Network Security: Attacks and Defenses

Size: px
Start display at page:

Download "Network Security: Attacks and Defenses"

Transcription

1 Network Security: Attacks and Defenses Christian CALLEGARI Department of Information Engineering University of Pisa PhD Winter School IP Traffic Characterization and Anomaly Detection 8th - 12th February Turin, Italy

2 Acknowledgments C. Callegari Network Security: Attacks and Defenses 2 / 95

3 Short Bio Post-Doctoral Fellow with the Telecommunication Network research group at the Dept. of Information Engineering of the University of Pisa B.E. degree in 2002 from the University of Pisa, discussing a thesis on Network Firewalls M.S. degree in 2004 from the University of Pisa, discussing a thesis on Network Simulation PhD in 2008 from the University of Pisa, discussing a thesis on Network Anomaly Detection Contacts Dept. of Information Engineering Via Caruso Pisa - Italy christian.callegari@iet.unipi.it C. Callegari Network Security: Attacks and Defenses 3 / 95

4 What about you? C. Callegari Network Security: Attacks and Defenses 4 / 95

5 Outline 1 Introduction 2 Network Anomalies 3 Intrusion Detection Systems C. Callegari Network Security: Attacks and Defenses 5 / 95

6 Outline Introduction 1 Introduction Basic Principles Intruders Intrusions 2 Network Anomalies 3 Intrusion Detection Systems C. Callegari Network Security: Attacks and Defenses 6 / 95

7 Network Security Introduction Basic Principles Definition from Wikipedia In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. C. Callegari Network Security: Attacks and Defenses 7 / 95

8 Information Security Introduction Basic Principles Definition from Wikipedia Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction C. Callegari Network Security: Attacks and Defenses 8 / 95

9 Who is vulnerable? Introduction Basic Principles Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK C. Callegari Network Security: Attacks and Defenses 9 / 95

10 Cornstones Introduction Basic Principles Confidentiality Availability Integrity Authenticity Non-repudiation C. Callegari Network Security: Attacks and Defenses 10 / 95

11 Confidentiality Introduction Basic Principles Definition Confidentiality has been defined by the International Organization for Standardization (ISO) in ISO as ensuring that information is accessible only to those authorized to have access Confidentiality is one of the design goals for many crypto-systems Possible solutions: cryptography, IPSec C. Callegari Network Security: Attacks and Defenses 11 / 95

12 Availability Introduction Basic Principles Definition The degree to which a system, subsystem, or equipment is operable and in a committable state at the start of a mission, when the mission is called for at an unknown, i.e., a random, time. Simply put, availability is the proportion of time a system is in a functioning condition C. Callegari Network Security: Attacks and Defenses 12 / 95

13 Integrity Introduction Basic Principles Definition Data integrity is data that has a complete or whole structure. All characteristics of the data including business rules, rules for how pieces of data relate, dates, definitions and lineage must be correct for data to be complete. Integrity can be guaranteed by several security mechanisms (e.g., hash function, data authentication, digital signature) Trivial example: CRC of the IP header C. Callegari Network Security: Attacks and Defenses 13 / 95

14 Authenticity Introduction Basic Principles Definition Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true Mechanisms able to guarantee Information authenticity: A difficult-to-reproduce physical artifact, such as a seal, signature, watermark, special stationery, or fingerprint. A shared secret, such as a passphrase, in the content of the message. An electronic signature; public key infrastructure is often used to cryptographically guarantee that a message has been signed by the holder of a particular private key. C. Callegari Network Security: Attacks and Defenses 14 / 95

15 Non-repudiation Introduction Basic Principles Definition Non-repudiation is the concept of ensuring that a party in a dispute cannot repudiate, or refute the validity of a statement or contract The most common method of asserting the digital origin of data is through digital certificates. The ways in which a party may attempt to repudiate a signature present a challenge to the trustworthiness of the signatures themselves. The standard approach to mitigating these risks is to involve a trusted third party. C. Callegari Network Security: Attacks and Defenses 15 / 95

16 The Security Triangle Introduction Basic Principles C. Callegari Network Security: Attacks and Defenses 16 / 95

17 Introduction A taxonomy of the intruders Intruders Intruders can be classified as Masquerader: an individual who is not authorized to use the computer and who penetrates a system s access control to exploit a legitimate user s account Misfeasor: a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access, but misuses his/her privileges Clandestine User: an individual who seizes supervisory control of the system and uses the control to evade auditing and access controls or to suppress audit collection C. Callegari Network Security: Attacks and Defenses 17 / 95

