NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security
|
|
|
- Asher Dixon
- 10 years ago
- Views:
Transcription
1 NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign NANOG36 Dallas Texas, February 2006
2 Overview Project Motivation NetFlows for Security Two Visualization Tools NVisionIP VisFlowConnect-IP Summary
3 Project Motivation
4 Internet Security: N-Dimensional Work Space large complex time dynamics Visualization can help! in near-realtime overview browse details on-demand
5 NetFlows for Security
6 NetFlows for Security NetFlows can identify connection-oriented attacks like DoS, DDoS, malware distribution, worm scanning, etc How many users are on the network at any given time? (upgrades) Who are my top N talkers? How long do my users surf? Where do they go? Where did they come from? Are users following the security policy? What are the top N Destination ports? Is there traffic to vulnerable hosts? Can you identify and block scanners/bad guys?
7 NCSA s NetFlows Architecture
8 Two NetFlows Visualization Tools Tool 1: NVisionIP Tool 2: VisFlowConnect-IP
9 NVisionIP
10 NVisionIP: 3-Level Level Hierarchical Views Designed for Overview Browse Details on Demand Galaxy View / Small Multiple View / Machine View
11 NVisionIP: Galaxy View clock timestamp This represents an entire Class B address space. Every IP address is represented as a dot and the color of that dot represents a user selectable characteristic such as bytes transferred or connections made. Color Legend Characteristics to view: 1) Protocol (TCP/UDP/ICMP/other) 2) Port 3) Bytes/Connections 4) Source/Destination/Aggregate Animation Toolbar
12 NVisionIP: Small Multiple View NVisionIP Small Multiple Well Known Ports Ports > 1024 This is a moveable window over a Class B address space with each box representing one IP address. Histograms within each box represent port traffic (no traffic not an active IP address)
13 Well Known Ports NVisionIP: Machine View NVisionIP- Machine Machine View view Selection Tabs (11) Ports > 1024 Aggregate Traffic (Both Source and Destination) Source Traffic Top - Well Known Ports Bottom Ports > 1024 Destination Traffic Top - Well Known Ports Bottom Ports > 1024
14 VisFlowConnect-IP NVisionIP
15 VisFlowConnect-IP File I/O Net Domain clock highlighted ports VCR controls highlighted flow time window time axis timestamp outside domains axis inside hosts axis outside domains axis
16 VisFlowConnect-IP VisFlowConnect-IP NVisionIP Domain View see activity within an external network domain
17 Example 1: MS Blaster MS Blaster virus causes machines to send out packets of size 92 to many machines
18 Example 2: Grid Networking cluster-to to-cluster cluster communications multiple connections to NCSA cluster from same domain (scan?, DoS?)?) Source: consecutive IP addresses Destination: consecutive IP addresses
19 Example 3: Web Crawlers muitiple crawlers indexing NCSA web server content Web crawlers NCSA web servers
20 VisFlowConnect-IP Internal View Internal network sources Internal network receivers
21 Summary NetFlows analysis is non-trivial, however, the potential payoff is large Flow-Analysis Community Homepage < Go with the Flow (NetFlows) 1.NVisionIP 2.VisFlowConnect VisFlowConnect-IP
22 NVisionIP < References William Yurcik, " Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite," 19th Usenix Large Installation System Administration Conference (LISA), San Diego, CA USA, December Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, and William Yurcik " Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations," 2nd International Workshop on Visualization for Computer Security (VizSEC), held in conjunction with IEEE Vis 2005 and IEEE InfoVis 2005, October Ratna Bearavolu, Kiran Lakkaraju, and William Yurcik, " NVisionIP: An Animated State Analysis Tool for Visualizing NetFlows," FLOCON - Network Flow Analysis Workshop (Network Flow Analysis for Security Situational Awareness), Sept Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, and William Yurcik, " Closing-the-Loop: Discovery and Search in Security Visualizations," 6th IEEE Information Assurance Workshop (The West Point Workshop), United States Military Academy at West Point, New York USA, June Kiran Lakkaraju, William Yurcik, Adam J. Lee, Ratna Bearavolu, Yifan Li, and Xiaoxin Yin, " NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness," CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) held in conjunction with the 11th ACM Conference on Computer and Communications Security, Kiran Lakkaraju, William Yurcik, Ratna Bearvolu, and Adam J. Lee, "NVisionIP: An Interactive Network Flow Visualization Tool for Security," IEEE International Conference on Systems, Man and Cybernetics (SMC), Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, and