Team Cymru. Network Forensics. Ryan Connolly, <
|
|
|
- Gervais Benson
- 10 years ago
- Views:
Transcription
1 Team Cymru Network Forensics Ryan Connolly, <
2 Network Forensics what does it mean? network forensics is the analysis of network events in order to discover the source of problem incidents.
3 What sort of problem incidents? aka network badness? lots of things - for this discussion, let's talk primarily about botnets
4 Why botnets? Botnets are currently the most significant force behind many miscreant activities that make our lives as network operators -- and as citizens of the internet -- more difficult. Botnets allow criminals to make money - DDoS, warez, phishing, financial crimes, etc Bottom line: It's all about the money... but that's another talk.
5 We ve seen BotNets with over 28,000,000 hosts! Attacker Command & Control Servers Compromised drones Types: agobot, forbot, gtbot, phatbot, rbot, rxbot, sdbot, phatbot, storm, etc, etc.
6 Creation of a botnet Scan & sploit it still works many, many vulnerabilities, and more every day Scanning entire /8 takes approximately 32 hours. Bad neighborhoods most popular - cable & DSL ranges home users are less protected how about that VPN connection? Malware attached to s (i.e. socially-engineered spreading) Files transferred via Instant Messaging programs Flaws in Internet Explorer, Firefox, and many, many others etc, etc, etc attacks are against all platforms (*NIX, Windows XP/2000/98/etc, Mac OS), in many ways no one is safe!
7 Botnet scan & sploit
8 Creation of a botnet phone home," usually using DNS, sometimes using a hard-coded IP Bots join a channel on the IRC server and wait to accept commands HTTP-based bots increasing harder to detect P2P bots: Phatbot, Superbot, Storm Increasingly encrypted & obfuscated connections to C&C Distributed C&Cs need for coordinated takedown
9 Botnet ops while (1) { pain(); } stealing access credentials -- especially to financial sites (keylogging) phishing (running a HTTP server) Spread further.advscan lsass r s Attempt to exploit machines with the lsass vulnerability. Scan with 100 concurrent threads and delay of 10 seconds randomly (-r) and silently (-s) for an unlimited time (0). DDoS.ddos.syn ddos on port 21 for 300 seconds malware hosting & distribution (running a FTP/HTTP server) open proxies & bounces spam (send directly or use as a mail relay) adware
10 Preventative measures Ah, but how to ease the pain? (1) Social factor - how do you get users to stop clicking on bad attachments & protect against social engineering attacks? (2) Administrative factor - how do you get admins to install & stay up-to-date with necessary patches? (3) Engineering factor - how do you get software developers to write secure code? (4) Criminal factor how do you remove the motivation to commit on-line crime? When you know the answers to these, PLEASE, let me know!
11 So, for now, we need to make the bad guy's life more difficult. Objective: deter miscreants from committing online crime.