18 Introduction A taxonomy of the intrusions Intrusions can be classified as Intrusions Eavesdropping and Packet Sniffing: passive interception of network traffic Snooping and Downloading Tampering and Data Diddling: unauthorized changes to data or records Spoofing: impersonating other users Jamming or Flooding: overwhelming a system s resources Injecting Malicious Code Exploiting Design or Implementation Flaws (e.g., buffer overflow) Cracking Passwords and Keys C. Callegari Network Security: Attacks and Defenses 18 / 95

19 State of the Art Introduction Intrusions C. Callegari Network Security: Attacks and Defenses 19 / 95

20 Outline Network Anomalies 1 Introduction 2 Network Anomalies Information gathering Passive attacks Spoofing attacks Scanning attacks DoS attacks Man-in-the-Middle DNS Cache Poisoning 3 Intrusion Detection Systems C. Callegari Network Security: Attacks and Defenses 20 / 95

21 Network Anomalies Security Vulnerabilities Attacks on Different Layers: L2 Attacks IP Attacks ICMP Attacks Routing Attacks TCP Attacks Application Layer Attacks C. Callegari Network Security: Attacks and Defenses 21 / 95

22 Network Anomalies Network Attack: Life Cycle 1 Information gathering (active or passive) 2 Scanning 3 Gaining access 4 Maintaining access 5 Clearing tracks C. Callegari Network Security: Attacks and Defenses 22 / 95

23 Social Engineering Network Anomalies Information gathering Definition Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques Passive: involves acquiring information without directly interacting with the target (e.g., searching public records or news releases) Active: involves interacting with the target directly by any means (e.g., telephone calls to the help desk or technical dept.) C. Callegari Network Security: Attacks and Defenses 23 / 95

24 whois Network Anomalies Information gathering WHOIS is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name an IP address block an autonomous system number some additional information C. Callegari Network Security: Attacks and Defenses 24 / 95

25 WHOIS Network Anomalies Information gathering C. Callegari Network Security: Attacks and Defenses 25 / 95

26 whois Network Anomalies Information gathering C. Callegari Network Security: Attacks and Defenses 26 / 95

27 whois Network Anomalies Information gathering C. Callegari Network Security: Attacks and Defenses 27 / 95

28 host & nslookup Network Anomalies Information gathering host and nslookup are utilities for performing Domain Name System lookups C. Callegari Network Security: Attacks and Defenses 28 / 95

29 nslookup Network Anomalies Information gathering nslookup can provide some additional functionalities C. Callegari Network Security: Attacks and Defenses 29 / 95

30 Passive attacks Network Anomalies Passive attacks A passive attack is characterised by the interception of messages without modification There is no change to the network data or systems The message itself may be read or its occurrence may simply be logged. Some protocols do not crypt the data!!! You can easily recover login/password information for protocols, such as FTP, Telnet, SMTP,... C. Callegari Network Security: Attacks and Defenses 30 / 95

31 Eavesdropping Network Anomalies Passive attacks Eavesdropping is the act of secretly listening to the private conversation of others without their consent Some tools - Packet Analyzers (usually called Sniffers ): tcpdump ethereal/wireshark Cain and Abel Sniffing can be easily done on a classical ethernet, but not on a switched ethernet In a switched ethernet there are two possibilities: switch mirroring port Man-in-the-Middle attack C. Callegari Network Security: Attacks and Defenses 31 / 95

32 Wireshark Network Anomalies Passive attacks C. Callegari Network Security: Attacks and Defenses 32 / 95

33 Spoofing attacks Network Anomalies Spoofing attacks A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Spoofing can be realized at different layers: MAC layer: ifconfig <if> hw ether <MAC addr> IP layer: ifconfig <if> <ip addr> Application layer: e.g., The sender information shown in s (the From field) can be spoofed easily. This technique is commonly used by spammers to hide the origin of their s C. Callegari Network Security: Attacks and Defenses 33 / 95

34 Recall: IP header Network Anomalies Scanning attacks C. Callegari Network Security: Attacks and Defenses 34 / 95

35 Recall: TCP header Network Anomalies Scanning attacks C. Callegari Network Security: Attacks and Defenses 35 / 95

36 Network Anomalies Scanning attacks Recall: TCP Connection Establishment C. Callegari Network Security: Attacks and Defenses 36 / 95

