InetVis: a Graphical aid for the Detection and Visualisation of Network Scans
|
|
|
- Alyson Clemence Barker
- 10 years ago
- Views:
Transcription
1 InetVis: a Graphical aid for the Detection and Visualisation of Network Scans Barry V.W. Irwin and Jean-Pierre van Riel Abstract This paper presents an investigative analysis of network scans and scan detection algorithms. Visualisation is employed to review network telescope traffic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. The scan detection algorithms of Snort and Bro are critiqued by comparing the visualised scans with alert output. Where human assessment disagrees with the alert output, explanations are sought after by analysing the detection algorithms. The algorithms of the Snort and Bro intrusion detection systems are based on counting unique connection attempts to destination addresses and ports. For Snort, notable false positive and false negative cases result due to a grossly oversimplified method of counting unique destination addresses and ports. 1 Introduction The Internet is an hostile network environment. Firewalls shelter users from the continual 'storm' of probing activity, commonly referred to as scanning which is, nonetheless, ever present and pervasive throughout the Internet. The greater proportion of this activity is generated by automated malicious software such as worms [1, 2]. While there may be potential value in detecting and tracking scanning activity, it is not a trivial exercise. This paper aims to illustrate that visualisation can better enable the critique of algorithmic scan detection. In particular, two widely deployed open source intrusion detection systems (IDS) are assessed, namely, Snort [3] and Bro 1.1d [4]. The value of performing scan detection is discussed in the remainder of this introduction. Section 2 highlights the efforts of others with regard to network monitoring, scan detection and network security visualisation. The InetVis visualisation Barry V.W. Irwin Rhodes University, Grahamstown, South Africa: [email protected] Jean-Pierre van Riel Rhodes University, Grahamstown, South Africa: [email protected]
2 2 Barry Irwin V.W. and Jean-Pierre van Riel tool and key features are described in Section 3. Section 4 discusses the approach used to review network traffic and compare it to IDS scan detection output. It also details the capture of network traffic. The results, which include visual illustrations, are presented in Section 5. The outcomes are concluded in Section 6 with an outline of future work. 1.1 The Merits and Difficulties of Scan Detection To begin a justification of this research, we need to address the following question, of what value is scan detection? Arguments Against Scan Detection Firstly, scanning activity is too prevalent and common to warrant concern with each and every individual incident (as detailed further in Section 2.2). Secondly, in production network monitoring scenarios, detecting successful intrusions is of paramount concern whereas scans merely signify vague intent. Thirdly, as stated by several authors [5, 6, 7, 8], current scan detection algorithms have poor accuracy and generate too many false positives. Scan detection is a specialised case of anomaly detection. Many authors argue that anomaly detection methods are less accurate than signature-based methods [9, 10, 11]. Furthermore, algorithms cannot be too complex as they need to be efficient enough for real-time monitoring. For these reasons, scan detection is often left disabled or ignored in production environments. Arguments For Scan Detection Having considered reasons advising against scan detection, there at least some motivations for performing scan detection. Firstly, there is the potential to detect and contain worm activity without relying on signatures. Infected hosts and worm activity can be identified based on the scanning activity they produce, as discussed by Goldi and Hiestand [6]. A general scan detection algorithm could be more scalable and efficient compared to matching traffic against a large signature database. Scan detection can be employed as an application of 'extrusion' detection monitoring internal hosts to detect compromised systems that attempt malicious outbound connections [12]. Readily identifying compromised internal hosts can facilitate rapid response and recovery. There is a similar rationale for performing scan detection on inbound traffic. Both the Snort and Bro IDS have intrusion prevention mechanisms to trigger the injection of new firewall rules as a response to malicious network events. As a pro-active response, once a source is identified as a scanner, subsequent connections can be blocked to prevent future exploit attempts. However, there are at least three caveats to this defence mechanism, namely denial-of-service (DoS), false positives, and distributed attacks. A malicious third party could effect DoS by initiating a scan that spoofs the address of a legitimate host. Similarly, due to the
