A Brief History of Scanning
|
|
|
- Irene Rodgers
- 10 years ago
- Views:
Transcription
1 A Brief History of Scanning Mark Allman ICSI Berkeley, CA, USA Vern Paxson ICSI & LBNL Berkeley, CA, USA Jeff Terrell UNC-Chapel Hill Chapel Hill, NC, USA ABSTRACT Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity observed at one site over the past 2.5 years. We study the onset of scanning in the late 990s and its evolution in terms of characteristics such as the number of scanners, targets and probing patterns. While our study is preliminary in many ways, it provides the first longitudinal examination of a now ubiquitous Internet phenomenon. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General; C.2.3 [Computer-Communication Networks]: Network Operations; C.2.6 [Computer-Communication Networks]: Internetworking General Terms Measurement,Security Keywords Scanning,Longitudinal,Malicious Activity. INTRODUCTION Many forms of Internet activity have proven highly challenging to characterize due to the network s great diversity. Because sound characterization often requires a very broad perspective in order to capture the full range of variation manifested, such measurement studies face deep methodological challenges for how to (i) acquire sufficient breadth of measurement perspectives, and (ii) bring coherence to the analysis of disparate data. Yet without such studies, we lack basic insights into the global network s behavior and evolution. With regard to Internet attack activity, several remarkable studies have managed to attain global perspectives via a range of techniques. Moore s network telescope provides broad visibility into distant network phenomena such as flooding attacks and worm infections by leveraging the presence in such activity of randomly Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. IMC 07, October 24-26, 2007, San Diego, California, USA. Copyright 2007 ACM /07/000...$5.00. selected IP addresses [8, 9, 7]. Bailey and colleagues present a system based on a wide range of distributed black hole network blocks coupled with probe responders [2], for which they show that the distributed perspective can be vital for capturing the range of variations that scanning activity manifests [3]. Following a different approach, Yegneswaran and colleagues studied a collection of network scanning logs from the global DShield repository [2, ]. The data spanned a month-long period from 200 (including the Code Red 2 outbreak) and a 3-month period from 2002, totaling 207 million scans sent to.4 million destination addresses. The study examines scanning prevalence, rates, types, and address clustering, offering a unique global perspective. In this paper we also examine the phenomenon of scanning, but from a perspective global in time rather than space. That is, the data upon which we base our study begins in 994 during which the measured site experienced virtually no scanning activity through 2006, long past the point at which scanning became a ubiquitous phenomenon [0]. While only from a single site, the breadth of the data is extensive: the subset (/30th) we use for this paper spans 628 million scans sent by 2.4 million distinct IP addresses. We emphasize that this paper reflects preliminary work, with many important questions (e.g., alignment of our findings with those framed in [2]) deferred for a more extensive study we are pursuing. However, we find that even our initial scratching the surface of the data reveals a number of interesting results. 2. DATA The data presented in this paper comes from 2.5 years of logs of network traffic continuously collected at the border of the Lawrence Berkeley National Laboratory (LBNL) in Berkeley, CA, USA. LBNL s address space consists of two /6 networks and a small number of /24 network blocks (the exact number varied over the span of the monitoring). Data collection began on June 994, and we base our preliminary study on logs up through December , or 4,58 days. The dataset consists of one-line ASCII summaries of each incoming connection observed; see 3. for specifics. For 994-5, the connection summaries were generated using a script that processes tcpdump output. In 996, we switched to the newly written Bro intrusion detection system [], which can produce connection summaries in the same format. In total, the dataset includes 23.4 billion connection summaries. For our analysis, we split each day in the dataset into its own file. Grappling with data of such size poses many logistical issues. For example, some of our early analysis scripts failed because they used more than 3 GB of memory when crunching a single day s worth of Data collection continues to this day. Our initial end date was arbitrary and chosen for logistical convenience.