37 Recall: ICMP Network Anomalies Scanning attacks C. Callegari Network Security: Attacks and Defenses 37 / 95

38 Scanning attacks Network Anomalies Scanning attacks Network Scan Network Scanning is a procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment Host Scan Host attack is a procedure for identifying open/filtered/closed port on a host Vulnerability Scan A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses ( C. Callegari Network Security: Attacks and Defenses 38 / 95

39 Network Scan Network Anomalies Scanning attacks The most common way of a scanning a network is the ping sweep technique Ping Sweep A ping sweep is a technique used to determine which of a range of IP addresses map to live hosts It consists of ICMP ECHO request packets sent to multiple hosts If a given address is live, it will return an ICMP ECHO reply ICMP TIMESTAMP and ICMP INFO can be used in a similar manner (useful if the victim machines are configured not to answer to the ICMP ECHO request packets) C. Callegari Network Security: Attacks and Defenses 39 / 95

40 Network Scan Network Anomalies Scanning attacks It can be useful to identify victim machines as well as zombies Classical tool: hping, nmap nmap -sp /24 C. Callegari Network Security: Attacks and Defenses 40 / 95

41 Host Scan Network Anomalies Scanning attacks The result of a scan on a port is usually generalized into one of three categories: Open or Accepted: The host sent a reply indicating that a service is listening on the port Closed or Denied or Not Listening: The host sent a reply indicating that connections will be denied to the port (e.g., ICMP port unreachable message) Filtered, Dropped or Blocked: There was no reply from the host C. Callegari Network Security: Attacks and Defenses 41 / 95

42 Host Scan Network Anomalies Scanning attacks A host scan can be performed in several ways: SYN scanning also known as half-open scanning nmap -ss UDP scanning nmap -su ACK scanning: can be useful in the case packet filtering blocks packets without the ACK flag set. It does not exactly determine whether the port is open or closed, but whether the port is filtered or unfiltered (useful to detect the presence of a firewall) nmap -sa C. Callegari Network Security: Attacks and Defenses 42 / 95

43 Host Scan Network Anomalies Scanning attacks A host scan can be performed in several ways: FIN scanning: useful if the SYN packets are blocked by the firewall. Closed ports reply to a FIN packet with the appropriate RST packet, whereas open ports ignore the packet on hand nmap -sf Xmas scanning: TCP packets with all the flags set nmap -sx C. Callegari Network Security: Attacks and Defenses 43 / 95

44 Host Scan Network Anomalies Scanning attacks C. Callegari Network Security: Attacks and Defenses 44 / 95

45 OS guess Network Anomalies Scanning attacks A Sniffer can use the TCP/IP stack fingerprinting to guess the O.S. running on a machine. The TCP/IP fields that may vary include the following: Initial packet size (16 bits) Initial TTL (8 bits) Window size (16 bits) Max segment size (16 bits) Window scaling value (8 bits) don t fragment flag (1 bit) sackok flag (1 bit) nop flag (1 bit) These values may be combined to form a 67-bit signature, or fingerprint, for the target machine C. Callegari Network Security: Attacks and Defenses 45 / 95

46 OS guess Network Anomalies Scanning attacks nmap -O C. Callegari Network Security: Attacks and Defenses 46 / 95

47 Idle Scan Network Anomalies Scanning attacks The idle scan is a TCP port scan method that through utility software tools such as Nmap and Hping allows sending spoofed packets to a computer. First of all it is necessary to identify a zombie (by means of a ping sweep) The zombie must be inactive in the Internet namp -si <zombie IP> <victim IP> C. Callegari Network Security: Attacks and Defenses 47 / 95

48 Network Anomalies Idle Scan - Open port Scanning attacks C. Callegari Network Security: Attacks and Defenses 48 / 95

49 Network Anomalies Idle Scan - Closed port Scanning attacks C. Callegari Network Security: Attacks and Defenses 49 / 95

50 Network Anomalies Idle Scan - Filtered port Scanning attacks C. Callegari Network Security: Attacks and Defenses 50 / 95

51 Denial of Service Network Anomalies DoS attacks A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. The five basic types of attack are: 1 Consumption of computational resources, such as bandwidth, disk space, or processor time 2 Disruption of configuration information, such as routing information 3 Disruption of state information, such as unsolicited resetting of TCP sessions 4 Disruption of physical network components 5 Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately C. Callegari Network Security: Attacks and Defenses 51 / 95