3 3 poor accuracy of scan detection algorithms, benign traffic may be misclassified as scan activity and block legitimate access. The third concern is that distributed attacks from multiple sources will defeat this blocking strategy as the strategy relies upon tracking and blocking individual malicious sources. A more cautious approach would be to maintain a list of 'suspicious' hosts that, on account of their scanning activity, warrant more attention (as alluded to by Verwoerd and Hunt [11]). An IDS can then assign more resources to intensive checks against this reduced set of hosts deemed as suspect. 2 Related Work The context of this research involves network monitoring methods, intrusion detection theory and information visualisation techniques. This section relates several contributions that the authors believe to be significant. 2.1 Intrusion Detection and the False Positive Problem One difficulty with intrusion detection is the possibility of falsely identifying legitimate traffic as intrusive. The false positive rate is a major factor that limits the effectiveness of an intrusion detection system. This issue is well addressed by Axelsson et al [9]. He takes an established statical argument known as the base rate fallacy, and applies it to the problem of intrusion detection. It is presumed that a significant proportion of traffic in a production network is benign, and relative to this, the incidence rate of malicious activity is presumed to be low. Even with high accuracy, a large volume of benign traffic and a low incidence rate of malicious traffic can result in an overwhelming number of false alarms. 2.2 Network Telescopes Network telescopes can be used to avert the false positive problem as none of the traffic observed by a network telescope is legitimate. Similarly, honeypot networks attempt to capture only malicious activity, but unlike telescopes, actively respond to traffic to solicit more information. Harder et al. provide an example of analysing traffic from a small network telescope [13]. They perform some statical analysis and include some static graphics. A preliminary work to this paper also examines telescope traffic phenomena with emphasis on graphical analysis [14]. However, as stated in a report by Moore et al., small network telescopes, such as a class C network, are too small to infer statical generalisations about the Internet [15]. Pang et al. perform a large scale study
4 16 Barry Irwin V.W. and Jean-Pierre van Riel illustrated the difficulty of dealing with ambiguous traffic patterns that could be a form of ACK scanning or backscatter. InetVis illustrates the advantages of using visualisation and shows how the chosen 3-D scatter-plot is particularly suited to displaying scan activity. Without InetVis, the authors would have a weaker understanding of scan phenomenon and not have discovered these issues with current scan detection algorithms in Snort and Bro. 6.1 Future Work This work only tests the default scan detection in Snort and Bro. As alluded to in Section 2.4, other scan detection algorithms have been devised. Bro includes and implementation of Jung et al.'s algorithm [7] and may offer the flexibility to reimplement and compare other algorithms [5, 8, 21] for future analyses. To ease the process of conducting visual analysis, the authors are devising semi-transparent visual overlays to represent detected scans. The detection of scans can then be seen against the backdrop of the network traffic. To compliment this, the intention is to include support for reading scan alert output and to automatically forward the replay position to detected scans. In addition, automatic focus of the scan event would be desirable. One other worthwhile question is to quantitatively assess the performance advantage of Snort's simplified pseudo-unique