Improved Snort Intrusion Detection System Using Modified Pattern Matching Technique

Size: px
Start display at page:

Download "Improved Snort Intrusion Detection System Using Modified Pattern Matching Technique"

Transcription

1 Improved Snort Intrusion Detection System Using Modified Pattern Matching Technique Chintan C. Kacha 1, Kirtee A. Shevade 2, Dr. Kuldeep S. Raghuwanshi 3 1 Department of Computer Science, Oriental College of Technology, Bhopal, India. 2 Asst. Professor, Department of Computer Science, Oriental College of Tehnology, Bhopal, India. 3 Asst. Professor, Ph.D., M.Tech, B.E, Department of Computer Science Oriental College of Technology, Bhopal, India. Abstract As the number of network attacks rise, the need for security measures such as Intrusion Detection Systems (IDS) is essential. IDS s are considered useful especially when new community hacking tools are emerging. Intrusion detection system identifies problems with security policies, documenting existing threats and detects individuals that violate the security policy. Due to the limitations of the firewall and Intrusion Detection System in the information security domain Intrusion Prevention System (IPS) appeared. It is a new generation information security technology following the firewall and intrusion detection technique. It is also secure project that protects the network and system in real-time from attacking and now becomes a hotspot of research in network security domain. This work introduces a novel IDS packet matching technique that provides faster packet inspections with less consumption of RAM and Processor. The Improved Snort IDS uses a new pattern matching algorithm and makes use of modified Snort signatures which utilizes minimum amount of CPU and memory. The experimental results show that the proposed technique has outperformed in comparison to other Network Intrusion Detection Systems (NIDS). Keywords IDS; NIDS; IPS; Snort; Improved Snort I. INTRODUCTION The last few years the amount of malicious traffic on internet have increased enormously, [14] in a way that should be looked into with concern. Malicious traffic can cause loss or harm of data on computers, and loss of sensitive information is something that occasionally happens. Companies spend billions of dollars on computer security each year, but still computers get infected or compromised by malicious traffic. Unaware employees, hackers, organized cyber criminals and unknown vulnerabilities are different reasons to why systems get compromised. Large companies and governmental organizations need the best tools available to prevent intrusions, since their companies are more exposed to malicious traffic. The best firewalls, antivirus, intrusion prevention systems and other security tools available are expensive. Large companies can afford these tools, but what about smaller companies? They do not have the same economy, and not the same need of the best and most expensive computer security tools. One common rule company s use about security is that the amount of money spent on security should not be higher than the cost of loss of data or compromised computers. This is something companies should find out before investing in security tools. Normally large and governmental companies have more important information to protect than smaller companies have, and therefore they need to invest in the best security tools available. Smaller companies do not have the same need, and should they invest the same amount of money in security tools? In most cases they don t have the same need, and therefore is open source an area that should be interesting these kinds of companies. The open source community has some advantages compared to payment solutions, where one of the advantages is the available source code. People using open source software can collaborate and contribute with own results and experiences to help each other to solve problems and for improvement. When buying a firewall, an intrusion detection system or an intrusion prevention system, one often get a preconfigured box which are set up in the network and left there. By using open source security tools, one can interact with other open source users, search for solutions, and get much more information. An intrusion detection system (IDS) is a well known security tool used by companies to prevent loss and harm of data. Companies such as Palo Alto and Sourcefire are two of the leading companies in this business. Palo Alto has only got a payment solution while Sourcefire has both a payment solution and a open source solution, the Snort IDS. In addition to Snort, there exist two other known open source intrusion detection systems, Bro and Suricata. Snort and Bro have existed since 1998, while Suricata s first stable version was released in July An open source intrusion detection system is a good option for companies and organizations which do not have the same amount of money as the larger companies and governmental organizations have. When choosing open source intrusion detection system, one should have some knowledge about how to set them up, how to use them, and how to respond to the different alarms they create when running them in the network. It is difficult to know which intrusion detection system to choose without any previous knowledge. 81