52 SYN Flooding Network Anomalies DoS attacks The SYN flood is a well known type of attack and is generally not effective against modern networks. It works if a server allocates resources after receiving a SYN, but before it has received the ACK. There are two methods, but both involve the server not receiving the ACK: A malicious client can skip sending this last ACK message Or by spoofing the source IP address in the SYN The technology often used in 1996 for allocating resources for half open TCP connections involved a queue which was often very short (e.g., 8 entries long) with each entry of the queue being removed upon a completed connection, or upon expiry (e.g., after 3 minutes). C. Callegari Network Security: Attacks and Defenses 52 / 95

53 SYN cookies Network Anomalies DoS attacks SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host. Daniel J. Bernstein, the technique s primary inventor, defines SYN Cookies as particular choices of initial TCP sequence numbers by TCP servers. SYN Cookies allows a server to avoid dropping connections when the SYN queue fills up The server sends back the appropriate SYN+ACK response to the client but discards the SYN queue entry If the server then receives a subsequent ACK response from the client, the server is able to reconstruct the SYN queue entry using information encoded in the TCP sequence number C. Callegari Network Security: Attacks and Defenses 53 / 95

54 SYN cookies Network Anomalies DoS attacks SYN cookie calculation: n = t(5bits) m(3bits) s(24bits), where t = A slowly-incrementing timestamp (typically time() logically right-shifted 6 positions, which gives a 64 second resolution) m = The maximum segment size (MSS) value that the server would have stored in the SYN queue entry s = The result of a cryptographic secret function computed over the server IP address and port number, the client IP address and port number, and the value t. The returned value s must be a 24-bit value. When the server receives back an ACK (the seq number will be n + 1), it performs the following operations: Checks the value t against the current time to see if the connection is expired. Recomputes s to determine whether this is, indeed, a valid SYN Cookie. Decodes the value m from the 3-bit encoding in the SYN Cookie, which it then can use to reconstruct the SYN queue entry Drawbacks: the server is limited to only 8 unique MSS values the server must reject all TCP options a connection may freeze when the final ACK of the three-way handshake is lost and the client first awaits data from the server C. Callegari Network Security: Attacks and Defenses 54 / 95

55 UDP Flooding Network Anomalies DoS attacks UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result the host will: Check for the application listening at that port; See that no application listens at that port; Reply with an ICMP Destination Unreachable packet. For a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients C. Callegari Network Security: Attacks and Defenses 55 / 95

56 ICMP Flooding Network Anomalies DoS attacks A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets Smurf attack A Smurf attack consists of sending a large amount of ICMP echo request traffic to IP broadcast addresses, all of which have a spoofed source IP address of the intended victim Most OSs can be configured not to answer to ICMP packets sent to broadcast IP address, but this doen prevent the victim to be attacked Ping of Death A ping of death (abbreviated POD ) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. Several OSs crash, when receiving an ICMP Echo request bytes long (fragmented, since it is longer than the maximum allowed packet length) C. Callegari Network Security: Attacks and Defenses 56 / 95

57 Recall: ARP Network Anomalies Man-in-the-Middle The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host s link layer or hardware address when only its Internet Layer (IP) or Network Layer address is known C. Callegari Network Security: Attacks and Defenses 57 / 95

58 ARP Spoofing Network Anomalies Man-in-the-Middle ARP poisoning An attacker C can send a spoofed ARP reply (gratuitous ARP) message to a given host A, saying to be host B MAC flooding By MAC flooding a switch s ARP table with spoofed ARP replies, the attacker can overload switches, making them enter in forwarding mode C. Callegari Network Security: Attacks and Defenses 58 / 95

59 Man-in-the-Middle Network Anomalies Man-in-the-Middle A given host C poisoning the ARP cache of two hosts communicating with each other A and B, can realize a Man-in-the-Middle attack, where: host A communicates with host C, believing to communicate with host B host B communicates with host C, believing to communicate with host A host C can intercept (active sniffing) or modify the whole traffic C. Callegari Network Security: Attacks and Defenses 59 / 95