12 Botnets - How do we find them? Network Forensics (1) Watch flows (2) Watch DNS (3) Effectively use Darknets (4) Sniffing (5) Sandboxing (6) Malware analysis
13 Collecting flows Web server Internet uplink :53: TCP :3575 -> :80.AP.SF Internal network Client Flow collector
14 Collecting flows enabling A generic Cisco example: interface fastethernet 0/0 ip route-cache flow collection Set to netflow version 5 and set timeout: ip flow-export <ip> <port> ip flow-export version 5 Break-up long flows into 5 minute segments (should be less than your file rotation time): ip flow-cache timeout active 5
15 nfcapd Collecting flows enabling Flow collector Listens for flows on a given port and stores the data into files that are rotated a pre-set number of minutes One nfcapd per flow stream collection Example: nfcapd w D l /var/log/flows/router1 p nfcapd w D l /var/log/flows/router2 p w: sync file rotation with next 5 minute interval -D: fork to background -l: location of log file
16 Collecting flows enabling May wish to use nfdump on the resulting files to insert flow records into a database Stager: system for aggregating and presenting network statistics. Collects & stores network info (netflow, SNMP, MPing) in a database Provides a web front-end collection
17 Watching flows Total network awareness Date Duration Source IP:Port TCP flags Packets Flows :53: TCP :25 -> :3575.AP.SF :53: TCP :3575 -> :25.AP.SF Start time Protocol Destination IP:Port Bytes Type of Service
18 Watching flows nfdump Sort flows by total number of bytes Packets Bytes pps bps Bpp Flows 1.4 M 2.0 G M # nfdump -r nfcapd o extended -s srcip -s ip/flows -s dstport/pps/packets/bytes -s record/bytes Top 10 flows ordered by bytes: Date flow Prot Src IP Addr:Port Dst IP Addr:Port Flags Tos Packets Bytes pps bps Bpp Flows TCP : > : M 2.0 G M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M TCP : > : M M the possibilities are endless
19 Watching flows nfdump # nfdump r nfcapd_file A src,dstport c 10 src ip See scanning on your network Date flow start Prot Src IP Addr:Port Dst IP Addr:Port Packets Bytes :02:12 TCP : > : B :02:12 TCP : > : B :02:12 TCP : > : B :02:12 TCP : > : B :02:12 TCP : > : B :02:13 TCP : > : B :02:13 TCP : > : B :02:13 TCP : > : B :02:13 TCP : > : B :02:13 TCP : > : B
20 Watching flows nfsen a graphical interface!
21 Watching flows nfsen a graphical interface!
22 Watching flows Identify DDoS sources DDoS sources are very likely compromised devices (assuming they aren t spoofed).
23 Watching flows Total network awareness By examining flows, you ve noticed that has scanned 100 hosts in your network on UDP port 1434, with a 404-byte packet (characteristic of slammer). Looking at flows to/from , you see connections to your company mail server, news sites, google, etc, and to the following: Date flow start Prot Src IP Addr:Port Dst IP Addr:Port Packets Bytes :02:12 TCP : > : B Using the Cymru whois IP-to-BGP server, you see a connection to Swift Global, an ISP in Kenya.: # whois -h whois.cymru.com AS IP AS Name SWIFTGLOBAL-AS Logging-on to the IRC server, you identify channels with topics set to things like,.http.update c:\windows\msy32awds.exe 1". Users within the channels have cryptic nicks, such as [XP]
24 Collecting flows Stager
25 Collecting flows Stager
26 Watching flows Total network awareness By examining flows to/from known C&C servers, you ll identify machines compromised in your network and other networks. it greatly helps to be a part of a trusted community that shares this sort of info...but more on that in a minute! Useful flow-related tools: nfsen/nfdump ( fprobe ( SiLK ( Stager ( flow-tools ( InMon ( ntop ( Argus (
27 Watching DNS To find compromised devices & identify C&Cs known bad DNS names very useful DNS query logging is essential short TTLs in a DNS A record are indicative of a C&C TTLs are used to determine how long to cache the record before updating it dnswatch/dig # dig hackerdomain.com A hackerdomain.com 60 IN A <ip address> Repetitive A queries - a bot? Repetitive MX queries - a spam bot? known bad DNS names - it helps to be a part of a community that finds & shares known bad DNS names...but more on that in a minute.
28 Darknets What is a Darknet? Routed, allocated IP space in which (seemingly) no active servers or services reside Any traffic that enters a Darknet is aberrant; little chance of false positives Can use flow collectors, backscatter detectors, sniffers and/or IDS boxes for further analysis Similar ideas: CAIDA (Network Telescope) and University of Michigan (Internet Motion Sensor)
29 allocations of external IP space Darknets Watch your Dark Space! Allocated Unallocated Allocated Unallocated Allocated Unallocated Allocated Unallocated Allocated Unallocated Allocated Unallocated allocations of internal IP space
30 Collector Darknets Watch your Dark Space! Allocated Unallocated Allocated Unallocated Allocated Unallocated Argus: tcpdump Darknet set-up:
31 Darknets Watch your Dark Space! ra program to analyze Argus output ( Find connections characteristic of dameware: # ra -r./argus.out.9 -n tcp and dst port Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST 22 Aug 06 07:24:28 tcp > xxx.yyy RST # whois h whois.cymru.com [Querying whois.cymru.com] [whois.cymru.com] AS IP AS Name ASN-IBSNAZ TELECOM ITALIA CANINE: converts from Argus to netflow format. (
