Index Terms Domain name, Firewall, Packet, Phishing, URL.
|
|
|
- Chloe Jacobs
- 10 years ago
- Views:
Transcription
1 BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet filtering using BDD is the one of the major contemporary firewall design techniques. An important design goal is to arrive at the decision at the packet only. Implementation of such packet filter using Binary Decision Diagram (BDD) gives more advantages in terms of memory usage and look up time as compare to other packet filter firewall technique. List-based packet filter has to prove the best with rules promotion method, but considerably lacks its efficiency when compared to BDD-based approach. Our BDD-based design for packet filter firewall will take less storage space and less look-up time for accepting or rejecting the incoming packets. In this paper we also implement how to detect the phishing sites. CANTINA examines the content of a web page to determine whether it is legitimate or not, in contrast to other approaches that look at surface characteristics of a web page, for example the URL and its domain name. CANTINA makes use of the well-known TF-IDF (term frequency/inverse document frequency) algorithm used in information retrieval, and more specifically, the Robust Hyperlinks algorithm. They also show that we can use CANTINA in conjunction with heuristics used by other tools to reduce false positives (incorrectly labeling legitimate web sites as phishing), while lowering phish detection rates only slightly. Index Terms Domain name, Firewall, Packet, Phishing, URL. I. INTRODUCTION Packet filtering is the one of the major contemporary firewall design techniques. An important design goal is to arrive at the decision at the packet only. Implementation of such packet filter using Binary Decision Diagram (BDD) gives more advantages in terms of memory usage and look up time [9]. In the case of the list-based packet filter firewall where rules are checked one by one for each incoming packet, the time taken to decide on a packet is proportional to the number of rules [3]. A firewall is a combination of hardware and software used to implement a security policy governing the flow of network traffic between two or more networks. In its simplest form a firewall acts as a security barrier to control traffic and manage connections between internal and external network hosts. The actual means by which this is accomplished varies widely, and ranges from packet filtering and proxy service to state full inspection methods. A more sophisticated firewall may hide the topology of the network it is employed to protect, as well as other information, including names and addresses of hosts within the network. The ability of a firewall to centrally administer network security can also be extended to log incoming and outgoing traffic to allow accountability of user actions and to trigger alerts when unauthorized activities occur. Firewalls have proven to be useful in dealing with a large number of threats that originate from outside a network. They are becoming ubiquitous and indispensable to the operation of the network. The continuous growth of the Internet, coupled with the increasing sophistication of attacks, however, is placing further demands and complexity on firewalls design and management. Increased firewall complexity, undoubtedly, brings with it increased vulnerability and reduced availability of individual network services and applications. II. MOTIVATION AND OBJECTIVES The aim of this project is to find an internal representation for access lists capable of providing fast lookup with reasonable memory requirements. Since access lists are consulted frequently (that is, for each arriving packet) and modified infrequently in comparison, the ability to perform fast lookups is the most important factor. This justifies using a potentially large amount of effort initially to create an efficient internal representation. The reasoning behind why binary decision diagrams (BDDs) may be a good choice for the internal representation follows. Each rule of an access list describes the condition, based on the values of fields within the packet header that a packet must meet in order to have the corresponding action affected. Thus the condition of a rule is simply a logical, or Boolean, expression involving certain fields of the packet header to be accepted, a packet must satisfy this expression if the rule s action is accept, and not satisfy the expression if the rule s action is reject. 92
2 Binary decision diagrams (BDDs) are a well-known data structure for storing and manipulating Boolean expressions compactly and efficiently, are therefore a natural choice for representing the access lists of a packet filter. Other research has focused on the development of better user interfaces for anti-phishing tools. It helping users determine if they are interacting with a trusted site. Our work with CANTINA focuses on developing and evaluating a new heuristic based on TF/IDF (Term frequency/inverse document frequency), a popular information retrieval algorithm [10]. The investigation into BDD representations of access lists includes an analysis of: 1. Lookup algorithm complexity: Associated with the BDD representation of access lists is the lookup algorithm which uses the BDD to make filtering decisions about incoming packets. Best, worst and average case performance is considered, as well as the relationships between them. 2. Memory usage: The memory requirements of BDD representations of access lists are analyzed. BDDs cannot guarantee good space complexity for arbitrary Boolean expressions in the worst case BDD sizes can grow exponentially with the number of Boolean variables in the expression. 3. Improve the operational cost: We describe a traffic-aware optimization framework to improve the operational cost of firewalls. Based on this framework, we design a set of tools that inspect and analyze both multidimensional firewall rules and traffic logs and construct the optimal equivalent firewall rules based on the observed traffic characteristics. III. BINARY DECISION DIAGRAM A Binary Decision Diagram (BDD) is a data structure that is used to represent a Boolean function. Operations on BDDs are performed on the compressed representation of these functions. Figure 1 BDD is a rooted directed acyclic graph and consists of one or many decision nodes and two terminal nodes and edges which connect these nodes [10]. Fig 1 Example of BDD A. USE OF BDD IN PACKET FILTER FIREWALL Each packet contains header information like protocol, source address, source port, and destination address and destination port. All these are represented using numbers and can be converted in to the equivalent binary format. Suppose, the protocol is TCP and its number is 6, which can be converted to binary as For example purpose we give the sample access list in the following table. 93