destination counters. In conjunction, one might look at the accuracy cost of this simplification by judging how many false positives are caused by it. While Bro maintains a set of all previous destinations, this adds complexity and makes the scan detection more resource intensive (in terms of memory consumption and processor time). References [1] Pang, Ruoming and Yegneswaran, Vinod and Barford, Paul and Paxson, Vern and Peterson, Larry. Characteristics of internet background radiation. IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM Press, New York, NY, USA, p [2] Yegneswaran, Vinod and Barford, Paul and Ullrich, Johannes. Internet intrusions: global characteristics and prevalence, SIGMETRICS Performance and Evaluation Review, vol. 31, no. 1. ACM Press, New York, NY, USA, p [3] Martin Roesch. Snort - Lightweight Intrusion Detection for Networks. LISA '99: Proceedings of the 13th USENIX conference on System administration. USENIX Association, Berkeley, CA, USA,1999. p [4] Vern Paxson. Bro: a system for detecting network intruders in real-time, Computer Networks, vol. 31, no Elsevier North-Holland, Inc., New York, NY, USA, p [5] Gates, Carrie and McNutt, Joshua J. and Kadane, Joseph B. and Kellner, Marc I. Scan Detection on Very Large Networks Using Logistic Regression Modeling. Proceedings of the 11th
5 IEEE Symposium on Computers and Communications (ISCC 2006). IEEE Computer Society, Washington, DC, USA,2006. p [6] Goldi, Christoph and Hiestand, Roman. Scan Detection Based Identification of Worm-Infected Hosts. Institut fur Technische Informatik und Kommunikationsnetze (Computer Engineering and Networks Laboratory), Eidgenossische Technische Hochschule Zurich (Swiss Federal Institute of Technology Zurich), [7] Jung, Jaeyeon and Paxson, Vern and Berger, Arthur W. and Balakrishnan, Hari. Fast Portscan Detection Using Sequential Hypothesis Testing IEEE Symposium on Security and Privacy (SP 2006). IEEE Computer Society, Los Alamitos, CA, USA,2004. p [8] Simon, Gyorgy J. and Xiong, Hui and Eilertson, Eric and Kumar Vipin. Scan Detection: A Data Mining Approach. Sixth SIAM International Conference on Data Mining (SDM06) p [9] Axelsson, Stefan. The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 3. ACM Press, New York, NY, USA, p [10] Kemmerer, Richard A. and Vigna, Giovanni. Intrusion Detection: A Brief History and Overview (Supplement to Computer Magazine), Computer, vol. 35, no. 4. IEEE Computer Society, Los Alamitos, CA, USA, p [11] Verwoerd, Theuns and Hunt, Ray. Intrusion detection techniques and approaches, Computer Communications, vol. 25, no p [12] Bejtlich, Richard. Extrusion Detection: Security Monitoring for Internal Intrusions. Addison Wesley Professional, [13] Harder, Uli and Johnson, Matthew and Bradley, Jeremy T. and Knottenbelt, William J. Observing Internet Worm and Virus Attacks with a Small Network Telescope. Electronic Notes in Theoretical Computer Science, Volume 151, Issue 3, Proceedings of the Second International Workshop on the Practical Application of Stochastic Modeling (PASM 2005). Elsevier, p [14] van Riel, Jean-Pierre and Irwin, Barry. InetVis, a visual tool for network telescope traffic analysis. Afrigaph '06: Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa. ACM Press, New York, NY, USA,2006. p [15] Moore, David and Shannon, Collen and Voelkery, Geoffrey M. and Savagey, Stefan. Network Telescopes: Technical Report. CAIDA, San Diego Supercomputer Center, University of California, San Diego, [16] Moore, David and Shannon, Colleen and Brown, Douglas J. and Voelker, Geoffrey M. and Savage, Stefan. Inferring Internet denial-of-service activity, ACM Transactions Computer System (TOCS), vol. 24, no. 2. ACM Press, New York, NY, USA, p [17] Moore, David and Voelker, Geoffrey M. and Savage, Stefan. Inferring Internet Denial-of- Service Activity. 10th USENIX Security Symposium. USENIX,,2001. [18] Caswell, Brian and Hewlett, Jeremy. Snort Users Manual, version [19] Lyon, Gordon (a.k.a Fyodor). Nmap Reference Guide (Man Page) [20] Lau, Stephen. The Spinning Cube of Potential Doom, Communications of the ACM, vol. 47, no. 6. ACM Press, New York, NY, USA, p [21] Leckie, C. and Kotagiri, R.. A probabilistic approach to detecting network scans. Network Operations and Management Symposium, 2002 (NOMS 2002, IEEE/IFIP). IEEE Computer Society, Washington, DC, USA,2002. p [22] Ball, Robert and Fink, Glenn A. and North, Chris. Home-centric visualization of network traffic for security administration. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM Press, New York, NY, USA,2004. p [23] Wickens, C. and Sandry, D. and Vidulich, M.. Compatibility and resource competition between modalities of input, central processing, and output., Human Factors, vol. 25, no p