2 The remainder of the paper is organized as follows. Section 2 introduces intrusion detection systems under evaluation. Section 3 presents the proposed algorithm to improve the efficiency. Section 4 presents the study of performance analysis of Snort and Improved Snort and conclusions are drawn in section 5. II. INTRUSION DETECTION SYSTEMS Intrusion Detection Systems fall into two categories, Network based intrusion detection systems (NIDS) and Host based intrusion detection systems (HIDS). Network Intrusion detection systems operate by analyzing network traffic whereas Host based systems analyzes operating system audit trails. Within these two, their method of detection are categorized based upon two criteria, anomaly or pattern detection. Systems based upon anomaly detection build a profile of what can be considered normal usage patterns over a period of time and trigger alarms should anything deviate from this behavior. Within this type of detection lies a subsection which is based on protocol standards. Pattern detection identifies intrusions based upon known intrusion techniques and trigger alarms should be detected [2]. Intrusion detection systems have enhanced network security much more by checking payload and header in a data packet. To prevent network attacks intrusion detection system (IDS) has been widely deployed. An intrusion detection system can either be a device or a software application. Intrusion detection system focuses on detecting intrusions, logging information about them, and reports them to system administrator. As well, organizations use intrusion detection system to identify problems with security policies, documenting existing threats and detect individuals that violate the security policy. According to detection strategy, there are two types of intrusion detection: Mis-Use Based Intrusion Detection and Anomaly Based Intrusion Detection a) Mis-Use Based Intrusion Detection Mis-use based detection is named knowledge-based detection too. Knowledge based detection is equipped with a database that contains a number of signatures about known attacks. The audit data collected by the IDS is compared with the content of the database and, if a match is found, an alert is generated. Events that do not match any of the attack models are considered as a part of legitimate activities. The main advantage of misuse-based systems is that they usually produce very few false positives. But this approach has drawbacks. It cannot detect previously unknown attacks and sometimes it even cannot detect the variations of known attacks. b) Anomaly-based Intrusion Detection Anomaly-based detection is a behavior-based detection method. It is based on the assumption that all anomalous activities are malicious and all the attacks are subset of anomaly activities. By building a model of the normal behavior of the system, then it looks for anomalous activities that do not conform to the established model. Since it can detect unknown attacks, it is the research hotspot at present. However, since it is impossible to describe all the activities of all users in system, it leads to relative high false positive rate. Most of current IDSs use one of the two detection methods. There are two main types of intrusion detection system (IDS): 1) Network Intrusion Detection System (NIDS) and 2) Host Based Intrusion Detection System (HIDS) 1) Network Intrusion Detection System (NIDS) The NIDS is an independent platform that examines network traffic and monitoring multiple hosts to identify malicious activity. The usual way to set up a NIDS is by connecting it to a network hub, network switch configured for port mirroring, or network tap [14]. Sensors are placed at choke points in the network to be monitored, often in the demilitarized zone or at network borders. The sensors capture all network traffic and analyze the content of each packet for malicious content. 2) Host Based Intrusion Detection System (HIDS) A host based IDS is placed on a host, where it detect intrusions by analyzing system calls, applications logs, file-system modifications, and other host activities and state. The sensors usually consist of a software agent. There are two different techniques an IDS uses to detect malicious traffic / activity: a) Statistical anomaly based IDS Statistical anomaly based IDS set up a baseline of what kind of traffic is seemed as normal. By looking at the bandwidth use, what protocols are used, what kind of ports and devices that are generally connected to each other, one can make a baseline of this, and when sample of traffic is outside this baseline, an alert will be created and send to the administrator. b) Signature based IDS The signature based IDS monitors the network and comparing the packets against preset signatures; which is signatures of known attacks. When the signature based IDS detect packets or traffic that match some of the signatures in the database, it will create an alarm about that malicious traffic and report to administrator. 82

