In-Band Methods of Virtual Machine Detection

Size: px
Start display at page:

Download "In-Band Methods of Virtual Machine Detection"

Transcription

1 GRADUATE OPERATING SYSTEMS 1 In-Band Methods of Virtual Machine Detection Estefan Ortiz & Cory Hayes University of Notre Dame {eortiz, chayes3}@nd.edu Abstract In a proof of concept paper, the authors show that it is possible to run a virtual machine based rootkit (VMBR) that is able to gain access to system resources and avoid detection and effective removal. A VMBR essentially installs a virtual machine monitor and runs the native operating system as a guest. Once installed, the VMBR can run a myriad of malicious services. Three general types of malicious services that can be executed without detection from the system are: services that do not interact with the target system, services that observe the system in effort to gain sensitive information, and services that disrupt the targeted system. Attacks that do not interact with the system are of a particular concern because they can include distributed denial-of-service attacks and phishing web servers. It is under this premise that we examine the viability of detecting traces of a client (host) who is connected to a web server and communicates via a virtual machine. Index Terms Virtual Machine Detection 1 INTRODUCTION A virtual machine monitor runs in the software layer of the operating system and allows for the installation of multiple virtual machines which are defined as efficient, isolated duplicates of a real machine [2]. Virtual machine monitors must meet the following three requirements: programs running in a virtual machine monitor should have performances similar to what they would be in a physical machine, a majority of the virtual processes must be executed by the host processor, and the virtual machine monitor should have complete control over system resources [2]. Virtual machines are primarily known for use by software developers to test products on various architectures before release, but other advantages have been recently targeted and exploited. Chen and Noble [3] discuss how the isolation of virtual services from the physical host machine provides the benefit of security and portability, with virtual machine monitors having the ability to prevent and detect intrusions by observing all events occurring within a virtual machine while the host machine remains unaffected. A malicious program needs to be aware if the surrounding environment is a virtual one so that the program s behavior can be modified accordingly to prevent detection since the programs are unable to harm the host machine in this setting. Detection especially needs to be avoided because malicious programs are potentially open for analysis in the closed virtual environment. Through careful theorems and proofs, Gueron and Seifert [4] show that it is impossible to detect true virtual machine monitors. However, Gueron and Seifert also acknowledge that most implemented virtual machine monitors only come close to the strict criteria of what is considered to be a virtual machine monitor and a common observation seen in most virtual machine monitor detection methods are the indirect information leaks caused by imperfect isolation. Our project assumes Paper submitted December 16, 2011 the role of the ethical hacker by exploring attempts to infer information about a remote environment. The goal is for our project to function as a potential additional resource for future work where systems are modified to hide any telling aspects that compromise the identity of both physical and virtual environments and thwart malware anti-detection attempts. 2 RELATED WORK Paleari et. al [5] describe a method to determine if a program is being executed by a virtualized CPU. To accomplish the task of emulator detection, the authors examine the byte level behavior of a given set of instructions for an actual CPU and an emulated CPU and check the output byte information. Any disagreement between the output for the real and emulated CPU leads to the creation of one or more red pills. Red pills are tests that malicious programs can execute to determine if the environment is a real or virtual one. The tests are based on machine instructions that return some form of system information or have behavior that differs between real and virtual environments. These red pills were subsequently tested by well-known malware analysis programs, which ultimately resulted in effective evasion of detecting attempts. The primary focus of their work was to automate the generation of effective red pills and removal of unreliable ones. Perhaps the most dangerous tool created for malware anti-detection is the SubVirt framework introduced by King and Chen [1]. SubVirt is a manifestation of one of the ultimate goals of malicious programs: to gain control over the infected machine and prevent the machine from detecting the malware s presence. SubVirt installs a virtual machine-based rootkit underneath the host operating system and completely conceals its activity from most intrusion detectors by running the native operating system as a guest. The approach is based on the protection ring concept of operating systems where