60 Man-in-the-Middle Network Anomalies Man-in-the-Middle C. Callegari Network Security: Attacks and Defenses 60 / 95

61 DNS packet Network Anomalies DNS Cache Poisoning Query ID: a unique identifier created in the query packet QR (Query / Response): Set to 0 for a query by a client, 1 for a response from a server Opcode: Set by client to 0 for a standard query; the other types aren t used in our examples AA (Authoritative Answer): Set to 1 in a server response if this answer is Authoritative, 0 if not TC (Truncated): Set to 1 in a server response if the answer can t fit in the 512-byte limit of a UDP packet response RD (Recursion Desired): The client sets this to 1 if it wishes that the server will perform the entire lookup of the name recursively RA (Recursion Available): The server sets this to indicate that it will (1) or won t (0) support recursion Z: reserved C. Callegari Network Security: Attacks and Defenses 61 / 95

62 DNS packet Network Anomalies DNS Cache Poisoning rcode: Response code from the server: indicates success or failure Question record count: The client fills in the next section with a single question record that specifies what it s looking for: it includes the name ( the type (A, NS, MX, etc.), and the class (virtually always IN=Internet) Answer/authority/additional record count: Set by the server, these provide various kinds of answers to the query from the client DNS Question/Answer data: This is the area that holds the question/answer data referenced by the count fields above C. Callegari Network Security: Attacks and Defenses 62 / 95

63 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 63 / 95

64 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 64 / 95

65 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 65 / 95

66 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 66 / 95

67 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 67 / 95

68 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 68 / 95

69 Standard DNS query Network Anomalies DNS Cache Poisoning C. Callegari Network Security: Attacks and Defenses 69 / 95

70 Standard DNS query Network Anomalies DNS Cache Poisoning DNS Cache Once we get an authoritative answer for a given name, we can save it in a local cache to use to satisfy future queries directly DNS Cache TTL Each entry in the DNS cache has a time-to-live, measure in seconds. The administrator of the zone specifies this information for every resource record C. Callegari Network Security: Attacks and Defenses 70 / 95

71 Network Anomalies DNS Cache Poisoning DNS Cache Poisoning- guessing the query ID C. Callegari Network Security: Attacks and Defenses 71 / 95

72 Network Anomalies DNS Cache Poisoning DNS Cache Poisoning - Version 1 C. Callegari Network Security: Attacks and Defenses 72 / 95

73 Network Anomalies DNS Cache Poisoning DNS Cache Poisoning Note that the attack only works if: name isn t already in the cache bad guy guesses the query ID bad guy is faster than the real nameserver C. Callegari Network Security: Attacks and Defenses 73 / 95

74 Network Anomalies DNS Cache Poisoning DNS Cache Poisoning - Kaminsky version C. Callegari Network Security: Attacks and Defenses 74 / 95

75 Outline Intrusion Detection Systems 1 Introduction 2 Network Anomalies 3 Intrusion Detection Systems Motivations Taxonomy of the Intrusion Detection Systems Some Useful Definitions Evaluation Data-set C. Callegari Network Security: Attacks and Defenses 75 / 95

76 Intrusion Detection Systems Motivations Why an intrusion detection system? Network security mainly means PREVENTION Physical protection for hardware Passwords, access tokens, etc. for authentication Access control list for authorization Cryptography for secrecy Backups and redundancy for authenticity... and so on BUT Absolute security cannot be guaranteed! C. Callegari Network Security: Attacks and Defenses 76 / 95

77 Intrusion Detection Systems Motivations What is an Intrusion Detection System? Prevention is suitable when Internal users are trusted Limited interaction with other networks Need for a system which acts when prevention fails Intrusion Detection System An intrusion detection system (IDS) is a software/hardware tool used to detect unauthorized accesses to a computer system or a network C. Callegari Network Security: Attacks and Defenses 77 / 95

78 IDS Taxonomy Intrusion Detection Systems IDS Taxonomy Intrusion Detection Systems are classified on the basis of several criteria: 1 Scope Host IDS (HIDS) Network IDS (NIDS) 2 Architecture Centralized Distributed 3 Analysis Techniques Stateful Stateless 4 Detection Techniques Misuse Based IDS Anomaly Based IDS C. Callegari Network Security: Attacks and Defenses 78 / 95

79 Intrusion Detection Systems Host based vs. Network based IDS Taxonomy Host based IDS Aimed at detecting attacks related to a specific host Architecture/Operating System dependent Processing of high level information (e.g. system calls) Effective in detecting insider misuse Network based IDS Aimed at detecting attacks towards hosts connected to a LAN Architecture/Operating System independent Processing data at lower level of granularity (packets) Effective in detecting attacks from the outside C. Callegari Network Security: Attacks and Defenses 79 / 95