3 The problem with signature based IDS, is that it cannot detect malicious traffic where no signature has been made yet, but the statistical anomaly based IDS will be able to detect this. A. Snort Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS), created by Martin Roesch in Snort's open source network based intrusion detection system (NIDS) has the ability to perform real time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching.[15] The program can also be used to detect probes or attacks including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans. Snort tool is open source ID software which runs on Windows or Linux operating systems. Being free and having complete set of capabilities and the possibility to be installed on different machine and operating systems caused that SNORT be popular in ID systems in computer networks. SNORT in complete version is a kind of Network Intrusion Detection System (NIDS). This software is configurable in three modes: sniffer mode, packet recording mode and ID system. In sniffer mode, as its name indicates, SNORT is just a simple sniffer and displaying the content of transmitted packet within network. In recording mode, SNORT stores data of packets in a specified file. In ID mode, SNORT searches and analyzes packet based on two previous modes and determined rules. After ID, required actions are taken. In ID mode, we can determine set of rules as criteria for detecting invading programs. SNORT checks network traffic based on a characteristic database of invading programs. For example someone can adjust SNORT by a rule to make a warning message or to take proper action whenever an access in a defined protocol from/to a specific port and from/to specific destination with a content containing a specific string happens. Each rule of SNORT has two parts: header and content of data packet. In the rule header, protocol type, IP address and source and destination port numbers of invading packet is located. Content part contains a string pattern in ASCII, Hex format or combination of two formats. In SNORT rule, Hex part is embraced between two sign. A sample SNORT rule is shown in Fig. 1. alert tcp any any -> /32 111(content: "idc 3a3b "; msg: "mountd access";) Figure 1. Sample of a SNORT rule This rule is due to an invading program that is within a TCP protocol and its source has unknown IP address and port number. 83 The IP address of destination is and its port number is 111. Many of packets in the network have these attributes. Therefore to identify packets of an invader program, data packet content should contain pattern idc 3a3b. This pattern includes characters c, d and i and bytes 3a and 3b [15]. Snort in complete version is a kind of Network Intrusion Detection System (NIDS). This software is configured in three modes: sniffer mode, packet recording mode and intrusion detection system. Snort depends on a pattern matching and makes content analysis. Each rule of Snort has two parts: header and content of data packet. In the rule header, protocol type, IP address and source and destination port numbers of invading packet is located. Content part contains a string pattern in ASCII, Hex format or combination of two formats. Users can add new rules according to its own demands or build their own rule database. The header is to define an action, but the content of data packet is to completely describe the characteristics of a data packet. Thus, rules matching engine can handle at a high and effective speed. Snort rules can make classification according to technology type, attack type, threat types, it also define the priority, so it can further improve the rules matching efficiency. Snort is a packet sniffer based on wireshark, and it can be used as a lightweight network intrusion detection system. It can monitor network traffic in real time, analyze protocol for each packet and match intrusion feature, which detect dangerous or suspicious behavior. Snort-inline is a tool to modify the Snort. Snort inline has three changes on Snort: the manner of get network packet, the process of analyze packet and the response mode of feedback packet. B. Snort Modes Snort can operate in three different modes namely tap (passive), inline, and inline test. Snort policies can be configured in these three modes too. Explanation of Modes[15] Inline When Snort is in Inline mode, it acts as an IPS allowing drop rules to trigger. Snort can be configured to run in inline mode using the command line argument Q and snort config option policy mode as follows: snort Q config policy_mode:inline Passive When Snort is in Passive mode, it acts as an IDS. Drop rules are not loaded (without treat drop as alert). Snort can be configured to passive mode using the snort config option policy mode as follows: config policy_mode:tap

