:15: Y packets/unit time & inter-arrival time satan Probes auto 0:02: Y packets/unit time ntinfoscan Probes auto 0:16: N didn t find apparent frequency pattern Table 2: DOS and Probe Attacks in Lincoln Lab IDS evaluation data, 1999 weeks 4 and Experimental Results of DOS and Probe Attacks in 1999 DARPA Data We attempted a thorough study of the DOS and Probe attacks from the L1999w5&w4 datasets. Since our frequency-based approach is sensitive to the attack duration and whether an attack is automated, we are not reporting those that are either manual attacks or have very short attack time. Table 2 lists all the attacks we considered, which include eight probes, eleven DOS attacks, and two Remoteto-Local Attacks. The unit time used in the frequency analysis is defined as: µ = 0.1 ( T / n), where T is the duration of a connection or multiple connections depending on whether it is a local frequency or global frequency, and n is the number of packets. Out of 22 attacks, our detection algorithm failed on five attacks: Ipsweep, crashii, syslogd, udpstorm and ntinfoscan. The data sources for the first three attacks are from Monday, L1999w5 data; ntinfoscan is from Thursday, L1999w5 data. Among them, Ipsweep is conducted by sending a single packet to each target IP from different source IP, which is contrary to what we expect that the attack is originated from the same IP; The crashii attack sent only seven and five packets to the victim IPs in two separated connections, which are not long enough to bear frequency analysis. Syslogd, ntinfocan and Udpstorm are three automated attacks with long attack durations, but we couldn t identify any frequency patterns in the traffic data. We were also able to detect certain DOS attacks even though they are manual attacks. The ping of death and apache2 attacks are from the Monday of week five dataset, which was labeled as manual attack. The apache2 attack created a huge amount of traffic: packets are sent in seconds; the Ping of death attack sent out 91 packets in seconds. They both showed frequency patterns in local connections. A possible explanation for this is that the traffic sent out in the attacks is mostly processed automatically without much human interaction involved. For all these attacks, our detection strategy does not need any prior knowledge of the attack signatures, and the false alarm rate is fairly low. In practice, periodic but legitimate traffic flow does exist commonly in the real world. For example, network traffic sent by a router, which broadcasts periodically to the lists of its subnet machines to look for the shortest routing path, shows frequency patterns. (Details of Internet routing protocols can be found in [11].) The DNS service sometimes creates traffic with frequency patterns. The traffic under the Network Time Protocol for time synchronization certainly creates periodic patterns as well. For most of these legitimate periodic traffic flows, both the sender and receiver belong to the insiders of the LAN, and the traffic occurs routinely. Thus, the generated traffic should be filtered out as from trusted IPs due to the locality strategy mentioned in Section 2, and immune from the false alarms under our detection algorithms. However, it would be a tricky problem for intrusion detection when these trusted machines have been compromised and are attempting to infect the others. 5. Discussions and Related Work Developing countermeasures for random exploration is crucial to our work. To begin with, we will study in detail the TCP protocol effects on the traffic time series pattern. We concentrate on TCP instead of other protocols because TCP provides connection-oriented stream services, and because its popularity in the Internet. The TCP traffic flows are initialized by a three-way handshake protocol [12]. After a connection is established, the interactive bulk data flow is controlled by the sliding window protocol. Therefore, the TCP-based attacks which exploit the establish-