2 GRADUATE OPERATING SYSTEMS 2 lower levels of a system control or have more privileges than upper levels. This installation at a lower position allows the rootkit to run all kinds of malicious services to attack the targeted physical machine while remaining nearly undetectable. Potential solutions are presented in the paper through a combination of using security software both above and below the virtual machinebased rootkit to monitor inconsistencies in CPU overhead, memory, and virtualizing I/O devices. In contrast to the above work where attackers try to detect a virtual environment and/or hide from it, a recent paper by Vishnani et. al [6] directly addresses security analysis by introducing a tool to trick malware. Their approach targets the six main types of malware s detection attempts: hardware fingerprinting, registry checking, memory checking, virtual machine communication channel checking, timing analysis, and process checking. By dynamically adding code in various parts of executables, their tool VMdetectGuard is able to mimic a native environment and throw off malware attempting to analyze the system. Both Garfinkel and Rosenblum [7] and Kourai and Chiba [8] discuss approaches that attempt to prevent attacks by using a virtual monitor that isolates its detection systems outside of the physical machine to limit malware anti-detection attempts. Zhu and Chen [9] note that some detection techniques implemented by malware attempt to call instructions that typically originate in the operating system kernel, such as SIDT, SLDT and SGDT from the Intel instruction set. If any of these calls are done in the user-level, as is the case with malware programs, then this may be a flag that some malware is attempting to gather information about the environment. Scanning malware for these instructions is difficult, Zhu and Chen developed a plugin called Malaware that runs suspicious programs in an emulator and examines program behavior on the instruction level. To combat the initial limitation of only being able to recognize known virtual machine techniques, they also developed another approach to detect any attempts of malware changing its execution path, allowing for the dynamic discovery of new virtual machine detection techniques. Another possible path for detection from a server is via in-band methods where TCP/IP packets are monitored or analyzed for odd behavior. Chen et. al [10] focus on artifacts left behind by virtual and physical environment interactions that are hard to conceal, such as the perturbed clock information of timestamps found in the TCP packets of hosting virtual machine monitors. They note that TCP timestamp clocks increase with a fixed frequency between 1Hz and 1000Hz depending on the host operating system, and since there are only a few common TCP clock frequencies, a machine can be reliably identified by the frequency. While native operating systems rely on accurate hardware-triggered interrupts, guest operating systems in a virtual machine rely on software interrupts created by the virtual machine monitor, and these interrupts can be potentially delayed or lost completely. These delays or lost interrupts are reflected in the timestamp information and can be used to detect the presence of a virtual machine. Our project follows along this path by attempting to infer information about a remote client by analyzing the TCP/IP packets sent between the two machines. 3 IN-BAND METHODS OF VIRTUAL MACHINE DETECTION This paper examines the feasibility of determining if a client is connecting to a server which is hosted via a virtual machine. In particular, our research focuses on a structured way of examining data packets exchanged from a client to a server hosted on a virtual machine and data packets gathered from a client to the same server hosted on the native operating system. We developed a general man-in-the-middle framework to collect packets for the various underlying operating systems and server configurations. The Man-in-the-Middle platform created was used to examine the following two server host configurations: 1) The server is hosted on the native operating system. 2) The server is hosted on a virtual machine running on top of the native operating system. The two hosted server scenarios can conceptually be seen in Figure 1(a) and Figure 1(b) respectively. Each setup found in Figure 1 displays the general structure of our man in the middle setup for packet gathering. The following sections provide the details for each of the major components specified by the man in the middle system. Fig. 1. Experimental setup 3.1 Man-in-the-Middle In general, a MITM configuration can be used to intercept and disrupt or manipulate packets bound from a