32 Darknets Watch your Dark Space!
33 Darknets Watch your Dark Space! inward-facing AND outward-facing If you ran a bank -- would you put security cameras inside your bank, in the parking lot, or both?
34 Darknets inward-facing most malware scans the compromised host s /16 for vulnerabilities. allows you to identify hosts within your network that are scanning your local address space in other words, compromised hosts WITHIN your local address space. something you'd like to know about, right?
35 Darknets inward-facing Unless you re conducting a pentest or vulnerability scan, you shouldn t see scans inside your own network. Things to watch for inside your network: Attempted connections to ports associated with known vulnerabilities Attempted connections to known malware listening ports Any scanning activity. not to mention the obvious, but wherever this activity is originating from, you have a problem.
36 Darknets outward-facing allows you to see who is scanning you who is trying to cause you pain? with what? Internet garbage meter Witty Worm
37 Darknets outward-facing Signature Recognition Dest TCP/445 = Scanning for Win2K Open Shares Dest UDP/1434 and size 404 bytes = Slammer Scans New malware catch it in beta!
38 Sandboxing run malware in a virtual environment to determine actions what domain name does the malware look-up, or what IP does it try to connect to? Identify modified files, registry entries, and other changes to the system Identify patterns of network activity which can then be applied to the darknets & flow collectors to identify this malware. Identify new trends in malware development see where the miscreants are headed! Norman ( to make this work, also need to collect malware some malware detects some sandboxing environments and will cease execution economies of scale he with the biggest collection has the best security or, he with the best community has the best security but more on that in a minute.
39 Watch Network Traffic sniff network traffic for common botnet commands & return traffic. SDBot: advscan asc [port method] [threads] [delay] [minutes] Agobot: cvar.set spam_aol_channel [channel] 000 : D D PRIVMSG #message 010 : A 5B 6C F D 3A s# :[lsass_445]: 020 : C 6F E A 20 Exploiting IP: 030 : E E 34 2E E 0D 0A List of AgoBot, SDBot, & UrXBot commands:
40 Watch Network Traffic Use snort signatures to identify common bot C&C traffic alert tcp any any -> any 6667 (msg:"irc BOT 1 - lsass"; flow:to_server,established; content:"lsass"; nocase:; classtype:bad-unknown; sid: ; ev:1;) Increasing trend in encrypted IRC channels for C&Cs, which makes either of these techniques problematic
41 also works, but: Malware Analysis miscreant countermeasures (packing, etc) can make this especially difficult Wouldn't you rather analyze flows? :-)
42 Collaboration If your organization is doing these: 1) watching flows to identify C&Cs 2) discovering rogue domain names 3) using Darknets to identify compromised devices 4) sandboxing to analyze malware 5) sniffing traffic to find bots 6) doing malware analysis Then you produce these: C&C IPs & domain names (within and outside your network) IPs of compromised devices (within and outside your network) We highly suggest collaborating with your communities of choice to share the above information!
43 Thank you! Questions? Ryan Connolly,
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Netflow For Incident Detection 1
Netflow For Incident Detection 1 Michael Scheck / Cisco CSIRT [email protected] Introduction Netflow is often deployed for network billing, auditing, and accounting. However, Netflow can also be for incident
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
An overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT [email protected] 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
DDoS Attacks & Mitigation
DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
[Optional] Network Visibility with NetFlow
[Optional] Network Visibility with NetFlow TELE301 Laboratory Manual Contents 1 NetFlow Architecture........................... 1 2 NetFlow Versions.............................. 2 3 Requirements Analysis...........................