6 ment/termination of a TCP flow, and those attacks that exploit the bulk data flow, will have different traffic characteristics. As a simple example, a TCP SYN attack would not be affected by a victim s response time, all the attacker needs to do is to send a SYN/FIN packet and, without waiting for any feedback, the next SYN packet could be sent immediately to the target. The traffic-timing patterns at the receiver end should match closely to the timing patterns of how the attack tools generate the traffic. However, for a Back attack which sends many HTTP requests with a URL containing many slashes, the packet s arrival process is also affected by the sliding window protocol. Since the sender machine has to wait for the acknowledgement on the last group of packets before it could process the next packet, the traffic flow is closely related to the Round Trip Time (RTT) [13]. For the first type of the attacks, when the random exploit is used as mentioned in section 2.2, a possible solution is to study the timing characteristics of legitimate TCP connections, e.g., the inter-arrivals times of TCP connections are distributed approximately Weibull [14,15]. The manipulated random arrivals are expected to deviate from the Weibull distribution or exponential distribution. For the second type of attack, applying the power spectral density of the traffic signal within a TCP connection would be appropriate to differentiate the normal traffic from the one mixed with attack [13]. Both of these two approaches, nevertheless, require an analysis of the traffic that lasts a relatively long duration. 6. Conclusions and Future Work In this paper, we proposed a time-series frequency mining technique for detecting automated, scripted network attacks, which typically exhibit frequency patterns over time. The technique is based on the sound theory of Fourier analysis from signal processing research. We used the DARPA datasets in our simulation studies; the experimental results demonstrated that the frequency-based intrusion detection algorithm is effective in, but not limited to, detecting the DOS and probe attacks that typically run from pre-written scripts and have relatively long duration. Some limitations of our frequency-based intrusion detection approach include its sensitivity to the attack s duration and the degree to which the attack is automated. Also, the computation time of the algorithm may place a high demand on the detection hardware. We are yet to apply the frequency mining technique to live network traffic signals in real time. Another piece of future work is to integrate our intrusion detection (frequency mining) strategy into a firewall device and evaluate its effectiveness against other strategies that are based on network traffic s temporal properties in real network environments. References [1] R. Agrawal, C. Faloutsos, A. Swami, Efficient Similarity search in sequence databases, Proceedings of the 4 th Conference on Foundations of Data Organization and algorithms, [2] E. Keogh, K. Chakrabarti, M. Pazzani, S.Mehrotra, Dimentionality Reduction for Fast Similarity Search in large Time Series Databases, Journal of Knowledge and Information Systems, [3] M. Williamson, Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code, Proceedings of 18th Annual Computer Security Applications Conference, [4] L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, A Network Security Monitor, Proceedings of IEEE Symposium on Security and Privacy, [5] S. Hofmeyr, A Immunological Model of Distributed Detection and its Application to Computer Security, Ph.D. thesis, Department of Computer Science, University of New Mexico, Apr [6] E. Brigham,. The Fast Fourier Transform, Prentice- Hall, [7] DARPA Intrusion Detection Evaluation project, at _data_index.html. [8] G. Combs, Ethereal Network Protocol Analyzer, [9] NMAP, at [10] K. Kendall, A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master's Thesis, Massachusetts Institute of Technology, [11] J. Slone, editor, Handbook of Local Area Networks, CRC Press LLC, [12] W.R. Stevens, TCP/IP illustrated, volume I, Addison- Wesley press, [13] C. Cheng, H. Kung, K. Tan, Use of Spectral Analysis in Defense Against DOS Attacks, Proceedings of IEEE GLOBECOM [14] A. Feldmann, Characteristics of TCP Connection Arrivals, Technical Report, AT&T, [15] W. S. Cleveland, D. Lin, D. Sun, IP Packet Generation: Statistical Models for TCP Start Times Based on Connection-Rate Superposition, Proceedings of SIGMETRICS 2000.

A Frequency-Based Approach to Intrusion Detection

A Frequency-Based Approach to Intrusion Detection A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Flow-based detection of RDP brute-force attacks

Flow-based detection of RDP brute-force attacks Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Usefulness of DARPA Dataset for Intrusion Detection System Evaluation

Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Ciza Thomas Vishwas Sharma N. Balakrishnan Indian Institute of Science, Bangalore, India ABSTRACT The MIT Lincoln Laboratory IDS evaluation

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Network Traffic Anomaly Detection Based on Packet Bytes

Network Traffic Anomaly Detection Based on Packet Bytes Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology, Melbourne, Florida [email protected] ABSTRACT Hostile network traffic is often "different"

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION

ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]

More information

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks, What They are and How to Combat Them Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they

More information

Implementing a Robust Network-Based Intrusion Detection System

Implementing a Robust Network-Based Intrusion Detection System The International Journal Of Engineering And Science (IJES) Volume 3 Issue 10 Pages 01-09 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 Implementing a Robust Network-Based Intrusion Detection System 1 Ogheneovo,

More information

Security: Attack and Defense

Security: Attack and Defense Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

Chapter 8 Network Security

Chapter 8 Network Security [Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

Network Security in Practice

Network Security in Practice Network Security in Practice Practices of Network Security ccess control: firewalls ttacks and counter measures Security protocol case studies Kai Shen 12/8/2014 CSC 257/457 - Fall 2014 1 12/8/2014 CSC

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Attack Lab: Attacks on TCP/IP Protocols

Attack Lab: Attacks on TCP/IP Protocols Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Network Incident Report

Network Incident Report To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright

More information

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS) Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS) Internet (In)Security Exposed Prof. Dr. Bernhard Plattner With some contributions by Stephan Neuhaus Thanks to Thomas Dübendorfer, Stefan

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

Chapter 28 Denial of Service (DoS) Attack Prevention

Chapter 28 Denial of Service (DoS) Attack Prevention Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by

More information

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24 Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key

More information

A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic

A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic John Week University of Nevada, Reno United States Email:[email protected] Phone: (775) 741-1555 Polina Ivanova University of Nevada,

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

How To Protect Your Network From Attack From A Hacker On A University Server

How To Protect Your Network From Attack From A Hacker On A University Server Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Network Bandwidth Denial of Service (DoS)

Network Bandwidth Denial of Service (DoS) Network Bandwidth Denial of Service (DoS) Angelos D. Keromytis Department of Computer Science Columbia University Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

Network Monitoring Tool to Identify Malware Infected Computers

Network Monitoring Tool to Identify Malware Infected Computers Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information