3 GRADUATE OPERATING SYSTEMS 3 source to a given destination. Although packet manipulation is one possible way that a MITM can be used to elicit a response from a server to indicate if it is being hosted on a VM, we consider the MITM to be a passive listener of packets being transferred from client to server. Thus, in the setup described in Section 3, the MITM will consist of a packet sniffer that resides on the client side monitoring traffic to and from the client s network interface card (NIC). Wireshark [11] was the packet sniffing software used to create the described MITM. Wireshark is an open source packet analyzer based on pcap (packet capture) which has a user interface allowing various real-time filtering options during the packet capturing process. Due to being built on top of pcap, Wireshark has the capability to capture and interpret various communication protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP). Our designed man-in-the-middle configuration made use of Wireshark because of its ability to quickly analyze packets as they are transmitted from client to server. However, in our analysis we made use of pcap and command line functions to convert the saved output of Wireshark into a more usable form. While Wireshark has the capability to capture different protocols, our research focused strictly on TCP/IP communication. The Experimental section describes in detail how Wireshark and pcap were used to gather and prepare packet data for analysis. 3.2 Client and Server To estimate if there are any differences found in the packet transmissions from a client to a server hosted on a native of virtual operating system, we created a simple switched network in which to run a set of probing experiments. Below are brief descriptions of the client and server and the roles they play in the experimental process Server In our experiments we examine two different native operating systems and a respective virtual machine that matched the underlying native operating system. The two different operating system examined are Ubuntu 32bit version and Windows Vista Ultimate 32bit. Table 1 provides a summary of the underlying respective hardware for each operating system to act as a server in our experiments. We used VirtualBox [12] as the x86 virtualization software package developed by Oracle to match each of the underlying examined operating systems. The remaining component in our setup is the server. For the server portion of the configuration we used Apache Web Server version 2.2. For each operating system we installed the aforementioned version of Apache. Similarly, for each virtual machine running on top of the native host, we installed and set up the same version of Apache. TABLE 1 Software and Hardware Specifications Client With the general framework as described in Section 3.2, the client consists of a machine that will make a connection to the web server send a malformed packet and then disconnect. The two different client configurations are given below: 1) Client: Windows Vista Machine (4GB RAM, 2.6GHz Intel Core 2 Duo, Windows Vista Ultimate 32-bit) 2) Client: Mac (4GB RAM, 2.4GHz Intel Core i5, MacOSX version ) 4 EXPERIMENTAL DESIGN To determine if there are observable differences in the packet data that has been sent from a server within a virtual machine verses a server that has sent a packet from the native operating system, we examine a pair of metrics to determine which information from the TCP/IP packet data is a potential indicator that a server is connecting from a virtual machine. To gain some understanding of the effectiveness of the chosen metrics we run a series of experiments that limit the influence that outside connections and multi-hop networks have on our contrived system. In other words, our experiments will aim to keep the number of packets produced for a given simulation setup consistent. In addition, we will attempt to maintain the order in which the packets are sent and received. The following sections describe the metrics used in our evaluation of locating differences in packet information as well as executed experiments and their respective results. 4.1 Developed Metrics The approach taken in this paper is a hierarchical one with respect to the metrics used to illustrate differences in packet data. Thus, the first metric is a high-level examination measuring the round-trip time for the client and server to initially establish a connection. The second metric measures the fractional amount by which two packets disagree in terms of bits. The two different metrics to compare packet information: 1) Round-Trip Time: Time difference between a synchronize packet (SYN) sent by the client to the server and the acknowledgement (ACK) packet received by the client from the server. 2) Difference in Bits: Fractional Hamming distance calculation comparing two packets.