4 Inline Test Inline Test mode simulates the inline mode of snort, allowing evaluation of inline behavior without affecting traffic. The drop rules will be loaded and will be triggered as a Wdrop (Would Drop) alert. Snort can be configured to run in inline-test mode using the command line option (enable inline test) or using the snort config optionpolicy mode as follows: snort enable inline-test config policy_mode:inline_test 29 C. Aho-Corosick Algorithm Aho-Corasick [6] is an exact pattern matching algorithm; it finds it applications in many areas especially in intrusion detection systems. Snort by default makes use of a variant of Aho-Corasick algorithm for doing the pattern matching with the snort rules. The main concept behind this algorithm is the automata creation. It constructs the automata for the input file and when a new pattern has to be matched then it will traverse through the automata and finds the matched position. The automata construction can be either deterministic finite automaton (DFA) or nondeterministic finite automaton (NFA). DFA and NFA have advantages and disadvantages on its own. While DFA occupies more memory, NFA will not. When decisions can be made based on approximate results then NFA can be the best fit as there are multiple transitions from one state to another resulting in multiple final states. But when exact string matching is required then DFA is the chosen method as there is always only one transition from one state to another. Aho-Corasick algorithm was implemented in Improved Snort using the C library Multifast [11] which will perform multi-pattern matching. The main advantage of using this library is that multiple patterns can be searched through the automata. Improved Snort integrated this concept of multi pattern matching for intrusion detection. The library constructs the automata for the rule files generated based on the protocol type. In this case, automata are constructed for the content portion of the Snort rules which was extracted by means of pre-processing. This automation construction will be initialized only once. The same concept goes for the Snort also where the automaton creation will be there for the entire Snort rules occupying more memory in so many MBs and thereby resulting in a vast amount of states and transitions. So it will take more time to do the transition. This library will construct DFA for the incoming files. This library was modified in order to show additional details about the matched pattern like the start and the ending position of the matched string, the string length and so on. The Aho-Corasick algorithm runs with a time complexity of O(m+n) in which m is length of the pattern and n is the length of the text. D. Limitations of Snort Snort is an open source intrusion detection system which is based on the misuse detection technique. Its decision making is backed by a set of predefined rules called the snort rules which are easily downloadable from the internet. Snort makes use of many predefined algorithms for pattern matching namely Aho-Corasick, Horsepool and the combination of these algorithms too. As part of its start up script snort initializes the predefined rule sets automatically. As and when the packets make its way to the network they are matched against these rules. If a pattern match is detected then the packet is flagged as anomalous and is logged into the directory which is specified during the runtime. The snort rule can be divided into two main parts namely the header and the options. The header portion of the rule mainly consists of the source and the destination port, protocol and the action to be taken. The option portion contains additional fields in the packets namely in the flags, content, URL, depth to which the packet has to be traversed, the ICMP type, references, the snort id, the attack type, the message to be displayed if ever an attack is detected etc. Some of the prominent drawbacks of snort are listed below: Adding additional snort instances and modifying snort configurations can lead to mistake magnification. So experienced users only can use it. Snort cannot detect UDP and TCP flooding attacks; it can only detect ICMP flooding attacks. When snort is in its active detection mode it will utilize 100% CPU and will slow down the performance of the system to a greater extent. In snort, graphical interface is not there by default and can be achieved only by adding extra plug-ins. By default snort will not provide any anomaly detection and is purely a misuse based system. Extra plug-in is required. While handling the normal traffic snort will process the packets at a slow phase. During a DoS and DDoS attack snort throughput increases drastically, but will drop large number of packet. When the number of rules increases, memory utilization also increases and hence will take longer to initialize all the rules. Snort checks each and every field specified in the rule and creates RTN, OTN for all the fields in the rule. Therefore it will decrease the processing throughput by performing several unnecessary comparisons with all the fields in the rule. Snort is capable of detecting flooding attacks by default. If snort needs to be configured to detect other modes of attacks then the configuration file have to be changed which indeed is a tedious task. 84

5 Snort is purely an intrusion detection system and is not an intrusion prevention system. Snort will start to drop the packets at a massive rate when the incoming packet rate is more. Therefore possibilities of detecting possible attack patterns are more since it fails to analyze those dropped packets. I. Proposed Algorithm of Improved Snort Improved Snort was mainly developed to plug some of the above mentioned soft spots. Prime focus was in bringing about substantial improvement in performance over Snort IDS in terms of its CPU and Memory Utilization and also in reducing the latency induced to the streaming data packets despite being sniffed for malicious activities on the fly. From the drawbacks of Snort it is clear that it is purely an IDS and if need to be IPS enabled then additional plug-ins is required. But Improved Snort does both detection and prevention tasks. Also in this approach, integration of both the misuse and the anomaly detection methods was done to trim down the number of false alarms to a greater extent. For implementing the misuse based detection system in Improved Snort the default Snort rules were modified. In case of Snort the rule tree structure (automata) will be constructed for both the header and the options portion. But in case of Improved Snort the finite automata construction for the deader portion is completely avoided and the automaton is constructed for the options portion alone. This is further sliced thin by constructing the automata only for the content portion of the predefined rule set. Initial pre-processing is done b grouping the rules based on the protocols and storing them separately in four different files for TCP,UDP,ICMP and IP respectively. As a packet is intercepted by Improved Snort,it extracts the protocol field from the packet s header. Packets are then redirected to the file that contains the rules pertaining to the protocol to which the packet is associated to. But in case of Snort such pre-processing measures are not performed and hence the packet will be compared against all the rules irrespective of its protocol. This will increase the number of searches needed inducing increased latency to the packet. Improved Snort reduces the number of searches considerably by confining the searches with the protocol to which the packet is associated to. A network intrusion attempt can be easily detected in most cases by checking the content field in the packet alone rather than checking for all the fields in the packet. So the pattern matching algorithm can be applied for matching the content portion of the incoming packets with the content portion of the predefined rules. Further sub-grouping of rules, based on ports can be done in order to condense the count of searches to a greater extent. 85 II. In Improved Snort automata that are built for the rule matching is created by using only the content portion of the rules alone where as in Snort automata is built by considering every attribute present in the rule. This results in a much deeper tree structure requiring more processing power and memory in order to compare the rules and for in-memory storage of the automata respectively, thereby resulting in an increased search time, CPU and memory usage. Increased search time will directly result in an increased latency being induced onto the network packets resulting in the network under performing. Packets with these intrusive patterns will then be captured and analyzed using Improved Snort. Performance Analysis of Snort and Improved Snort The comparative analysis between Improved Snort and Snort were performed over Ubuntu with the following system specifications: dual core processor 2 nd generation 2 GB RAM with 500 GB internal hard disk. Improved Snort was tested against Snort with rules whereas the default rules were retained for Snort. Figure.2 Table 1 Sr.No. Improved Snort Snort Data in Mbs