2 summaries. While we re-engineered our analysis to use less memory (by taking multiple passes across the data, and by sorting the data on external IP address to allow some forms of analysis to proceed without maintaining state for multiple addresses), this serves to illustrate the problems involved in analyzing the data. In fact, the biggest problem with crunching the data is simply the amount of time required. Just to count the lines in each file with wc takes over 4 hours. 2 Obviously, more elaborate analysis and keeping state about the traffic slow this process down much further. To cope with this massive size, we restrict the initial exploration of the data to analysis of every 30 th day. This subset of the data consists of 53 days of traffic, encompassing 794 million connection summaries (3.4% of the total number of connections in the dataset). We note that all analysis in this paper is conducted over 24 hour periods. That is, a scanner identified on one day is not assumed to be a scanner on the next day in the dataset (unless of course we independently identify it on this second day). Given that the days in the dataset are 30 days apart in real time, this should not skew our results very much. In future work we intend to analyze the full set of data, at which point we will need to re-visit the issue of when to age out a scanner. While we know that glitches in the monitoring apparatus have occurred and thus the dataset does not include every connection attempt made in the last 2.5 years there have been no prolonged outages of the monitoring infrastructure. We used the timestamps in the connection summaries to check for short days, finding 6 days within our dataset to be more than 30 sec short of a full 24-hour period. In looking back through both ancillary information and logs from surrounding days, we find that while some of these days are quite short (the most egregious log being roughly 6 hours long), the outages represent Bro crashes and hardware problems not correlated with scanning. Therefore, we do not believe these short days bias the assessment. In addition, we looked for gaps within each day s log. We found three days where the logs exhibit 4 6 minute gaps, and confirmed that these reflect Bro crashes. Prior to the gap we do not see scanning activity, but we do in the logs generated immediately after Bro restarted. Therefore, it is possible that a form of scanning affected the measurement infrastructure, slightly biasing the measurements. We do note, however, that 6 minutes is about % of a day, and therefore the amount of bias is likely small (especially since all of these instances come from , when scanning was incessant, as shown in 4). We found two additional outages of 2 and 24 minutes. These again reflect Bro problems. However, we see nothing surrounding the gaps to indicate that significant scanning was taking place during these time periods. 3. WHAT IS A SCANNER? Crucial to our entire study is a careful definition of when to consider a remote host a scanner. We break this question into two parts. We first consider how to classify individual connections ( 3.). We then use the classifications of all the connection attempts from a particular remote host to classify the remote host ( 3.2). 3. Connection Classification Our dataset consists of connection summaries for each incoming connection. It is important to note that while the logs include all TCP traffic (which heavily dominates LBNL s traffic mix), the 2 This also includes uncompression time for the largest one-third the daily logs, which we store gzip-compressed. presence of UDP traffic is limited to only those protocols analyzed by the Bro system, which varied over the course of its development. In addition, the logs we used do not include any ICMP traffic. These summaries contain () the time a connection started (reported to µsec precision), (2) the duration of the connection (also reported with µsec precision), (3) the source and destination IP addresses, (4) the number of bytes transferred in each direction, (5) the application protocol as inferred from usage of well-known ports, and (6) a final state entry. This state provides a succinct summary of the connection. The SF state indicates that the monitor observed both the three-way SYN handshake to initiate a connection and the FIN handshake to tear it down (i.e., the connection progressed in the nominal way we think of successful connections working). The REJ state, on the other hand, indicates that the initial SYN (from a remote peer) elicited a RST packet from the target host, indicating a rejected connection attempt. The connections in our dataset span roughly 20 state values. 3 We classify every state but one ( SH ; see below) as either good for successful connections, bad for connection attempts that do not lead to established connections, or unknown for states that do not indicate clearly good or bad connections. The SH state indicates that the remote peer sent a SYN followed by a FIN however, the monitor never recorded a SYN- ACK from the local peer. At first glance, this would seem to indicate a scanner that is trying to make connection attempts look as real as possible in the hopes of not triggering an alarm. However, such connections can also indicate a vantage point problem whereby the monitor is not observing outgoing traffic from some hosts. While in general the monitor placement at LBNL can observe both incoming and outgoing traffic, there were periods of time where the traffic for some LBNL hosts would partially bypass the monitor. From a measurement perspective this is clearly undesirable. However, when conducting the sort of exhaustive longterm monitoring required to produce the dataset used in this paper, these sorts of quirks are inevitable. In this case, the quirk gives rise to traffic summaries that do not clearly show the traffic as good or bad. To cope with this ambiguous SH state, we introduce a heuristic based on the service fanout of the remote host, i.e., the number of (localip, port) tuples the remote host at least attempted to access. When restricted to SH connections, if this fanout exceeds 0 then we deem all the SH connections from the given remote host as bad. Otherwise, we classify them as unknown. After processing the SH connections, we are left with good, bad and unknown connections. In over two-thirds of the days in our dataset, we classify fewer than % of the connections as unknown, though on 5 days we observed an unknown connection prevalence of 5%, with the maximum being 6%. Manual examination shows that while a variety of unknown states manifest in these days, the predominant unknown state is SH connections from remote hosts that do not exhibit the fanout required for us to reclassify the connections as bad. While these connections could in fact be from scanners trying to evade detection, (i) the low fanout suggests a monitor placement issue, since fanout for legitimate remote hosts is typically low (see 3.2), and (ii) the unknown connections are generally small enough in number as to not significantly skew our overall results. 3.2 Host Classification Using the above classifications of each connection in our dataset, 3 Bro currently produces 3 different states. However, over the years additional codes have been used as understanding of how to best summarize status information evolved.