4 GRADUATE OPERATING SYSTEMS Round-Trip Time The difference in time comparison is concerned solely with the synchronize packet (SYN) sent by the client to the server and the acknowledgement (ACK) packet sent from the server to the client. For each experiment, during the connection attempt from the client we capture the synchronize packet, its respective time stamp, and the acknowledgement (ACK) packet sent from the server and its respective time stamp. The time difference calculation is then made on the elapsed time taken from SYN to ACK and the onset of establishing a connection. Figure 2 displays this comparison for a given experiment. Fig. 2. Example of Time Difference Comparison Difference in Bits This metric examines the fractional Hamming distance between two packets. Briefly, the Hamming distance of a binary code is the number of bits that disagree when comparing two bit codes. Thus the higher the Hamming distance, the more two bit codes are not alike. The fractional Hamming is essentially a normalized Hamming distance by some given factor. The normalizing factor that we use is the number of bits actually compared. For example if two codes are the same length of 128 bits then the Hamming distance found between them will be divided by 128. However, it s not always the case that two codes are the same length and in such cases we compare up to the length of the shortest code. Thus, when the bit codes differ in size the normalizing factor will be the length of the shortest code. Figure 3 gives an example of two packets being compared bitwise. Fig. 3. Example of Bit Difference Calculation The Hamming distance signals that there exists a difference in the two packets being compared, and this signal leads to the analysis of the packets at the bit level to determine which TCP/IP fields correspond to the discrepancies. An example of a differing packet data is provided for each experiment when applicable. 4.2 Experiments An Apache server follows the standard HTTP format when communicating over a network. All of our experiments involve communicating with the Apache server using a malformed TCP/IP packet. A malformed packet is any packet that does not follow the standard HTTP format, which is typically in the format of Request, Requested Item, HTTP Version, a header, an empty line, and an optional message body terminated with CRLF. When the client is trying to establish a connection with the server, these correctly formatted HTTP requests are done automatically. After that, a custom malformed message that only contains a simple message and no header information is sent from the client to the server. The malformed packet used in the first three experiments contains the message Aloha. The client-server exchange is generated by a small Matlab script. The script initializes the connection to the Apache server by specifying the port and ip address, waits 10 seconds, sends the malformed message Aloha, and then terminates the connection. This process is done twenty-five times in each experiment. Wireshark captures the network traffic generated by the Matlab script and displays individual packet data in a legible format. The first 160 bits of each packet correspond to IP header and padding information while the remaining bits correspond to the TCP information. Each experiment is set up where the virtual machine operating system matches the operating system of the host machine. The targeted output for each experiment contains a consistent number and order of packets sent throughout the establishment of the client-server connection, the transmission of the custom malformed message, and the closing of the connection for each of the twentyfive iterations of the experiment. The following details the set up for each experiment: 1) Experiment #1: a) Client: Windows Vista Machine b) Server: Ubuntu w/ Apache Web Server 2.2 c) Server: Host OS Ubuntu: VirtualBox w/ Ubuntu running Apache d) Network: Local switch network with no outside traffic 2) Experiment #2: a) Client: Mac b) Server: Windows Vista Machine w/ Apache Web Server 2.2 c) Server: Host OS Windows Vista: Virtual Box w/ Windows Vista running Apache d) Network: Local switch network with no outside traffic 3) Experiment #3: a) Client: Windows Vista Machine b) Server: Windows Vista Machine w/ Apache Web Server 2.2

5 GRADUATE OPERATING SYSTEMS 5 c) Server: Host OS Windows Vista: Virtual Box w/ Windows Vista running Apache d) Network: Both client and server on Notre Dame s CVRL am 4) Experiment #4: a) Client: Windows Vista Machine b) Server: Ubuntu w/ Apache Web Server 2.2 c) Server: Host OS Ubuntu: VirtualBox w/ Ubuntu running Apache d) Network: Server on Notre Dame CVRL subnet, client on outside network. Experiment #4 has a slightly different setup from the rest. Instead of keeping the client and server on the same network, the client is connected to the Internet through the use of a Sprint Mobile 3G/4G Hotspot device while the server is connected to Notre Dame s CVRL subnet just as it was for Experiment #3. This experiment was done in an attempt to move away from the relatively ideal setup of the first three experiments. Unfortunately, the recent establishment of a firewall on the Notre Dame network prevented the observation of actual packet data, so ping timing between the client and server was recorded instead. 5 RESULTS Our results show that there appears to be noticeable differences when examining the packet data that is generated when the server (Apache) resides on the native operating system when compared to the situation where the server is being hosted by the VM. As will be shown in subsequent sections, the differences found in the fractional Hamming metric provided an indication that there were varying bit level differences when examining packets from a VM versus packets from native machine. The following sections provide the results for each of the experiments as described in Section Experiment 1: Client Vista, Host (Native and VM) Linux This experiment was conducted under a constrained environment in which client and host were connected to a switch with no traffic from outside sources. As an initial indicator we can see in Figure 4 that there is a slightly larger fractional Hamming distance examining packet that are passed from the web server hosted by the native machine versus the packet passed from a web server hosted on a virtual machine. Figure 5 provides the round trip time measurements taken for the case in which the client is the Vista machine and the host (VM and Native) is the Linux system. Lastly Figure 6 provides the aggregate bit difference count of the eighth packet from the set of packets captured during experiment 1. Figure 6 is displayed here to highlight the bits differences that occur when comparing similar packets originating for the two different connection types (Native and VM). Fig. 4. Boxplot of fractional Hamming distances calculated for the each of the described server configurations with the Windows machine as acting as the client Fig. 5. Boxplot of timing tests for a SYN ACK sequence with the Windows machine as acting as the client 5.2 Experiment 2: Client Mac, Host (Native and VM) Vista This experiment was conducted under a constrained environment in which client and host were connected to a switch with no traffic from outside sources. Similar to the first experiment we see in Figure 7 a elevated fractional Hamming for the virtual machine to native machine packet comparisons. Figure 8 provides the round trip time measurements taken for the case in which the client is the Mac machine and the host (VM and Native) is the Vista system. As in the first experiment Figure 9 shows bits which differ when examining packet comparison between the web server on the native machine verses the web server on the virtual machine.

