Network Forensics: Detection and Analysis of Stealth Port Scanning Attack
|
|
|
- Kerrie Wheeler
- 10 years ago
- Views:
Transcription
1 International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, Available online at: E-ISSN (Online) / ISSN (Print) Network Forensics: Detection and Analysis of Stealth Port Scanning Attack Rajni Ranjan Singh 1 and Deepak Singh Tomar 2 1, 2 Maulana Azad National Institute of Technology, Bhopal, India 1 [email protected], 2 [email protected] ABSTRACT Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a targeted cyber-attack. Moreover in recent times, port scanning techniques become highly distributed, composite, hybrid, and stealthy, therefore almost all current detection techniques are unfeasible. Stealth is considered to be a type of port scan which is undetected by available auditing tools such as firewall, routes, filters etc. A stealth port scan method does not produce any TCP sessions; hence, none of these scans should appear in any of the application logs. Therefore, it is of vital importance to research and adopt methods for the detection and attribution of stealth port scanning attack. In this work a network forensic architecture for detection and analysis of stealth port Scanning attack is proposed. It consist of two main modules, a capturing module that captures fine grained evidences from the network traffic and an analysis module that classifies each packet based on the predefined signature. A proof of concept prototype is implemented which utilize, operational network traffic data injected with crafted scans to test the system. It is reported that the proposed system correctly identifies crafted scans injected into real traffic. Keywords: Network forensic, Network Scanning, Port scan, NIDS, Snort. 1 INTRODUCTION Port scanning is a growing network security concern due to the fact that it is the primary stage of an intrusion attempt that enables the attacker to remotely locate, target and subsequent exploit vulnerable systems. It is observed that 50% of attacks against cyber systems are preceded by some form of network scanning activity [1]. Hence the capability to detect and attribute various scanning activity is a very important task to achieve as this will prevent the actual cyber-attack from occurring. Network forensics is the field of applying forensic science to the computer networks in order to discover the source of network crimes. The objective of network forensic is to identify malicious activities from the traffic logs, discover their details, and to assess the damage. [2] Garfinkel et.al [3] categorize the network forensic systems into two types, based on their collection characteristics: Catch-it-as-you-can Systems where all the packets passing through a specific traffic point are captured and analysis is subsequently. This system requires large amounts of storage. Stop-look- and listen Systems where each packet is analyzed in memory and certain information is saved for future analysis. This system requires faster processor. Network forensic investigation of port scanning attack is more challenging because of following reasons. a) Port scan attack traffic is seems to be very much similar to the conventional network traffic. Thus bifurcation between attack and traditional traffic can be a difficult task.
2 34 b) Port scan can be slow (one packet/hour or packet/day) therefore storage capability is another factor in collecting large amounts of live network evidence. High-speed networks (Gigabit Ethernet, SONET speeds and higher, etc.) cannot realistically be captured in their entirety beyond a certain length of time. c) Port scanning is a precursor of attack so it is needed to discover it as early as possible in order to block actual attack from occurring thus fast analysis system is required. d) Some form of port scanning attack (Stealth) is unobserved by conventional networking devices like router, firewall etc thus it s needed to put specialized devices for traffic collection task. 2 PORT SCANNING Port scanning is a technique utilizes by Intruders and network administrators to gather information from computers connected to a network. Network administrators utilize port scans to recognize open ports of a system so that they may be able to limit access to those ports, or shut them off completely. Intruders use port scanning in the same way that administrators do, but with malicious intention. Port scanning is classified in three categories based on the different types of packets used for scanning [4, 8]. a. Full open: This type of scan method utilizes connect () call functionality for initiating a full connection to a remote host using a typical three-way TCP/IP handshake. Its limitation is that all the scanning attempts are logged by the destination application. It is easily detected when connection logs are examined. b. Half-open scanning: The term 'half-open' applies to the way the client terminates the connection before the three-way handshake is completed. As such, these scan methods often go unlogged by the destination application. Since the half open scan techniques uses known TCP flags, it can be detected by an edge firewall rather easily. c. Stealth scanning: Stealth is considered to be any scan that bypassing filters, firewalls, routers and appearing as casual network traffic. Most common stealth scan is conducted by setting individual flags (ACK, FIN, RST) or NULL/ All flags of packets. Stealth scanning techniques are discussed here. (1) SYN/ACK Scan: It is relatively fast scan method that avoids the use of three way handshake. In this scan type source sends a SYN with ACK flag to the target. For a closed port, the target will replay with a RST packet (A TCP packet with reset flag set) while a request to an open port will not generate a response. This scan technique generate notable amount of false positives due to the filtering devices, heavy traffic, slow link, and timeouts etc. Fig. 1. SYN/ACK Scanning Packet Exchange (2) XMUS, NULL AND FIN Scan: These three port scanning techniques are grouped together because their individual functionality is very similar. They send a single frame to a TCP port without any TCP handshaking or any additional packet transfers. As per the RFC 793[9] if a packet is sent to the open ports without the SYN, ACK and RST bits set (Any combination of the other three FIN, PSH, and URG are OK) than receiver drops the packet and no response returned. If the destination port is closed then RST is returned. Details of individual scan are given in this section.