3 we can now turn to analyzing a remote host s aggregate behavior to determine whether to classify it as a scanner or not. Our general approach is based on the notion that connection attempts that do not result in established connections represent possible scans. Of course, there are benign reasons why such attempts occur (service temporarily unavailable, misconfigurations, user errors), and also the probes from scanners will sometimes succeed in establishing connections. Thus, simply observing a single failed connection attempt should not mark a remote host as a scanner. Accordingly, we need a heuristic for analyzing a remote host s overall activity and making a judgment. Scanners, by definition, poke around in search of services. We can quantify the notion of poking around in terms of a remote host s service fanout, i.e., the number of (localip, port) pairs a remote host attempts to access, as discussed in the last section. However, fanout by itself does not necessarily indicate scanning by an attacker. It could instead reflect legitimate access that happens to involve a number of different local hosts or services. 4 One potential means for distinguishing between these two possibilities builds upon the likelihood that hostile scanners will tend to fail in their connection attempts more often than legitimate hosts, because the scanners lack knowledge of where servers reside. While previous work on detecting scanners in real-time exists (e.g., using various thresholds [6] or Sequential Hypothesis Testing [4]), for our preliminary exploration we want to start from a more relaxed definition of scanner. We do so for two reasons: (i) such that we have an opportunity to observe patterns that might differ from those detected by operationally oriented schemes that place a premium on reacting quickly in real-time, and (ii) to allow for the possibility of ambiguity in terms of not making a decision one way or the other regarding whether a host is a scanner. To this end, we first note the fairly sharp distinction between fanout as exhibited by remote hosts that only make good connections ( good hosts ) versus for remote hosts that only make bad connections ( bad hosts ). (While these hosts are not themselves hard to classify, our goal is to arrive at a well-supported rule for classifying remote hosts that make both good and bad connections to local services.) We note that only 3% of good hosts have a service fanout exceeding 3, while 24% of bad hosts do. Clearly, good hosts generally target a small number of local services while bad hosts tend to attempt to hit a larger number of services. Next, assessing the mixed hosts, i.e., remote hosts that make both good and bad connections, we find that often either the good service fanout or the bad service fanout outweighs the other by a large margin (matching the similar finding reported in [4], though this time seen over a much longer period of time). We therefore formulate a rule to classify mixed hosts as good or bad based on the ratio of the host s fanout for good connections to its fanout for bad connections. If either type of connection outweighs the other by a factor of T, then we classify the host using the more predominant type of connection. Otherwise, we leave the host unclassified. Figure shows distributions for various values of T of the percentage of mixed hosts that remain unclassified per day using the scheme outlined above. We first note that the scheme classifies over 90% of the mixed hosts regardless of threshold we used verifying our initial belief that remote hosts make predominantly good or bad connections. In addition, the plot shows that T values of In addition, a lack of fanout does not necessarily mean a host is not a scanner. It might instead be scanning the Internet very broadly, such that in our dataset we only see one or two connection attempts. In principle, we might be able to assess the degree to which this occurs by cross-analyzing our dataset with a global database such as that provided by DShield [] (at least for data from recent years). CDF T=.0 T=.05 T=. T=.25 T=.5 T=2 T=4 T=8 Fraction of Unclassified Hosts Figure : Unclassified mixed hosts after comparing good and bad service fanout as a function of the threshold. perform nearly identically, indicating that there is a set of remote hosts with balanced good and bad service fanout that are not easily classified using this scheme. Based on the above analysis, we define a scanner as a remote host that has bad service fanout of at least 4 and has bad service fanout of at least 2 times the good service fanout. This heuristic leaves a small number of unclassified hosts (<0%); however, classifying these hosts seems difficult, at best, since they access good and bad services in roughly equal numbers. Further, to bias the results a scanner would have to engineer their scanning to interleave accesses to well known services with probes meant to figure out something about the local hosts. Such a technique has only recently been explored in the literature [5]. 