6 Fig.2 shows the percentage of CPU utilized by Improved Snort and Snort. Also in Table.1 the data for the respective results are mentioned from which conclusions are drawn. Clearly it is evident from the graph that as the number of rules increases the CPU utilized is also increased. In case of Improved Snort it keeps in par with Snort till about rules but from thereon it will continue to consume only 50% of the CPU. Snort on the other hand tend to grab 100% of the CPU cycles once the number of rules exceeds leaving the system with no more room to perform other jobs. In case of Snort, with time in the increase, the throughput seems to be in the decrease, indicating severe latency being inducted to the network packet flow. Snort will process more packets only when attacks like DoS and DDoS are attempted onto the system. At the same time Snort will start to drop the packets at a massive rate during these flooding attacks. With Improved Snort on guard, the throughput is in par with a network where there are no IDS/IPS systems are operational. Improved Snort will process all the packets which it receives without much packet loss preserving high throughput, the response time of Improved Snort for performing pattern matching. Intrusive patterns were generated in order to match the first and the last rule using the Wireshark tool and the time taken for doing the pattern matching was calculated. Pattern matching is faster in case of Improved Snort when compared to Snort, as Improved Snort does pre-processing of the rules and also by reducing the number of searches by doing the protocol based grouping as mentioned above in the previous sections which increases the performance in terms of memory utilization and CPU speed to a greater extent. Figure.3 Table 2 Sr.No. Improved Snort Snort Data in Kbs The fig.3 shows the throughput achieved by Improved Snort and Snort. Also in Table.2 the data for the respective results are mentioned from which conclusions are drawn. 86 Figure.4 Table 3 Sr.No. Improved Snort Snort Data in Mbs