6 18 Barry Irwin V.W. and Jean-Pierre van Riel [24] Valdes, Alfonso and Fong, Martin. Scalable visualization of propagating internet phenomena. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM Press, New York, NY, USA,2004. p [25] Goodall, John R. and Lutters, Wayne G. and Rheingans, Penny and Komlodi, Anita. Focusing on Context in Network Traffic Analysis, IEEE Computer Graphics and Applications, vol. 26, no. 2. IEEE Computer Society, Los Alamitos, CA, USA, p [26] Foresti, Stefano and Agutter, James and Livnat, Yarden and Moon, Shaun and Erbacher, Robert. Visual Correlation of Network Alerts, IEEE Computer Graphics and Applications, vol. 26, no. 2. IEEE Computer Society, Los Alamitos, CA, USA, p [27] Erbacher, Robert F. and Christensen, Kim and Sundberg, Amanda. Designing Visualization Capabilities for IDS Challenges. Proceedings of the IEEE Workshops on Visualization for Computer Security (VIZSEC 2005). IEEE Computer Society, Washington, DC, USA,2005. p [28] Krasser, Sven and Conti, Gregory and Grizzard, Julian and Gribschaw, Jeff and Owen, Henry. Real-time and forensic network data analysis using animated and coordinated visualization. Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, IEEE Computer Society, Washington, DC, USA,2005. p [29] Fisk, Mike. and Smith, Steven A. and Weber, Paul M. and Kothapally, Satyarn and Caudell, Thomas P.. Immersive Network Monitoring. Passive and Active Measurement 2003 (PAM2003) [30] Yin, Xiaoxin and Yurcik, William and Treaster, Michael and Li, Yifan and Lakkaraju, Kiran. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM Press, New York, NY, USA,2004. p [31] Toledo, J. et al. EtherApe: a graphical network monitor [32] Kuchar, Olga A. and Hoeft, Thomas J. and Havre, Susan and Perrine, Kenneth A.. Isn't It About Time?, IEEE Computer Graphics and Applications, vol. 26, no. 3. IEEE Computer Society, Los Alamitos, CA, USA, p [33]. TCPDUMP Public Repository (tcpdump/libpcap) [34]. Port Numbers
NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security
NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at
A LITERATURE REVIEW OF NETWORK MONITORING THROUGH VISUALISATION AND THE INETVIS TOOL
A LITERATURE REVIEW OF NETWORK MONITORING THROUGH VISUALISATION AND THE INETVIS TOOL Christopher Schwagele Supervisor: Barry Irwin Computer Science Department, Rhodes University 29 July 2010 Abstract Network
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
IDENTIFYING AND INVESTIGATING INTRUSIVE SCANNING PATTERNS BY VISUALIZING NETWORK TELESCOPE TRAFFIC IN A 3-D SCATTER-PLOT
IDENTIFYING AND INVESTIGATING INTRUSIVE SCANNING PATTERNS BY VISUALIZING NETWORK TELESCOPE TRAFFIC IN A 3-D SCATTER-PLOT Jean-Pierre van Riel and Barry Irwin Security and Networks Research Group Department
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization Sven Krasser, Member, IEEE; Gregory Conti, Member, IEEE; Julian Grizzard, Member, IEEE; Jeff Gribschaw, Member,
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure William Yurcik* Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham University
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
Scan Surveillance in Internet Networks
Scan Surveillance in Internet Networks (Work in Progress) Khadija Ramah Houerbi 1,Kavé Salamatian 2, and Farouk Kamoun 1 1 National School of Computer Science, University of Manouba, Tunisia [email protected],
Review Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
Slow Port Scanning Detection
Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American
Analysis of Automated Model against DDoS Attacks
Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Teryl Taylor, Stephen Brooks and John McHugh Abstract NetBytes Host Viewer is an interactive visualization
Flow-based Worm Detection using Correlated Honeypot Logs
Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
highly predictive blacklisting
J i a n Z h a n g, P h i l l i p P o r r a s, a n d Johannes Ullrich highly predictive blacklisting Jian Zhang is an assistant professor in the department of computer science at Louisiana State University.