3 35 XMAS Scan - XMAS scans send a packet with the FIN, URG, and PSH flags set. If the port is open, there is no response returned but if the port is closed, the target responds with a RST packet. Note that, the Xmas Tree scan takes its name from the flags allied to ( ), which become visible similar to the lights of a Christmas tree. FIN Scan - A FIN scan is similar to an XMAS scan but sends a packet with just the FIN flag set (remaining URG and PUH bit are not set). FIN scans receive the same response and have the same characteristics as XMAS scans. NULL Scan - A NULL scan is also alike to XMAS and FIN in its limitations and response, but it just sends a packet with no flags set. The main strength of these scan types is that they can pass through certain non-stateful firewalls and packet filtering routers and does work against most Unix-based systems. For identifying a closed port, only two packets are transferred. On the other hand, just a single packet is required to identify an open port. It does not produce any TCP sessions; hence, none of these scans should appear in any of the application logs. However, these scan are not able to differential between open and closed port for Microsoft machines. On the other hand by using these scans, if an open port found indicates that the target machine is not from Microsoft OS family. (a) (c) Fig. 2. FIN (a), XMUS (b) and NULL (c) Scan Packet Exchange. (3) ACK Scan: ACK scan is intended to identify ports that are filtered through firewall. It can never identify open ports. An ACK scan operates by sending a TCP ACK frame to a remote port. If there are no responses or an ICMP destination unreachable message is returned, then the port is considered to be filtered. If the remote port returns a RST packet, the remote target is categorized as unfiltered. Some tcp stacks returned windows size when responding to an ACK packet. if destination port is closed then returned window size become non zero and in the case of open port the window size become zero. However window size not returned by all devices. (4) TCP Fragmenting Scan: it is designed to evade packet filters. This scan types may apply any of the over mentioned techniques the only difference is that while sending a probe packet it first decomposes into many fragments. This technique is effective since packet filters or intrusion detection systems do not buffer the entire set of packets due to performance issues. 3 PROPOSED NETWORK FORENSIC SYSTEM ARCHITECTURE (b) The proposed system architecture is the generalized architecture, which is extended to detect and analyze stealth port scanning attack. The system is developed to capture network traffic from network interface of acquisition system. Each captured packet first examined by the marking module, which marks it as relevant or irrelevant based on the flag values in the packet. Only the packet marks as relevant goes to the analysis module.