4. AGGREGATE VIEW Using the above methodology for classifying remote hosts as scanners or benign, Figure 2 shows the total number of incoming connections (solid black) and the subsets from benign sources (solid gray) and scanners (dotted). The black dots indicate data from a weekend, and clarify why the data exhibits frequent oscillations: the dips nearly always occur on a weekend, when network traffic is naturally lower. The plot shows that scanning started to increase in earnest in 998, and exhibits significant variability from month to month. In addition, 200 emerges as marking a fundamental shift from most connections being legitimate to most being part of scanning activity, coincident with the Code Red and Nimda worm outbreaks. Figure 3 shows the number of legitimate remote hosts and scanners attempting to establish connections each day. (We start the y-axis at,000 for readability, which clips the scanner host count all the way through 2000, during which it remained much smaller than the good host count.) As noted above, in terms of connection count scanning took off in 998. However, in terms of number of hosts, activity only ramped up in 200, 5 with the onset of the major worm outbreaks. From this point forward we observe thousands of scanners probing every day, and we might well consider this to reflect the onset of Internet background radiation [0], due to the diffuse-yet-incessant nature of scanning ever since. The plot also shows a second, even stronger spike in early 2004, coinciding with a number of energetic scanning attacks (MyDoom, 5 The scanner count exceeded 30/day only once prior to Oct
4 Incoming Connections 00M 0M M 00 All Scanners Non-Scanners Figure 2: Connection-level summary of incoming traffic. Sasser, Welchia, Bobax, Gaobot). We note that during both spikes, we observe significant increases in the counts of non-scanners, too. This likely indicates that we are not correctly identifying all scanners. In particular, in 3.2 we noted that 76% of hosts with no legitimate connections had fanouts 3 and hence were not labeled as scanners. Thus, the rise in non-scanners in the Figure almost surely reflects scanners that happened to only probe LBNL s address space a small number of times. An interesting effect is that scanning both as a fraction of the connection attempts and as a fraction of remote hosts has decreased since mid For our preliminary study, we can at this point only speculate as to likely causes. First, the peak was likely caused by very aggressive scanning worms/bots in the timeframe, which inflated the scanning growth rate. Second, scanners have become increasingly refined in their techniques (cf. the discussion in 5 of scanning rates), both for greater efficiency and to operate with a lower profile. We note that the last data point shows over two-thirds of the connection attempts in Dec were scans, but these come from just over % of the remote hosts that contacted LBNL that day. Clearly, this is an area of considerable interest for our future work. Finally, we note that in both Figure 2 and Figure 3 the nonscanning activity exhibits consistent growth of 45%/year (number of connections) and 36%/year (number of hosts), other than the aberrant elevated period during This highlights both the sustained exponential growth of different dimensions of network traffic, and how scanning can occur at a level that significantly perturbs these otherwise-steady trends. Service Scanned HTTP SMB NetBIOS DCE/RPC SQL FTP SMTP SSH SUN/RPC Telnet 9898/tcp (Sasser backdoor) LPR DNS Other M Non-Scanners Scanners 994 Figure 4: Services scanned as a function of time. Host Count Figure 3: Host-level summary of incoming traffic. We next turn to what services the scans target. Figure 4 shows the services most commonly probed (greatest number of days for which they accounted for 5% of all scans), with the areas of the circles proportional to the absolute number of scans for the given service on the given day. Some services see low-rate incessant scanning (e.g., SMTP), while others flare up and later die off, such as HTTP scanning in Aug. 200 (Code Red) or the seismic onset of DCE/RPC in Aug (Blaster), as well as SMB and NetBIOS due to other worms and bots exploiting Windows services, as noted above. For some services, we see a gradual retreat, such as for 9898/tcp, presumably reflecting on-going disinfection activities. The 9898/tcp scans are also interesting because they are parasitic: they reflect an attacker searching for backdoors left behind by previous malware (the Sasser worm). Finally, we note that there are occasions with heavy other scanning. Some of this reflects a specific constellation of scanning associated with a single worm or exploit tool, but others appear quite diverse, highlighting that a simple list of top services scanned will often not fully capture the breadth of activity. 5. SCANNER-LEVEL VIEW We finish our brief study with a look at the behavior of individual scanners. Figure 5 shows the median and maximum number of probes sent per scanner during each day. For nearly all of the measurement period, the median number is well under 00, and since the onset of background radiation in 200, the median rate has held steadily right around 0 scans/day. At the upper end, however, we see that energetic individual scanners arose directly during the 998 onset of significant scanning activity. After that point we repeatedly observe scanners sending tens of thousands of probes, and the number that these heavy hitters sent has further risen over time. Also, from we see somewhat of a plateau of the maximum number of scans at around 64K. We conjecture (informed by the fanout we discuss next) that this plateau comes from scanners probing a particular port on every address within one of LBNL s /6 networks. The increase after 200 may reflect scanners that now probe both /6s, and/or an increase in scanners targeting multiple ports.