80 Intrusion Detection Systems IDS Taxonomy Centralized IDS vs. Distributed IDS Centralized IDS All the operations are performed by the same machine More simple to realize Only one point of failure Distributed IDS Composed of several components Sensors which generate security events Console to monitor events and alerts and control the sensors Central Engine that records events and generate alarms May need to deal with different data formats Need of a secure communication protocol (IPFIX) C. Callegari Network Security: Attacks and Defenses 80 / 95

81 Intrusion Detection Systems Stateless IDS vs. Stateful IDS IDS Taxonomy Stateless IDS Treats each event independently of the others Simple system design High processing speed Stateful IDS Maintains information about past events The effect of a certain event depends on its position in the events stream More complex system design More effective in detecting distributed attacks C. Callegari Network Security: Attacks and Defenses 81 / 95

82 Intrusion Detection Systems IDS Taxonomy Misuse based IDS vs. Anomaly based IDS Misuse based IDS Identifies intrusion by looking for patterns of traffic or of application data presumed to be malicious Pattern of misuses are stored in a database Effective in detecting only known attacks Anomaly based IDS Identifies intrusions by classifying activity as either anomalous or normal Needs a training phase to recognize normal activity Able to detect new attacks Generates more false alarms than a misuse based IDS C. Callegari Network Security: Attacks and Defenses 82 / 95

83 Intrusion Detection Systems IDS State of the Art IDS Taxonomy BUT... Focus is on Network based IDSs (The only ones effective in detecting Distributed Denial of Service - DDoS) State of the art IDSs are Misuse Based Most attacks are realized by means of software tools available on the Internet Most attacks are well-known attacks... The most dangerous attacks are those written ad hoc by the intruder! C. Callegari Network Security: Attacks and Defenses 83 / 95

84 The best choice? Intrusion Detection Systems IDS Taxonomy Combined use of both HIDS (for insider attacks) & NIDS (for outsider attacks) Misuse IDS (low False Alarm rate) & Anomaly IDS (for new attacks) Stateless IDS (fast data process) & Stateful IDS (for complex attacks) Distributed IDS Not a single point of failure More effective in monitoring large networks C. Callegari Network Security: Attacks and Defenses 84 / 95

85 The best choice? Intrusion Detection Systems IDS Taxonomy C. Callegari Network Security: Attacks and Defenses 85 / 95

86 Definitions Intrusion Detection Systems Some Useful Definitions False Positive (FP): the error of rejecting a null hypothesis when it is actually true. In our case it implies the creation of an alarm in correspondence of normal activities False Negative (FN): the error of failing to reject a null hypothesis when it is in fact not true. In our case it corresponds to a missed detection C. Callegari Network Security: Attacks and Defenses 86 / 95

87 ROC Curve Intrusion Detection Systems Some Useful Definitions Plots Detection Rate vs. False Positive Rate Detection Rate Non Stationary ECDF Non Homogeneous MC Homogeneous MC False Alarm Rate C. Callegari Network Security: Attacks and Defenses 87 / 95

88 ROC Curve Intrusion Detection Systems Some Useful Definitions Results presented by the ROC are often considered incomplete because they do not take into account the cost of missed attacks they do not take into account the cost of false alarms they do not say if the system itself is resistant to attacks... Several researchers are working on more complete ways of representing the results C. Callegari Network Security: Attacks and Defenses 88 / 95

89 Intrusion Detection Systems DARPA Evaluation Program Evaluation Data-set The 1998/1999 DARPA/MIT IDS evaluation program is the most comprehensive evaluation performed to date It provides a corpus of data for the development, improvement, and evaluation of IDSs Different kind of data are available: Operating systems logs Network traffic Collected by an inside sniffer Collected by an outside sniffer The data model the network traffic measured between a US Air Force base and the Internet C. Callegari Network Security: Attacks and Defenses 89 / 95

90 Intrusion Detection Systems The DARPA Network Evaluation Data-set C. Callegari Network Security: Attacks and Defenses 90 / 95

91 Intrusion Detection Systems The DARPA Dataset Evaluation Data-set 5 weeks data Data from weeks 1 and 3 are attack free and can be used to train the system Data from week 2 contains labeled attacks and can be used to realize the signatures database Data from weeks 4 and 5 contains several attacks and can be used for the detection phase An Attack Truth list is provided Attacks are categorized as Denial of Service (DoS) User to Root (U2R) Remote to Local (R2L) Data Probe 177 instances of 59 different types of attacks C. Callegari Network Security: Attacks and Defenses 91 / 95