3 Table 1 Sample access list containing rules B. DESIGN AND IMPLEMENTATION OF ALGORITHM In this section we are going to discuss about the implementation details and what are the modules implemented for the successful completion of the packet filter firewall project. 1. Development of a Module to generate binary File We have implemented a module which automatically takes the access list as input and gives the corresponding binary file as output. Input: Rule List Output: containing binary form of the rule list. 1. Take each rule from the rule list. 2. Extract the protocol number, source address and port, and destination address and port. 3. Convert each part in to its binary format in required number of bits. 4. Store the each part of the converted binary form in to the file. 2. Development of a Packet Filter In this module packet filter firewall takes the binary file as the input file and decides the action of the incoming and outgoing packets Algorithm: BDD Lookup algorithm Input: binary form file. Output: ACCEPT or REJECT the packet. if (solid) then final_op = 1 final_op = 0 lookup_ptr=first node of the BDD while(lookup_ptr == 1 OR lookup_ptr == 0) if (header_bits[lookup_ptr] == 1) lookup_ptr = high (lookup_ptr) lookup_ptr = low (lookup_ptr) if (lookup_ptr ==1) then ACCEPT the packet REJECT the packet 94
4 This algorithm searches the BDD generated according to the rule set for which the BDD is given. There after it takes the each bit of the header and compares with the BDD. Once all the bits in the header are checked by traversing the BDD from root to leaf node the decision of packet's acceptability is considered. Normally the packet filter information is stored in a 2-dimensional vector, which contains the information all BDD nodes and their high and low edge values. 3. Algorithm of list-based packet filter with promotion. Extract the incoming packet header information. While access list is not empty final result = 1 do if action = PERMIT then ACCEPT the packet rule hit count[rule no]++ if action = DENY then REJECT the packet rule hit count[rule no]++ rule action is not defined end if end while if access list is empty final result = 0 then REJECT the packet end if //In the next iteration alter access list according to the rule hit count. Algorithm 3 finds which rule is hit in the current iteration and it increments the number of counts of the corresponding rule. Likewise, we need to observe the large chunk of traffic data coming daily or weekly and find the correct order of the access list based on the promotion made on the rules. After all the packets are passed through the access list the algorithm sorts the list based on the descending order of the hit count of each rule. Thus list promotion helps the firewall to decide early on packets accept/reject decision as these are mostly hit by the most active rules present on top of the new list. IV. A CONTENT BASED APPROACH FOR DETECTING PHISHING WEBSITES CANTINA makes use of TF-IDF for detecting phishing sites. TF/IDF is a well-known information retrieval algorithm that can be used for comparing and classifying documents, as well as retrieving documents from a large corpus. In this algorithm, we describe how adapted Robust Hyperlinks for detecting phishing web sites. CANTINA works as follows: Given a web page, calculate the TF-IDF scores of each term on that web page. Generate a lexical signature by taking the five terms with highest TF-IDF weights. Feed this lexical signature to a search engine, which in our case is Google. If the domain name of the current web page matches the domain name of the N top search results, consider it to be a legitimate web site. Otherwise, we consider it a phishing site. We weighted these heuristics. Our heuristics included in Table 2: Heuristic Age of Domain Known Images a domain Suspected Phishing? <= 12 months Page contains any known logos and not on owned by logo owner Suspicious URL URL or - 95
5 Suspicious Links Link on page or - IP Address Dots in URL URL contains IP address >= 5 dots in URL Table 2 Heuristics used to reduce false positives A. ALGORITHM BASIC TF- IDF+DOMAIN+ZMP It is combination of the TF-IDF is calculate lexical signature based on the top 5 terms, submit that to Google, and check if the domain name of the page in question matches any of the top 30 results. ZMP is zero search results means that the page in question is labeled as a phishing site (ZMP is zero means phishing ) variants above. This combination turned out to have the best results, and is also called Final-TF-IDF. We also presented an evaluation of CANTINA, showing that the pure TF-IDF approach can catch about 97% phishing sites with about 6% false positives, and after combining some simple heuristics we are able to catch about 90% of phishing sites with only 1% false positives. Fig 2. Comparison of Basic TF-IDF+domain+zmp algorithm with varying search results V. CONCLUSION In the last, conclusion of the project is to represent the access list in the form of BDD and implementation of such BDD-based packet filter firewall. List-based packet filter was proven to be the best with rules promotion method, but considerably lacks its efficiency when compared to BDD-based approach. Our BDD-based design for packet filter firewall takes less space for storage and less look-up time for accept or reject the incoming packets. It is the first effort in using firewall traffic log information to design and optimize firewall rules sets. Both rule set based