5 0M M Median Scans per Scanner 00 Host Fanout 00 0 Figure 5: # scans per scanner as a function of time. 0 Mean We next look at the reach of scanners in terms of how many local hosts and services they probe. Figure 6 shows host and port fanout over time. Consistently, fanout in terms of hosts is significantly higher than for ports, indicating that scanners are mainly interested in broad scans across many hosts rather than deep scanning of particular hosts ([2] notes the same effect). In addition, with the onset of significant scanning in 998, it is not rare to observe a single scanner sweep one of LBNL s /6 networks (64K addresses), with this becoming a daily occurrence in early 200 (not due to the worms of that year, which arrived later). Furthermore, starting in 2004 we begin to observe single hosts scanning both of LBNL s /6 networks (28K addresses). For instance, the scanner probing the most LBNL hosts in one day over the course of our entire dataset represents a sequential probe for SQL servers on Nov. 2, The source scanned one of LBNL s entire /6 networks at 3:45AM, in just over 8 seconds, and the second one at 9:AM. Assuming the sequential scanner probes a /6 every 8 seconds, this suggests that in the interim between the two visits to LBNL it could probe about,078 other /6s. In fact, there are,008 /6s between LBNL s two /6s, strongly indicating that this scanner was simply scanning a large swath of the network sequentially. This anecdote points to an important area of future research, namely assessing the patterns of scanning. Finally, we note that while in general scanners concentrate on a small number of ports, probes of over ports are not uncommon in recent years. Figure 7 shows the probing rate of scanners over time, for scanners that sent at least 00 probes. We observe a median scanning rate under one scan/sec across nearly the entire dataset. With the onset of background radiation in 200, we also consistently see at least one scanner per day that sends 00 probes spread over the entire day (for a rate of 0.00 scans/second). Regarding the top rates, we note two sharp increases, in late 998 and in early 2004, which we attribute to scanning software becoming more efficient, i.e., by using non-blocking calls, raw I/O, and multiple processes/threads. It is striking that prior to 998, we never observe a scanner probing faster than /sec (presumably limited by a simple scanning loop that uses the OS s standard connect facility); and that after that point, maximum scanning rates sustained annual growth of around 70%/year. As a final note, the maximum scanning rate we observe is 88K scans/second. However, this rate comes from 37 scans over.5 msec. One of the many areas for future work is to assess the sustained scanning rates of large scanners. Port Fanout 00 0 Mean Figure 6: Fanout to local hosts (top) and ports (bottom) for each day in the dataset. Scanner Rate (scans/second) Median Minimum Figure 7: Scanning rate as a function of time.
6 6. SUMMARY In this paper we have taken a first, brief look at the history of scanning over the last 2.5 years as observed at LBNL. While other studies have shown greater breadth in gathering data from multiple vantage points, and greater depth in the analysis of particular scanners, we are not aware of any prior work that explores the phenomenon over such an extended period of time. To be sure, there are many more questions than we have answered in this paper, which we intend to explore in future work. Some of the future data analysis we intend to pursue involves assessing (i) scanning patterns, (ii) distributed scanning whereby various hosts each scan a portion of the address/port space, (iii) correlations between scanning rates and general increases in the number of well-connected hosts and the speed of their connections and (iv) the sources of scanning by AS number or geographic region. These are merely examples and not an exhaustive list, as a goal in writing this initial paper is to solicit feedback on additional key questions to address. 7. ACKNOWLEDGMENTS We thank the anonymous IMC reviewers for their comments and suggestions. This work was supported by National Science Foundation grants ITR/ANI , NSF , STI and CNS , for which we are grateful. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation. [5] M. G. Kang, J. Caballero, and D. Song. Distributed Evasive Scan Techniques and Countermeasures. In Proc. of Intl. Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), June [6] C. Leckie and R. Kotagiri. A probabilistic approach to detecting network scans. In Proc. 8th IEEE Network Operations and Management Symposium, Apr [7] D. Moore, C. Shannon, and k claffy. Code-Red: a Case Study on the Spread and Victims of an Internet Worm. In Proc. ACM Internet Measurement Workshop, November [8] D. Moore, C. Shannon, G. Voelker, and S. Savage. Network telescopes. Technical report, Cooperative Association for Internet Data Analysis (CAIDA), July [9] D. Moore, G. Voelker, and S. Savage. Interring Internet Denial-of-Service Activity. In Proceedings of the 0th USENIX Security Symposium. USENIX, August 200. [0] R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet Background Radiation. In Internet Measurement Conference, [] V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, Jan [2] V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: Global characteristics and prevalence. In Proceedings of ACM SIGMETRICS, June REFERENCES [] Internet storm center. [2] M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet motion sensor: A distributed blackhole monitoring system. In Proc. NDSS, [3] E. Cooke, M. Bailey, Z. M. Mao, D. Watson, F. Jahanian, and D. McPherson. Toward understanding distributed blackhole placement. In Proc. ACM CCS Workshop on Rapid Malcode (WORM), Oct [4] J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy, 2004.