4 36 acquisition time window. It provides more complete data collection, reduces error and increase readability. After collection both parties show identical set of captured network traffic this corroboration shows independent verification of evidence collection. This module is further divided into three sub modules: capturing, Marking and storing. A. Capturing: Fig. 3. Network Forensic System Architecture Analysis module is responsible for identifying scanning attack patterns. If pattern found then source IP address is classified as suspicious and as normal otherwise and finally produce valuable information of all identified scanning attempts. The work carried out in this paper mainly focused on the detection and analysis of XMUS, NULL and FIN scanning attack. These scans are the most commonly used stealth port scanning methods. The Architecture is broadly developed into three modules: capturing module, analysis module, and presentation module. Modules description and implementation details are described in the following sections. Packet capturing is the act of collecting data as it travels over a network. Every time a network card collects an Ethernet frame it verifies that its destination MAC address matches its own. If it does, it generates an inter rupt request. The card driver routine is responsible for handling the interrupt. The driver timestamps received data and cop ies it from the card buffer to kernel space memory. Then, it decides which type of packet has been received looking at the ether type field of the Ethernet header and passes it to the appropriate protocol handler in the protocol stack. When sniffer is utilized for packet capturing, the card driver also sends a copy of any received or transmitted packet to the packet filter. 3.1 Capturing module This module insure that only the actual packets utilized for port scanning attack are stored.this results is less amount of storage required as compared to the normal process which captures all the packets passing through network interface and stores them on to the system. Acquisition system should be deployed at the minimum distance position between source and destination in order to reduce error rate. Increasing distance may affect overall network latency, causing timeouts, signal strengths and errors. Distance affects the completeness of data collection. Therefore it is effective to deploy acquisition system at the edge of the network, rather than deploying after switches or with in particular subnet. It is better to deploy two independent instances of capturing system for collecting evidences from the same live network source during the same Fig. 4. Packet Capturing Process Open source sniffer software s is explored here for the capturing of network packets. 1) Marking: This module is to marks the incoming packets as relevant or irrelevant for further analysis. As over mentioned that if a incoming TCP packet without the SYN, ACK and RST bits set are the prima facie
5 37 evidence for FIN, XMUS, NULL scan, therefore mark these packets as relevant. The steps are listed as follows. 1) If the protocol used in the packet is not TCP then mark the packet as irrelevant and break, else go to step 2. 2) If any of the flag SYN, RST or ACK is set then mark the packet as irrelevant and break, else go to step3. 3) Mark the packet as relevant. 4) Repeat the steps for each captured packet. Pseudo code for capturing process is shown in the Figure 5. Relevent_Packet_Vector is a data repository that stores relevant packets Variables used: # Packet i (flag): return the flag value # Packet i (Pro): return the protocol Input: Incoming packets Output: Relevent_Packet _Vector Initialize: Relevent_Packet _Vector [p 1,p 2 p n] -> [0, 0.0]; 2. Process incoming packet 3. if (Packet i (Pro)= =TCP) then go to step 4 else go to step2. 4. if (Packet i (flag) ==SYN OR ACK OR RST ) then go to step 2 else go to step 5 5. Relevent_Packet _Vector. ->Packet i/* Add packet to vector*/ go to step 2. Fig. 5. Pseudo code for packet capturing process C. Storing: The task of this module is to store the relevant packet into the local hard disk of the acquisition system. A MD5 hash of all the captured data is computed. It gives assurance that digital evidence has not been altered since it was obtained. Secondary copy of the captured data is supplied to the analysis module and the original collected network traffic is preserved on the write once, read only device. 3.2 Analysis Module The captured packets are classified based on the proposed signature of XMUS, NULL and FIN scanning attack and if found than packet is assigned to the respective data repositories. Data repository named, XMUS_Scanning_Vector, FIN_Scanning_Vector and NULL_Scanning_Vector are developed to store classified packets of each scanning variants. The steps are listed as follows. 1) If no flags are set in the packet then assign it to NULL_Scanning_Vector and break, else go to step 2 2) If all URG, FIN and PSH flags are set then assign it to the XMUS_Scanning_Vector, else go to step 3. 3) If FIN flag is set and URG and/or PSH flag are not set then store it to the FIN_Scanning_Vector. 4) Repeat the above steps for each packet of Relevent_Packet_Vector Pseudo code for packet analysis is given in Figure 6. Input. Relevent_Packet _Vector Output:. XMUS_Scanning_Vector, FIN_Scanning_Vector and NULL_Scanning_Vector 1. Initialize: XMUS_Scanning_Vector [p 1,p 2 p n ] - > [0, 0.0]; FIN_Scanning_Vector [p 1,p 2 p n ] - > [0, 0.0]; NULL_Scanning_Vector [p 1,p 2 p n ] - > [0, 0.0]; 2. Process incoming packets in sequence i= 1, 2, 3 N, until all packet processed. 3. if (Packet i (flag) = =NULL ) then go to step 4 else go to step 5 4. NULL_Scanning_Vector->Packet i /* Add packet to vector*/ 5. if ( Packet i (flag) = =FIN && URG && PUSH ) then go to step 6 else go to step 7 6. XMUS_Scanning_Vector -> packet i /* Add packet to vector*/ 7. if ( (Packet i (flag) = =FIN ) && (Packet i (flag)!=urg OR PUSH) then go to step 8 else go to step 2 8. FIN_Scanning_Vector -> Packet i /* Add packet to vector*/ go to step 2. Fig. 6. Pseudo code for traffic analysis The overall classification process of network packets is shown in the figure 7.