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign [email protected]
A Brief History of Scanning
A Brief History of Scanning Mark Allman ICSI Berkeley, CA, USA [email protected] Vern Paxson ICSI & LBNL Berkeley, CA, USA [email protected] Jeff Terrell UNC-Chapel Hill Chapel Hill, NC, USA [email protected]
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection Stefan Axelsson Presented by Kiran Kashalkar Agenda 1. 1. General Overview of of IDS 2. 2. Bayes Theorem and Base-Rate
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
A Brief History of Scanning
A Brief History of Scanning Mark Allman, Vern Paxson, Jeff Terrell International Computer Science Institute, Lawrence Berkeley National Laboratory (LBNL), University of North Carolina at Chapel-Hill ABSTRACT
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries Gregory Conti, Julian Grizzard, Mustaque Ahamad and Henry Owen Georgia Institute of Technology
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
Network Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
Visual Firewall: Real-time Network Security Monitor
Visual Firewall: Real-time Network Security Monitor Chris P. Lee Georgia Tech CSC Jason Trost Georgia Tech CS Dept Nicholas Gibbs Georgia Tech CS Dept Raheem Beyah Georgia Tech CSC John A. Copeland Georgia
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
The Second International Conference on Innovations in Information Technology (IIT 05)
HoneyAnalyzer Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot Urjita Thakar Reader, Department of Computer Engineering, Shri G.S. Institute of Technology and Science
Honeyd Detection via Packet Fragmentation
Honeyd Detection via Packet Fragmentation Jon Oberheide and Manish Karir Networking Research and Development Merit Network Inc. 1000 Oakbrook Drive Ann Arbor, MI 48104 {jonojono,mkarir}@merit.edu Abstract
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
Taxonomy of Hybrid Honeypots
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Data Clustering for Anomaly Detection in Network Intrusion Detection
Data Clustering for Anomaly Detection in Network Intrusion Detection Jose F. Nieves Polytechnic University of Puerto Rico Research Alliance in Math and Science Dr. Yu (Cathy) Jiao Applied Software Engineering
An Adaptable Innovative Visualization For Multiple Levels of Users
World Applied Sciences Journal 15 (5): 722-727, 2011 ISSN 1818-4952 IDOSI Publications, 2011 An Adaptable Innovative Visualization For Multiple Levels of Users Doris Hooi-Ten Wong and Sureswaran Ramadass
A Method for Port Scanner Detection on a Mobile Network
A Method for Port Scanner Detection on a Mobile etwork Sekwon Kim, Joohyung Oh, Inho Kim, and Chaetae Im Korea Internet Security Center Korea Internet & Security Agency IT Venture Tower, Jungdaero 135,
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
Preserving the Big Picture: Visual Network Traffic Analysis with TNV John R. Goodall Wayne G. Lutters Penny Rheingans Anita Komlodi University of Maryland, Baltimore County ABSTRACT When performing packet-level
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
Preserving the Big Picture: Visual Network Traffic Analysis with TNV John R. Goodall Wayne G. Lutters Penny Rheingans Anita Komlodi University of Maryland, Baltimore County ABSTRACT When performing packet-level
Inferring Internet Denial-of
Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University
Traffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
Aggregating Distributed Sensor Data for Network Intrusion Detection
Aggregating Distributed Sensor Data for Network Intrusion Detection JOHN C. McEACHEN, CHENG KAH WAI, and VONDA L. OLSAVSKY Department of Electrical and Computer Engineering Naval Postgraduate School Monterey,
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Alert Verification Determining the Success of Intrusion Attempts
Alert Verification Determining the Success of Intrusion Attempts Christopher Kruegel and William Robertson Reliable Software Group University of California, Santa Barbara {chris,wkr}@cs.ucsb.edu 1 Introduction
Tracking the Role of Adversaries in Measuring Unwanted
Tracking the Role of Adversaries in Measuring Unwanted Traffic Mark Allman ICSI Paul Barford University of Wisconsin Balachander Krishnamurthy & Jia Wang AT&T Labs Research Abstract Measurements related
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Data Mining for Cyber Security
Book chapter in Data Warehousing and Data Mining Techniques for Computer Security, Springer, 2006 Data Mining for Cyber Security Varun Chandola, Eric Eilertson, Levent Ertöz, György Simon and Vipin Kumar
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansmann, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
MitiBox: Camouflage and Deception for Network Scan Mitigation
MitiBox: Camouflage and Deception for Network Scan Mitigation Erwan Le Malécot Kyushu University Institute of Systems, Information Technologies and Nanotechnologies Abstract Reconnaissance, if successful,
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks Long-Quan Zhao 1, Seong-Chul Hong 1, Hong-Taek Ju 2 and James Won-Ki Hong 1 1 Dept. of Computer Science and Engineering,
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
Intrusion Detection Systems with Correlation Capabilities
Intrusion Detection Systems with Correlation Capabilities Daniel Johansson [email protected] Pär Andersson [email protected] Abstract Alert correlation in network intrusion detection systems
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