and traffic based optimizations are integrated in our firewall accelerating tool. The paper also introduces a novel adaptive anomaly detection/countermeasure mechanism to deal with short term and long term anomalies. We have started our efforts to validate the size and cost metrics and the optimization results. Furthermore, we are working on an efficient implementation for the algorithms to reduce the processing overheads of optimizations in the existing prototype. We also presented the design and evaluation of CANTINA, a novel content-based approach for detecting phishing web sites. CANTINA takes Robust Hyperlinks, an idea for overcoming page not found problems using the well-known Term Frequency / Inverse Document Frequency (TF-IDF) algorithm, and applies it to anti-phishing. We described our implementation of CANTINA, and discussed some simple heuristics that can be applied to reduce false positives. We believe this paper is the first step in the design of a complete accelerating toolkit for firewall optimization. 96
6 REFERENCES [1] K. Ingham and S. Forrest, "A History and Survey of Network Firewalls", Technical Report , University of New Mexico Computer Science Department, [2] C. Shen, T. Chung, Y. Chang and Y. Chen, "PFC: A New High Performance Packet Filter Architecture", Journal of Internet Technology, Vo1.8, No.1, Page (s): 67-74, [3] S. Acharya, J. Wang, Z. Ge, T. Znati and A. Greenberg, 'Traffic Aware Firewall Optimization Strategies", Proceedings of ICC, Page (s): , [4] M. Christiansen and E. Fleury, "An MTIDD Based Firewall", Telecommunication Systems 27:2-4, Page(s): , [5] E. W. Fulp and S. J. Tarsa, "Trie-Based Policy Representations for Network Firewalls", Proceedings of ISCC, Page(s): , [6] S. B. Akers, "Binary decision diagrams", Transaction on Computers, Vol. C-27(6), Page(s): , [7] R. E. Bryant, "Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams", ACM Computing Surveys, Vol. 24, No.3, Page(s): , [8] S. Hazelhurst, A. Fatti and A. Henwood, "Binary Decision Diagram Representations of Firewall and Router Access Lists", jtp:/(ftp.cs. wits.ac.zalpublresearchlreportsitr-wi, [9] G Paul, A Pothnal, C Mandal, B B Bhattacharya Design and Implementation of Packet Filter Firewall using Binary Decision Diagram Proceeding of the 2011 IEEE Students' Technology Symposium14-16 January, 2011, lit Kharagpur [10] Yeu Zhang, Jason Hong and Lorrie Cranor CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. 97
Design and Implementation of Stateful Packet Filtering Firewall and optimization using Binary Decision Diagram
Design and Implementation of Stateful Packet Filtering Firewall and optimization using Binary Decision Diagram A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF Bachelor of
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Firewall Policy Change-Impact Analysis
15 Firewall Policy Change-Impact Analysis ALEX X LIU, Michigan State University Firewalls are the cornerstones of the security infrastructure for most enterprises They have been widely deployed for protecting
A Hybrid Approach to Detect Zero Day Phishing Websites
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1761-1770 International Research Publications House http://www. irphouse.com A Hybrid Approach
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Trie-Based Policy Representations for Network Firewalls
Proceedings of the IEEE International Symposium on Computer Communications, 2005 Trie-Based Policy Representations for Network Firewalls Errin W. Fulp and Stephen J. Tarsa Wake Forest University Department
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
International Journal of Network Security, Vol.7, No., PP.5-59, 5 Firewall Policy Diagram: Structures for Firewall Behavior Comprehension Patrick G. Clark and Arvin Agah (Corresponding author: Patrick
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Achta's IBAN Validation API Service Overview (achta.com)
Tel: 00 353 (0) 14773295 e: [email protected] Achta's IBAN Validation API Service Overview (achta.com) Summary At Achta we have built a secure, scalable and cloud based API for SEPA. One of our core offerings
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Ashish Tapdiya and Errin W. Fulp Department of Computer Science Wake Forest University Winston Salem, NC, USA nsg.cs.wfu.edu Email:
The Research and Application of Multi-Firewall Technology in Enterprise Network Security
, pp. 53-6 http://dx.doi.org/0.457/ijsia.05.9.5.6 The Research and Application of Multi-Firewall Technology in Enterprise Network Security Jing Li College of Information Engineering, Qingdao University,
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS Sherif Yusuf and Wayne Luk Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ email: {sherif.yusuf, w.luk}@imperial.ac.uk
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
A Model Design of Network Security for Private and Public Data Transmission
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
83-10-41 Types of Firewalls E. Eugene Schultz Payoff
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Internet Security Firewalls
Internet Security Firewalls Ozalp Babaoglu ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA Overview Exo-structures Firewalls Virtual Private Networks Cryptography-based technologies IPSec Secure Socket Layer
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Optimization of Firewall Filtering Rules by a Thorough Rewriting
LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Chapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
IP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Comparison of Firewall and Intrusion Detection System
Comparison of Firewall and Intrusion Detection System Archana D wankhade 1 Dr P.N.Chatur 2 1 Assistant Professor,Information Technology Department, GCOE, Amravati, India. 2 Head and Professor in Computer
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
THE Internet is an open architecture susceptible to various
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 10, OCTOBER 2005 1 You Can Run, But You Can t Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers Terence K.T. Law,
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