92 Other Data-sets Intrusion Detection Systems Evaluation Data-set The DARPA data-set has many drawbacks: simulated environment not up-to-date traffic the methodology used for generating the traffic has been shown to be inappropriate for simulating actual networks Other Data-sets: several publicly available traffic traces e.g. CAIDA, Abilene (Internet2), GEANT,... no ground truth is provided! C. Callegari Network Security: Attacks and Defenses 92 / 95

93 Base Rate Fallacy Intrusion Detection Systems Evaluation Data-set Let s define: A = alarm A = not an alarm I = attack I = not an attack P(A I) = False positive probability P( A I) = False negative probability Some definitions: P(A B) = P(A) P(B A) P(B) P(B) = i P(A i) P(B A i ) C. Callegari Network Security: Attacks and Defenses 93 / 95

94 Base Rate Fallacy Intrusion Detection Systems Evaluation Data-set Let s suppose: P(A I) = 0.99 P( A I) = 0.99 we have 2 attacks a day over 10 6 pkts (base rate = 1/500000) Applying the Bayes theorem: P(I A) = = Thus P(I A) = P(I) p(a I) P(I) p(a I) + P( I) p(a I) = 1/ / (1 1/500000) 0.01 C. Callegari Network Security: Attacks and Defenses 94 / 95

95 Intrusion Detection Systems Thank You for your attention Evaluation Data-set C. Callegari Network Security: Attacks and Defenses 95 / 95

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

A Very Incomplete Diagram of Network Attacks

A Very Incomplete Diagram of Network Attacks A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Security: Attack and Defense

Security: Attack and Defense Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

How To Understand A Network Attack

How To Understand A Network Attack Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Brocade NetIron Denial of Service Prevention

Brocade NetIron Denial of Service Prevention White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Attacks and Defense. Phase 1: Reconnaissance

Attacks and Defense. Phase 1: Reconnaissance Attacks and Defense Phase 1: Reconnaissance Phase 2: Port Scanning Phase 3: Gaining Access Using Application and Operating System Using Networks Phase 1: Reconnaissance Known as information gathering.

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Chapter 8 Network Security

Chapter 8 Network Security [Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network

More information

Attack Lab: Attacks on TCP/IP Protocols

Attack Lab: Attacks on TCP/IP Protocols Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Project 4: (E)DoS Attacks

Project 4: (E)DoS Attacks Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular

More information

Firewalls Netasq. Security Management by NETASQ

Firewalls Netasq. Security Management by NETASQ Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed

More information

Lecture 5: Network Attacks I. Course Admin

Lecture 5: Network Attacks I. Course Admin Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia Nenad.stojanovski@gmail.com 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

Seminar Computer Security

Seminar Computer Security Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

AC 2012-3856: TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS

AC 2012-3856: TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS AC 2012-3856: TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS Dr. Te-Shun Chou, East Carolina University Te-Shun Chou received his bachelor s degree in electronics engineering

More information

Lecture 6: Network Attacks II. Course Admin

Lecture 6: Network Attacks II. Course Admin Lecture 6: Network Attacks II CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lectures by Keith Ross, and Gene Tsudik Course Admin HW/Lab 1 We are grading (should return

More information

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack Detection and Prevention in Cloud Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform

More information

What is a DoS attack?

What is a DoS attack? CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: guan@ee.iastate.edu October

More information

Network Forensics: Log Analysis

Network Forensics: Log Analysis Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode

More information

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA A Seminar report On Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface I have made

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Using SYN Flood Protection in SonicOS Enhanced

Using SYN Flood Protection in SonicOS Enhanced SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will

More information

Network and Services Discovery

Network and Services Discovery A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts. Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of

More information

Computer forensics 2015-12-01

Computer forensics 2015-12-01 Computer forensics Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Overview. Packet filter

Overview. Packet filter Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during

More information

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006 IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: 1608@nu.edu.pk Naveedafzal gmail.com Abstract: The purpose

More information

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

Security Type of attacks Firewalls Protocols Packet filter

Security Type of attacks Firewalls Protocols Packet filter Overview Security Type of attacks Firewalls Protocols Packet filter Computer Net Lab/Praktikum Datenverarbeitung 2 1 Security Security means, protect information (during and after processing) against impairment

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University chout@ecu.edu Abstract

More information