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
Network attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
7. Exercise: Network Forensic
60 CERT Exercises Handbook 7. Exercise: Network Forensic Main Objective Targeted Audience Total Duration The objective of the exercise is to familiarize students with standard network monitoring tools,
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
CS 6262 - Network Security: Botnets
CS 6262 - Network Security: Botnets Professor Patrick Traynor Fall 2011 Story 2 Botnets A botnet is a network of software robots (bots) run on zombie machines which run are controlled by command and control
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC
Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC Background and Overview The Computer Security Incidents Internet2 (CSI2) working group organizes activities to better identify
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Network Security Monitoring and Behavior Analysis Best Practice Document
Network Security Monitoring and Behavior Analysis Best Practice Document Produced by CESNET led working group on network monitoring (CBPD133) Author: Pavel Čeleda September 2011 TERENA 2011. All rights
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Overview of Network Traffic Analysis
Overview of Network Traffic Analysis Network Traffic Analysis identifies which users or applications are generating traffic on your network and how much network bandwidth they are consuming. For example,
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
AT&T Real-Time Network Security Overview
AT&T Real-Time Network Security Overview Dan Solero Director of Security Technology, AT&T Know Your Enemy: Security Threats Extend Beyond Viruses & Worms Distributed Denial of Service Spam for Hire Social
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
IDS and Penetration Testing Lab IIIa
IDS and Penetration Testing Lab IIIa Dissecting a Botnet C&C - rbot Triggering Lab Malware operation Upon execution malware connects to botirc.net server and establishes standard IRC session with #test
Using Argus to analyse network flows. David Ford OxCERT Oxford University Computer Services
Using Argus to analyse network flows David Ford OxCERT Oxford University Computer Services What are network flows? A convenient way of representing traffic on your network Contain a timestamp, the source/
Building an Early Warning System in a Service Provider Network
Building an Early Warning System in a Service Provider Network Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom [email protected] - http://www.securite.org/nico/ version 1.1 Building
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
7. Exercise: Network Forensic
CERT Exercises Toolset 59 7. Exercise: Network Forensic Main Objective Targeted Audience Total Duration The objective of the exercise is to familiarize students with standard network monitoring tools,
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross [email protected] Charles Herring [email protected] 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details
Open Source Security Tool Overview
Open Source Security Tool Overview Presented by Kitch Spicer & Douglas Couch Security Engineers for ITaP 1 Introduction Vulnerability Testing Network Security Passive Network Detection Firewalls Anti-virus/Anti-malware
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Lab exercise: Working with Wireshark and Snort for Intrusion Detection
CS 491S: Computer and Network Security Fall 2008 Lab exercise: Working with Wireshark and Snort for Intrusion Detection Abstract: This lab is intended to give you experience with two key tools used by
MITB Grabbing Login Credentials
MITB Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them,
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Real-Time Collaborative Network Monitoring and Control Using the Open Source L3DGE system
Real-Time Collaborative Network Monitoring and Control Using the Open Source L3DGE system Warren Harrop [email protected] FAQ : Who are you? How did you get into my house? PhD candidate at the Centre for
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com Claim: Before I proceed, I would like to make it clear about the topic I gonna deliver, I'm not
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
User Documentation nfdump & NfSen
User Documentation nfdump & NfSen 1 NFDUMP This is the combined documentation of nfdump & NfSen. Both tools are distributed under the BSD license and can be downloaded at nfdump http://sourceforge.net/projects/nfdump/
The Evolution of Information Security at Wayne State University
The Evolution of Information Security at Wayne State University Nathan W. Labadie [email protected] Sr. Systems Security Specialist Wayne State University A Bit of Background Covers mid-2000 to present.