7 Fig.4 shows the comparison between Snort and Improved Snort in terms of memory consumption when the full rule base in used. Also in Table.3 the data for the respective results are mentioned from which conclusions are drawn. Improved Snort will occupy lesser MBs irrespective of the number of rules being used because automata is constructed only for the content portion of the Snort rules alone and all other portions in the Snort rules namely the rule header and other fields in the rule options are neglected. But in case of Snort when the number of rules increases memory utilized also increases and it will be around 2-3 GBs when full rule base is used as it is constructing the automaton for all the fields in the rules. Also tests we performed to verify the memory consumed by Snort and Improved Snort when the default set of rules were used. It is clear from the graph that Improved Snort occupies lesser MB where as Snort consumes much more when the default rules are loaded. Improved Snort continue to stabilize in terms of its memory utilization thereafter where as Snort continue to consume memory aggressively. E. Previous Work: Accelerating Multipattern Matching on Compressed HTTP Traffic Anat Bremler-Barr, Member, IEEE, and YaronKoral Current security tools, using signaturebased detection, do not handle compressed traffic, whose market-share is constantly increasing. This paper focuses on compressed HTTP traffic. HTTP uses GZIP compression and requires some kind of decompression phase before performing a string matching. We present a novel algorithm, Aho Corasick-based algorithm for Compressed HTTP (ACCH) that takes advantage of information gathered by the decompression phase in order to accelerate the commonly used Aho Corasick pattern-matching algorithm. By analyzing real HTTP traffic and real Web application firewall signatures, we show that up to 84% of the data can be skipped in its scan. Surprisingly, we show that it is faster to perform pattern matching on the compressed data, with the penalty of decompression, than on regular traffic. As far as we know, we are the first paper that analyzes the problem of on-the-fly multipattern matching on compressed HTTP traffic and suggest a solution. F. Drawbacks of Previous Work: In the DEFLATE format, Huffman codes both ASCII characters (a.k.a. literals) and pointers into code words using two dictionaries, one for the literals and pointer lengths and the other for the pointer distances. Huffman may use either fixed or dynamic dictionaries. The use of dynamic dictionaries gains better compression ratio. The Huffman dictionaries for the two alphabets appear in the block immediately after the header bits and before the actual compressed data. A common implementation of Huffman decoding uses two levels of lookup tables. The first level stores all code words of length less than 9 b in a table of 2 entries that represents all possible inputs; each entry holds the symbol value and its actual length. If a symbol exceeds 9 b, there is an additional reference to a second lookup table. Thus, on most of the cases, decoding a symbol requires only one memory reference, while for the less frequent symbols it requires two. The basic AC algorithm constructs a deterministic finite automaton (DFA) for detecting all occurrences of given patterns by processing the input in a single pass. The input is inspected symbol by symbol (usually each symbol is a byte), such that each symbol results in a state transition. Thus, the AC algorithm has deterministic performance, which does not depend on the input, and therefore is not vulnerable to various attacks, making it very attractive to NIDS systems. Note that this common encoding requires a large matrix of size, where is the set of ASCII symbols and is the number of states) with one entry per DFA edge. At the bottom line, DFAs require a significant amount of memory; therefore they are usually maintained in main memory and characterized by random rather than consecutive accesses to memory. We note that there is no apparent easy way to perform multipattern matching over compressed traffic without decompressing the data in some way. This is mainly because LZ77 is an adaptive compression; namely, the text represented by each symbol is determined dynamically by the data. As a result, the same substring is encoded differently depending on its location within the text. Thus, decoding the pattern is futile. Space: One of the problems of decompression is its memory requirement: The straightforward approach requires 32 Kb sliding window for each HTTP session. Note that this requirement is difficult to avoid since the back-reference pointer can refer to any point within the sliding window and the pointers may be recursive unlimitedly (i.e., pointer may point to area with a pointer). On the other hand, pattern matching of noncompressed traffic requires storing only one or two packets (to handle cross-packet data), where the maximum size of a TCP packet is 1.5 kb. Hence, dealing with compressed traffic poses a higher memory requirement by a factor of 10. Time: Recall that pattern matching is a dominant factor in the performance of security tools [1], while performing decompression further increases the overall time penalty. Therefore, security tools tend to ignore compressed traffic. 87