6 GRADUATE OPERATING SYSTEMS 6 Fig. 6. Histogram indicating the number of time a specific bit position differed when comparing the ordered packets. Fig. 8. Boxplot of timing tests for a SYN ACK sequence with the Mac machine as acting as the client and the Vista acting as the host Fig. 7. Boxplot of fractional Hamming distances calculated for the each of the described server configurations with the Mac machine as acting as the client and the Vista acting as the host 5.3 Experiment 3: Client Vista, Host (Native and VM) Linux Unlike the previous two experiments the client and host were connect to the subnet of the Computer Vision Research Lab. At the time the experiment was conducted, there was some network traffic but not to an overwhelming amount. Again we see an higher fractional Hamming distance for the compared packets of the virtual machine verses the native machine Figure 10. Figure 11 provides the round trip time measurements taken for the case in which the client is the Mac machine and the host (VM and Native) is the Vista system. Figure 12 shows bits which differ when examining packet comparison between the web server on the native machine verses the web server on the virtual machine. Fig. 9. Histogram indicating the number of time a specific bit position differed when comparing the ordered packets. 5.4 Experiment 4: Round Trip Time Examining the variations in the round trip from the first three experiments we conducted one last experiment to attempt to determine if the round trip time could be used as a virtual machine indicator. Figure 13 6 ANALYSIS The first thing to note is from each experiment is that there is an elevated fractional Hamming distance when comparing similar packets of different origins. With the varying fractional Hamming distance we probe the bit level differences to find that there are bits that differ in the TCP packet information that could be an indicator of a possible virtual machine connection. Both the fractional Hamming distance and bit level differences were found to provide a potential feature in which indicate that a

7 GRADUATE OPERATING SYSTEMS 7 Fig. 10. Boxplot of fractional Hamming distances calculated for the each of the described server configurations with the Windows machine as acting as the client Fig. 12. Histogram indicating the number of time a specific bit position differed when comparing the ordered packets. Fig. 11. Boxplot of timing tests for a SYN ACK sequence with the Windows machine as acting as the client client was connected to a VM. However, the round trip time was inconclusive at best and should not be used to indicate if a client is connected to a virtual machine. 7 CONCLUSIONS & FUTURE WORK Malicious programs need to be aware if they are running in a virtual environment so that they may modify their behavior to avoid detection in the isolated system. Previous research has found that it possible for a program to infer information about its environment through the monitoring of system calls and instructions. The goal of our work was to examine the viability of detecting traces of a client who communicates via a virtual machine to a web server through the examination of the TCP/IP packets sent over a network. We examined packet information from a high level down to specific bit Fig. 13. Ping average round trip times as a function of varying byte size for pings to the VM and Native Machine from outside the subnet of CVRL comparisons and found that timing tests did not provide conclusive evidence of a connection to a virtual machine. Our fractional Hamming distance metric provided the first level of insight to finding these discrepancies and subsequent analysis of the corresponding bit-level data within the individual TCP/IP packets showed that differences could be found in both the TCP and IP portions of the packet. Future directions for this topic would include transitioning from the ideal scenarios with where network traffic is restricted and analyzing packets on multi-hop connections. REFERENCES [1] C. P. W. Y. V. C. W. H. L. J. King, S., Implementing malware with virtual machines, in In IEEE Symposium on Security and Privacy, May 2006, pp