William Yurcik, " Correlation Between NetFlow System and Network Views for Intrusion Detection," Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with the SIAM International Conference on Data Mining (ICDM), William Yurcik, Kiran Lakkaraju, James Barlow, and Jeff Rosendale, " A Prototype Tool for Visual Data Mining of Network Traffic for Intrusion Detection," 3rd IEEE International Conference on Data Mining (ICDM) Workshop on Data Mining for Computer Security (DMSEC), Ratna Bearavolu, Kiran Lakkaraju, William Yurcik, and Hrishikesh Raje, " A Visualization Tool for Situational Awareness of Tactical and Strategic Security Events on Large and Complex Computer Networks," IEEE Military Communications Conference (Milcom), Kiran Lakkaraju, Ratna Bearavolu, and William Yurcik, " NVisionIP - A Traffic Visualization Tool for Security Analysis of Large and Complex Networks," International Multiconference on Measurement, Modelling, and Evaluation of Computer-Communications Systems (Performance TOOLS), William Yurcik, James Barlow, and Jeff Rosendale, " Maintaining Perspective on Who Is The Enemy in the Security Systems Administration of Computer Networks," ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems, William Yurcik, James Barlow, Kiran Lakkaraju, and Mike Haberman, "Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements," ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC), 2003.
23 VisFlowConnect-IP < References William Yurcik, " Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite," 19th Usenix Large Installation System Administration Conference (LISA), San Diego, CA USA, December Xiaoxin Yin, William Yurcik, and Adam Slagell, " VisFlowConnect-IP: An Animated Link Analysis Tool for Visualizing Netflows," FLOCON - Network Flow Analysis Workshop (Network Flow Analysis for Security Situational Awareness), Sept Xiaoxin Yin, William Yurcik, and Adam Slagell, " The Design of VisFlowConnect-IP: a Link Analysis System for IP Security Situational Awareness," Third IEEE International Workshop on Information Assurance (IWIA) University of Maryland, Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, and Kiran Lakkaraju " VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness," CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) held in conjunction with the 11th ACM Conference on Computer and Communications Security, Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, Cristina Abad, " VisFlowConnect: Providing Security Situational Awareness by Visualizing Network Traffic Flows ", 23rd IEEE International Performance Computing and Communications Conference(IPCCC), Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, and William Yurcik, " Correlation Between NetFlow System and Network Views for Intrusion Detection," Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with the SIAM International Conference on Data Mining (ICDM), 2004.
24 Q & A NVisionIP < VisFlowConnect-IP <
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite William Yurcik National Center for Supercomputing Applications (NCSA) ABSTRACT The first step in improving Internet security is measurement
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure William Yurcik* Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham University
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign [email protected]
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik and Yifan Li National Center for Supercomputing Applications (NCSA) University
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Teryl Taylor, Stephen Brooks and John McHugh Abstract NetBytes Host Viewer is an interactive visualization
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
Preserving the Big Picture: Visual Network Traffic Analysis with TNV John R. Goodall Wayne G. Lutters Penny Rheingans Anita Komlodi University of Maryland, Baltimore County ABSTRACT When performing packet-level
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
Preserving the Big Picture: Visual Network Traffic Analysis with TNV John R. Goodall Wayne G. Lutters Penny Rheingans Anita Komlodi University of Maryland, Baltimore County ABSTRACT When performing packet-level
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security Abstract Yifan Li, Adam Slagell, Katherine Luo, William Yurcik National Center for Supercomputing Applications
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
Flamingo: Visualizing Internet Traffic
Flamingo: Visualizing Internet Traffic Jon Oberheide, Michael Goff, Manish Karir Networking Research and Development Merit Network Inc. Ann Arbor, MI 48104 USA {jonojono,goffm,mkarir}@merit.edu Abstract
Adam J. Slagell Phone: +1.217.390.3837 2321 Phinney Dr E-mail: [email protected]