6 38 Fig. 8. Snort Detection Engine in NIDS mode Fig. 7. A flow chart of packet analysis process 6 PRESENTATION MODULE Packets stored in the repositories are updated to the database. Here fast query-driven validation is performed to identify whether the port scanning attack is carried out. Identified machines are marked as suspicious and as normal otherwise. 7 IMPLEMENTATION SNORT is configured to implement the network forensic system. It is a free and open source network IDS, capable to perform real-time traffic examination and packet logging on Internet Protocol networks [10]. Snort can be configuring in three main modes: sniffer, packet logger, and network intrusion detection system (NIDS). NIDS mode is configurable, allowing Snort to look at network traffic for matches against a user defined rule set shown in the figure 6. Packet capturing and marking performed by the snort IDS, which is configured in NIDS mode (option c is utilize to activate NIDS mode). The marking process is carried out by the rule 1(shown in the figure 8). It is develop and configure to capture TCP packets, sent from any source and destined to any destination, without SYN, RST and ACK flags set. Rule 1 alert tcp any any <> any any(flags:!sra;sid: ;) Rule 2 alert tcp any any <> any any (msg:"null Scanning Detected";flags:0;sid: ;) Rule 3 alert tcp any any <> any any (msg:"xmus Scanning Detected";flags:FPU;sid: ;) Rule 4 alert tcp any any <> any any(flags:*fpu;sid: ;) Rule 5 alert tcp any any <> any any (msg:"fin Scanning Detected";flags:!PU;sid: ;) Fig. 9. Snort Configured rule set
7 39 Each captured packet is compared against configured rule and if match found then packet is stored into the destination log folder of local hard drive and an alert entry is made into the alert file. A snort alert (in fast alert mode) has following structure. <Timestamp><Alert message (configurable through rules)><source and destination IP addresses> <Source and destination ports> Example: 11/27-11:50: [**] [1: :0] Scanning Detected [**] [Priority: 0] {TCP} : > :3306 Tcpdump file built during capturing process is supplied to the analysis module for identifying scanning packets. Here an offline analysis implementation is presented using Snort IDS. Snort < r> option is applied to capture the traffic from tcpdump file. Rule 2 and 3 (shown in the figure 7) is develop and configured to filter NULL and XMUS scan packets respectively. Rule shows that, the TCP packet from any source to any destination with no flag set or FIN, PUSH and URG flag is captured. To identify Fin scanning packets, rule 4 and 5 has been applied. At first level rule 4 is applied to capture the packets having any of the FIN, PUSH, and URG flag set. Captured packets again processed by the snort using rule 5. It captures packets having FIN flag set. Alert files created during analysis have been integrated, normalized and updated to the database for fast query based result analysis. MYSql [11] data repository has been utilized for high performance query driven result visualization. Fig. 9. Data Flow Diagram of Network Forensic system
8 40 8 EXPERIMENT AND RESULT Proposed architecture has been implemented and tested on a small local area network. A test bed is built comprised of a victim machine. A switch (layer 2) and three other machines are scanners as shown in figure 10. Scanners 1, 2 and 3 are equipped with nmap [12] performing FIN, XMUS and NULL scanning targeted to the victim machine. Table 1 shows the configuration summary of all the machines involves in the test bed. In order to capture scanning traffic and performing relevant packet capturing an intrusion detection system, snort has been installed on victim machine. Scanner 1, 2 & 3 performing port scanning simultaneously to the victim machine (in the presence of normal network traffic). A relevant packet capture run using the snort IDS and A significant reduction in log file is observed. Snort processed 15669(10.2 MB) and selects 50 (3.73 KB) packets and the improved decrement in the log size using relevant packet capture is about 99% of total traffic size. It is observed that, out of packets 50 is marked as relevant packets. Machines which are responsible for scanning attempt are marked as suspicious scanner machines. Detection ability is 100%, due to the fact that the TCP packet without the SYN, ACK and RST bits set (Any combination of the other three FIN, PSH, and URG are OK) never appear in the normal TCP operation. Fig. 10. Test bed Topology Table 1: Test-bed machines configuration summary Machine Name and Operating system, Applications Application Configuration/ IP Address Hardware configuration Command Victim machine Ubuntu LTS. Intel dual core 2.50 GHz 1GB RAM Snort NIDS mode with Fast alert Snort rules: Protocol: TCP Rule Option: flags-!sra Scanner Scanner Scanner Microsoft Win. 7 professional Intel dual 2 Duo 2.40 GHz 1 GB RAM nmap 6.47( an windows version of Nmap) Nmap sf p 20,21,22,23,25,53,67,68,69, Nmap sx P 22,25,67,68,69,80,514,1812,2049, Nmap sfn 20,21,23,53,