8 GRADUATE OPERATING SYSTEMS 8 [2] G. Popek and R. Goldberg, Formal requirements for virtualizable third generation architectures, in SOSP 73 Proceedings of the 4th ACM Symposium on Operating System Principles, October [3] P. Chen and B. Noble, A fistful of red-pill: How to automatically generate procedures to detect cpu emulators, in HOTOS 01 Proceedings of the, May 2001, pp [4] S. Gueron and J. Seifert, On the impossibility of detecting virtual machine monitors, vol. 297, pp , [5] M. L. R. G. Paleari, R. and D. Brushi, A fistful of red-pill: How to automatically generate procedures to detect cpu emulators, in In Proceedings of the USENIX Workshop on Offensive Technologies, [6] P. A. M. R. Vishnani, K., Detecting and defeating split personality malware, in SECURWARE 2011: The Fifth International Conference on Emerging Security, [7] T. Garfinkel and M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, 2003, pp [8] K. Kourai and S. Chiba, Hypersector: Virtual distributed monitoring environments for secure intrusion detection, in In Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments, 2005, pp [9] D. Zhu and E. Chin, Detection of vm-aware malware, [10] A. J. M. Z. B. M. Chen, X., Towards an understanding of antivirtualization and anti-debugging behavior in modern malware, pp , June [11] Wireshark. [12] O. I. VirtualBox,

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org 1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Information Security Training. Assignment 1 Networking

Information Security Training. Assignment 1 Networking Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Networks and Security Lab. Network Forensics

Networks and Security Lab. Network Forensics Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Looking for Trouble: ICMP and IP Statistics to Watch

Looking for Trouble: ICMP and IP Statistics to Watch Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Countermeasure for Detection of Honeypot Deployment

Countermeasure for Detection of Honeypot Deployment Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh

More information

Monitoring VirtualBox Performance

Monitoring VirtualBox Performance 1 Monitoring VirtualBox Performance Siyuan Jiang and Haipeng Cai Department of Computer Science and Engineering, University of Notre Dame Email: [email protected], [email protected] Abstract Virtualizers on Type

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

NETWORK SECURITY WITH OPENSOURCE FIREWALL

NETWORK SECURITY WITH OPENSOURCE FIREWALL NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.

Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac. Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Safe network analysis

Safe network analysis Safe network analysis Generating network traffic captures within a virtual network. Presented by Andrew Martin 1 Introduction What is a sniffer How does sniffing work Usages Scenarios Building safe repositories

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

A Summary of Network Traffic Monitoring and Analysis Techniques

A Summary of Network Traffic Monitoring and Analysis Techniques http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

allow all such packets? While outgoing communications request information from a

allow all such packets? While outgoing communications request information from a FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,

More information

Detecting the Presence of Virtual Machines Using the Local Data Table

Detecting the Presence of Virtual Machines Using the Local Data Table Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

How To Identify Different Operating Systems From A Set Of Network Flows

How To Identify Different Operating Systems From A Set Of Network Flows Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring

More information

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces 1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

FIREWALL AND NAT Lecture 7a

FIREWALL AND NAT Lecture 7a FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],

More information

Host Discovery with nmap

Host Discovery with nmap Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

Network Performance Evaluation of Latest Windows Operating Systems

Network Performance Evaluation of Latest Windows Operating Systems Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Denial of Service (DOS) Testing IxChariot

Denial of Service (DOS) Testing IxChariot TEST PLAN Denial of Service (DOS) Testing IxChariot www.ixiacom.com 915-6681-01, 2005 Contents Overview of Denial of Service functionality in IxChariot...3 A brief outline of the DoS attack types supported

More information

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Network Monitoring Tool with LAMP Architecture

Network Monitoring Tool with LAMP Architecture Network Monitoring Tool with LAMP Architecture Shuchi Sharma KIIT College of Engineering Gurgaon, India Dr. Rajesh Kumar Tyagi JIMS, Vasant Kunj New Delhi, India Abstract Network Monitoring Tool enables

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts. Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of

More information

Overview. Packet filter

Overview. Packet filter Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

EE984 Laboratory Experiment 2: Protocol Analysis

EE984 Laboratory Experiment 2: Protocol Analysis EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a

More information