Adam J. Slagell Contact Information Adam J. Slagell Phone: +1.217.390.3837 2321 Phinney Dr E-mail: [email protected] Champaign, IL 61821, USA WWW: www.slagell.info Activities & Research Interests Security
Flow Visualization Using MS-Excel
Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program Background US-CERT Mission Einstein Program > Large volumes of traffic
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks Florian Mansmann, Fabian Fischer, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel [email protected] Abstract: While
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows Adam Slagell, Jun Wang, William Yurcik National Center for Supercomputing Applications University of Illinois at Urbana-Champaign
InetVis: a Graphical aid for the Detection and Visualisation of Network Scans
InetVis: a Graphical aid for the Detection and Visualisation of Network Scans Barry V.W. Irwin and Jean-Pierre van Riel Abstract This paper presents an investigative analysis of network scans and scan
PennAnalytics: Network Visualization and Analytics
PennAnalytics: Network Visualization and Analytics Patrick Wingo [email protected] Dept. of CIS - Senior Design 2013-2014 Daniel Ge [email protected] Aubrey Chase [email protected] 1. ABSTRACT
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Analysis of Network Beaconing Activity for Incident Response
Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Monitoring Network Traffic with Radial Traffic Analyzer
Monitoring Network Traffic with Radial Traffic Analyzer Daniel A. Keim Florian Mansmann Jörn Schneidewind Tobias Schreck Databases and Visualization Group University of Konstanz, Germany {keim,mansmann,schneide,schreck}@inf.uni-konstanz.de
A Visualization Paradigm for Network Intrusion Detection
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 17 19 June 2005 A Visualization Paradigm for Network Intrusion Detection Yarden
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University
Analysis of Automated Model against DDoS Attacks
Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization
Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization Sven Krasser, Member, IEEE; Gregory Conti, Member, IEEE; Julian Grizzard, Member, IEEE; Jeff Gribschaw, Member,
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries Gregory Conti, Julian Grizzard, Mustaque Ahamad and Henry Owen Georgia Institute of Technology
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Analysis of Communication Patterns in Network Flows to Discover Application Intent
Analysis of Communication Patterns in Network Flows to Discover Application Intent Presented by: William H. Turkett, Jr. Department of Computer Science FloCon 2013 January 9, 2013 Port- and payload signature-based
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Flow-based Worm Detection using Correlated Honeypot Logs
Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System Daisuke Inoue [email protected] Koei Suzuki [email protected] Mio Suzuki [email protected] Masashi Eto [email protected] Koji
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
An Adaptable Innovative Visualization For Multiple Levels of Users
World Applied Sciences Journal 15 (5): 722-727, 2011 ISSN 1818-4952 IDOSI Publications, 2011 An Adaptable Innovative Visualization For Multiple Levels of Users Doris Hooi-Ten Wong and Sureswaran Ramadass
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansmann, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansman, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
Log Correlation for Intrusion Detection: A Proof of Concept
Log Correlation for Intrusion Detection: A Proof of Concept Cristina Abad [email protected] Jed Taylor [email protected] Yuanyuan Zhou [email protected] Cigdem Sengul [email protected] Ken Rowe [email protected]
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Nfsight: NetFlow-based Network Awareness Tool
Nfsight: NetFlow-based Network Awareness Tool Robin Berthier Coordinated Science Laboratory Information Trust Institute University of Illinois Urbana-Champaign, IL, USA [email protected] Michel Cukier The
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
Security and Access Control Lists (ACLs)
Security and Access Control Lists (ACLs) Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Security Threats Access Control List Fundamentals Access
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Flow-Inspector: A Framework for Visualizing Network Flow Data using Current Web Technologies
Flow-Inspector: A Framework for Visualizing Network Flow Data using Current Web Technologies Lothar Braun Mario Volke Johann Schlamp Alexander von Bodisco Georg Carle November 8, 2012 Abstract New web
Obfuscation of sensitive data in network flows 1
Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