9 41 Table 2: Identified and Scrutinize Suspicious Activity Suspicious IP address Port Observed Date Start Time End Time Scanning Variant ,21,22,23,25,53,67, 68,69, ,25,67,68,69,80,514,1812,2049, /11/ :50:58 11:51:08 FIN 27/11/ :50:54 11:50:58 XMUS ,21,23,53,443 27/11/ :50:55 11:51:00 NULL Fig. 11. Snort Packet processing Summary 9 CONCLUSION In this work investigation of stealth port scanning attack is carried out on the basis of forensic principles. Proposed work presented a storage efficient capturing system that captures relevant packets and an analysis system that perform precise classification of suspicious packets. Snort rules are developed for the capturing and analysis of network traffic. Experiment shows that, due to relevant packet capturing less than 1% of traffic data is logged and analysis performs 100% detection of suspicious packets. This work extended in the future by including the detection and analysis of highly distributed, composite and hybrid, stealth port scanning techniques. 7 REFERENCES [1] S. Panjwani, S. Tan, K.M. Jarrin, and M. Cukier. An experimental evaluation to determine if port scans are precursors to an attack. In Proc. Int. Conf. Dependable Systems and Networks, DSN 2005., pages , june-1 july [2] R. Chandran, and S. Pakala, Know Your Enemy: Learning about Security Threats, Addison Wesley, ISBN-10: , [3] Simson Garfinkel, Network Forensics: Tapping the Internet, ork/2002/04/26/nettap.html. [4] Manowar H Bhuyan, D K Bhattacharyya and J K Kalita, Surveying port scans and their Detection methodologies The Computer Journal (2011) 54 (10): Pages April 20, 2011.
10 42 [5] Whitepaper by Examining port [6] scan methods - Analyzing Audible Techniques Published on 16 Oct / Last Updated on 23 Jan. 2013, misc/examining_port_scan_methods Analyzi ng_audible_techniques_.html. [7] Brenden Claypool, Stealth port scanning methods, SANS Institute As part of GIAC practical repository Claypool 2002v1.4. /stealth-port-scanning-methods/ [8] Port Scanning Techniques, port-scanningtechniques.html [9] [RFC793, xt [10] Snort, [11] MYSql,www. [12] Nmap,
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services CS4983 Senior Technical Report Brian Chown 0254624 Faculty of Computer Science University of New Brunswick Canada
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Attacks and Defense. Phase 1: Reconnaissance
Attacks and Defense Phase 1: Reconnaissance Phase 2: Port Scanning Phase 3: Gaining Access Using Application and Operating System Using Networks Phase 1: Reconnaissance Known as information gathering.
Windows Filtering Platform, engine for local security
ICT Innovations 2010 Web Proceedings ISSN 1857-7288 387 Windows Filtering Platform, engine for local security Zoran Spasov, Ana Madevska Bogdanova 1 1 Faculty for Natural Sciences and Mathematics, Institute
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?
Network Scanning What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide? Where will our research go? Page : 1 Function - attacker view What hosts
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
1! Network forensics
Network Forensics COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1! Network forensics Network Forensics Overview! Systematic tracking of incoming and outgoing traffic!
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Development of an Intrusion Detection and Prevention Course Project Using Virtualization Technology. Te-Shun Chou East Carolina University, USA
International Journal of Education and Development using Information and Communication Technology (IJEDICT), 20, Vol. 7, Issue 2, pp. 46-55. Development of an Intrusion Detection and Prevention Course
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Computer forensics 2015-12-01
Computer forensics Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010
December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some
IP Monitoring and Filtering
IP Monitoring and Filtering By Gnanambal Chithambaram Sandeep Dubey Smrithi Barrenkula Subraja Krishnamurthy Sucheta P Kodali Abstract In our project IP Monitoring and filtering we developed a Java application
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