A Brief History of Scanning
A Brief History of Scanning Mark Allman, Vern Paxson, Jeff Terrell International Computer Science Institute, Lawrence Berkeley National Laboratory (LBNL), University of North Carolina at Chapel-Hill ABSTRACT
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Inferring Internet Denial-of
Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
highly predictive blacklisting
J i a n Z h a n g, P h i l l i p P o r r a s, a n d Johannes Ullrich highly predictive blacklisting Jian Zhang is an assistant professor in the department of computer science at Louisiana State University.
Honeyd Detection via Packet Fragmentation
Honeyd Detection via Packet Fragmentation Jon Oberheide and Manish Karir Networking Research and Development Merit Network Inc. 1000 Oakbrook Drive Ann Arbor, MI 48104 {jonojono,mkarir}@merit.edu Abstract
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Scan Surveillance in Internet Networks
Scan Surveillance in Internet Networks (Work in Progress) Khadija Ramah Houerbi 1,Kavé Salamatian 2, and Farouk Kamoun 1 1 National School of Computer Science, University of Manouba, Tunisia [email protected],
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
One-way Traffic Monitoring with iatmon
One-way Traffic Monitoring with iatmon Nevil Brownlee CAIDA, UC San Diego, and The University of Auckland, New Zealand, [email protected] Abstract. During the last decade, unsolicited one-way Internet
Analysis of Attacks towards Turkish National Academic Network
Analysis of Attacks towards Turkish National Academic Network Murat SOYSAL, Onur BEKTAŞ Abstract Monitoring unused IP address is an emerging method for capturing Internet security threads. Either an attack
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Aggregating Distributed Sensor Data for Network Intrusion Detection
Aggregating Distributed Sensor Data for Network Intrusion Detection JOHN C. McEACHEN, CHENG KAH WAI, and VONDA L. OLSAVSKY Department of Electrical and Computer Engineering Naval Postgraduate School Monterey,
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Coordinated Scan Detection
Coordinated Scan Detection Carrie Gates CA Labs, Islandia, NY [email protected] Abstract Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used
A Longitudinal View of HTTP Traffic
A Longitudinal View of HTTP Traffic Tom Callahan, Mark Allman, Vern Paxson, Case Western Reserve University, International Computer Science Institute University of California, Berkeley Abstract. In this
Richard Bejtlich [email protected] www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04
Network Security Monitoring with Sguil Richard Bejtlich [email protected] www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04 Overview Introduction to NSM The competition (ACID, etc.)
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
1.0 Introduction. 2.0 Data Gathering
Nessus Scanning 1.0 Introduction Nessus is a vulnerability scanner, a program that looks for security bugs in software. There is a freely available open source version which runs on Unix. Tenable Security
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan
ZMap Fast Internet-Wide Scanning and its Security Applications Zakir Durumeric Eric Wustrow J. Alex Halderman University of Michigan Internet-Wide Network Studies Previous research has shown promise of
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006
CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
The Open Source Bro IDS Overview and Recent Developments
The Open Source Bro IDS Overview and Recent Developments Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey, * Evan Cooke, * Farnam Jahanian, * Jose Nazario, David Watson * * Electrical Engineering and Computer Science Department
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
The Spread of the Sapphire/Slammer Worm
The Spread of the Sapphire/Slammer Worm By (in alphabetical order) David Moore Vern Paxson Stefan Savage Colleen Shannon Stuart Staniford Nicholas Weaver CAIDA & UCSD CSE ICIR & LBNL UCSD CSE CAIDA Silicon
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