8 Note that a byte with an Uncheck status provides a location to restart scanning from. Hence, every byte with Uncheck status raises the chance for skipping more bytes. As shown in our experimental results section, most of the time the DFA uses states of low depth, hence in most cases the status would be Uncheck. Therefore, we might skip scanning most of the bytes. It only causes skipping less byte. III. CONCLUSION This paper discusses about a performance enhanced IDS/IPS tool called Improved Snort which was initially modeled based on Snort. The main motive of Improved Snort is to develop a better tool capable of detecting and preventing the DoS attacks which is still treated as a major security threat. By performing a series of preprocessing steps Improved Snort has managed to detect and prevent misuse and anomaly detection more precisely and rapidly thereby reducing the rate of false alarms. Improved Snort also managed to decrease the amount of memory and CPU consumed. This memory reduction was achieved by the series of preprocessing which was done by constructing the automata for the rule options and that too for the content portion of the Snort rules alone. But in case of Snort automata will be constructed for both the rule header and the rule options which will consume more memory and loads of transitions will be there. It is enough to construct the automata for the content portion alone as the U2R and R2L attacks are mainly content based attacks and the content portion of the Snort rule is sufficient to detect these attacks. The increased speed of execution was achieved by doing rule grouping and processing based on the protocols thereby reducing the number of searches. One of the main drawbacks of Snort is that it will start to drop the packets at a higher rate when flooding is there without even analyzing them. But Improved Snort will process more packets and almost at a constant rate irrespective of flooding and other types of attacks. Improved Snort is a tool with IPS capability in-built into it, where as Snort needs additional plug-ins to achieve the same. Improved Snort also integrated both the misuse and the anomaly detection module which will reduce the number of false alarms generated to a greater extent. If an intrusion attempt manages to bypass one module then it will be picked up by the other, i.e. if an attack escapes the misuse detection module then it will be detected by the anomaly detection module and vice versa. REFERENCES [1] snort homepage [2] [3] Coint CJ.; Stanford S; and McAlemey J. (2001): Towards Faster String Matching for Intrusion Detection for Exceeding the Speed of Snort, pp [4] Wireshark Tutorial [5] 2010 International Conference on Networking and Digital Society The Study on Network Intrusion Detection System of Snort Zhou Zhimin, Chen Zhongwen, Zhou Ti echeng, Guan Xiaohui Department of Computer Science Zhejiang Water Conservancy And Hydropoeer College Hangzhou, China [6] Aho A.V.; Corasick M.J.(1975): Efficient String Matching: An Aid to Bibliiographic Search, Bell Laboratories, Communication of the ACM, pp [7] Seguin K: The Little MongoDB Book. [8] Roesch M. (1999): Snort: Lightweight intrusion detection for networks, In Proceedings of the 1999 USENIX LISA Systems Administration Conference, pp [9] Suter R (2012): MongoDB: An Introduction and performance Analysis, Seminar Thesis, Rapperswil. [10] Tongaonkar A; Vasudevan S; Sekar R(2008): Fast Packet Classification for Snort by Native Compilation of Rules, Stony Brook University, 22 nd Large Installation System Administration Conference, pp [11] [12] Working with Snort Rules, Pearson Education Inc, Dec [13] [14] Rodfoss.pdf Comparison of Open Source Network Intrusion Detection Systems Jonas Taftø Rødfoss [15] Comparison of Different Intrusion Detection And Prevention Systems, Abhishek Chauhan [16] 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE) Research on Intelligent Intrusion Prevention System Based on Snort Hui Li Graduate School Changchun University of Technology Changchun, China Dihua Liu School of Computer Science and Engineering Changchun University of Technology Changchun, China [17] 2011 The 6th International Forum on Strategic Technology Researh on Network Intrusion Prevention System Based on Snort Jiqiang Zhai, Yining Xie Computer Science & Technology College,Harbin University of Science and Technology Harbin, China 88

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre

More information

Intrusion Detections Systems

Intrusion Detections Systems Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Intrusion Detection in AlienVault

Intrusion Detection in AlienVault Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

The Power of SNORT SNORT Update

The Power of SNORT SNORT Update The Power of SNORT SNORT Update Jean-Paul Kerouanton 11 th May 2010 2 Leveraging the Snort Brand The Power SNORT = The Power of Open Source The SNORT- Universe AMAZON - +100 items GOOGLE +3.700.000 hits

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Intruders and viruses. 8: Network Security 8-1

Intruders and viruses. 8: Network Security 8-1 Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Configuring Snort as a Firewall on Windows 7 Environment

Configuring Snort as a Firewall on Windows 7 Environment Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Configuring Snort as a Firewall on Windows 7 Environment

Configuring Snort as a Firewall on Windows 7 Environment Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University

More information

Web Application Security

Web Application Security Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/

More information

Dynamic Rule Based Traffic Analysis in NIDS

Dynamic Rule Based Traffic Analysis in NIDS International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing

More information

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall

More information

Network Monitoring Tool to Identify Malware Infected Computers

Network Monitoring Tool to Identify Malware Infected Computers Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems

More information

Securing Cloud using Third Party Threaded IDS

Securing Cloud using Third Party Threaded IDS Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,

More information

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Passive Vulnerability Detection

Passive Vulnerability Detection Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards

More information

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010 December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

Study and Analysis of Network based Intrusion Detection System

Study and Analysis of Network based Intrusion Detection System Study and Analysis of Network based Intrusion Detection System Lata 1, Indu Kashyap 2 M.tech student,mriu,fbd,india 1 Assistant professor CSE dept. MRIU, fbd, India2 Abstract:-Intrusion detection system

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:

More information

Firewalls & Intrusion Detection

Firewalls & Intrusion Detection Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

Intrusion Detection & SNORT. Fakrul Alam [email protected]

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University,

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

A Comparison of Four Intrusion Detection Systems for Secure E-Business

A Comparison of Four Intrusion Detection Systems for Secure E-Business A Comparison of Four Intrusion Detection Systems for Secure E-Business C. A. P. Boyce, A. N. Zincir-Heywood Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada {boyce, zincir} @ cs.dal.ca

More information

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY 51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information