An Intelligent Firewall to Detect Novel Attacks
|
|
|
- Lee Joseph
- 10 years ago
- Views:
Transcription
1 An Intelligent Firewall to Detect Novel Attacks An Integrated Approach based on Anomaly Detection Against Virus Attacks InSeon Yoo and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of Southampton, Southampton, SO17 1BJ, UK. {isy01r, Abstract. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures in data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets. 1 Introduction Internet security breaches are growing. Viruses are one of the major causes of the rising number of security breaches. Nowadays some companies, which recognize the importance of security, adopt security systems such as firewalls, intrusion detection systems, and virus monitors. It is not easy to use all security systems owing to high cost. Furthermore, it is not enough to protect a company s system with only a single security system, because each security system has different features in present days, in which particularly DoS (Denial of Service) and virus attacks are becoming serious. We report in this paper on an ongoing project[14] which is to integrate a smart detection engine into a firewall, creating what we call an intelligent firewall. Integrating techniques of different security systems appears to offer interesting possibilities. This project is fulfilling such a task. One of the main features of the intelligent firewall will be an anomaly detection capability, which will be achieved by applying AI techniques to detect unusual network traffic (an intrusion detection capability) and to detect unusual content of data packets (a capability to identify unknown potential viruses). 2 Background 2.1 Increasingly Serious Attacks A virus is a piece of code that adds itself to other programs and cannot run independently. As Microsoft Windows became popular, windows viruses and windows-application-derived viruses using VBA (Visual Basic for Applications) spread widely. A common way of windows virus dissemination is through s. In addition, worms are programs that can run by themselves and propagate a Mária Bieliková (Ed.): SOFSEM 2002 Student Research Forum, pp , 2002.
2 60 InSeon Yoo and Ulrich Ultes-Nitsche fully working version of themselves to other machines. The recent important one was Code Red. The Code Red worm is a malicious self-propagating code [1] that spreads surreptitiously through a hole in certain Microsoft software. Code Red, which leaves computers open to hijacking, has caused a lot of traffic being sent, clogging the bandwidth on the Internet. An infected system will show an increased processor and network load. The worm could easily permit hackers to take control of hundreds of thousands of infected machines. The worm has this magnifying effect on network traffic during attacks on internal networks. DoS (Denial of Service) attacks can interrupt services by flooding networks or systems with unwanted traffic. A service will be denied because the network/system is overwhelmed. Distributed systems based on the client/server model have become increasingly popular. Using this scheme, DDoS (Distributed Denial of Service) attacks are also getting escalated. In DDoS form, an attacker controls a number of handlers. A handler is a compromised host with a special program running on it. Each handler is capable of controlling multiple agents. An agent is a compromised host, which is responsible for generating a stream of packets that is directed toward the intended victim. 2.2 Present Network Security Systems Virus monitors examine network traffic, aiming to prevent malicious code from entering network nodes by detecting known malicious-code patterns. Apparently, they can detect only known viruses. New viruses will only become detectable after their pattern characteristics have been analysed and are made available. Current IDSs(Intrusion Detection Systems) do not prevent an intrusion from happening; they only detect and report it. When a virus associated with a DoS (Denial of Service) attack spreads through the Internet (e.g. the CodeRed), virus monitors and IDSs should co-operate to prevent such an attack. However, although virus monitors and IDSs are installed, new virus information needs to be updated constantly. Moreover, firewalls are used to guard and isolate connected segments of inter-networks. Inside network domains are protected against outside un-trusted networks, or parts of a network are protected against other parts [10]. These firewalls use only TCP/IP headers - no payload information is used - to detect whether data packets are safe or not. 3 Applying Ideas From Intrusion Detection Systems 3.1 Anomalous Pattern Recognition IDSs very frequently run a process known as anomaly detection. An IDS based on this paradigm will constantly monitor network traffic and compare the stream of network packets with what it perceives as normal network traffic. As soon as it observes an anomalous pattern in the traffic it will throw a warning for the network administrator to deal with it. Anomaly detection appears to be applicable not only to intrusion detection but also to virus monitoring [9], now not being applied on the level of the full network traffic, but to single data
3 An Intelligent Firewall to Detect Novel Attacks 61 packets: The improved virus monitor will examine data packets as usual. But besides checking against known malicious-code patterns, it will check whether it sees a pattern that it perceives as potentially malicious and will react accordingly, e.g. by creating a warning of some sort. 3.2 Neural Network Models Nowadays most practical IDSs are signature-based systems. These systems work based on predefined descriptions of attack signatures. Various data-source and type-of-pattern recognition techniques are still used. However, many known attacks can be easily modified to present many different signatures. If not all variations are in the database, a known attack may be missed. Some more modern approaches try to exploit neural-network-based techniques. To explore attack spaces, [11] uses a hierarchy of back propagation (BP) neural networks (NN) for the protocol and the self-organizing map (SOM) technique for the anomaly classification. In an experiment, however, only artificially generated data was used. [6] uses a classical feed-forward multi-layer perceptron network: a back propagation neural network and time delay neural network to program-based anomaly detection. Lastly, to identify and classify network activity based on limited, incomplete, and nonlinear data sources, [2] presents an analysis of the applicability of neural networks. In the neural network architecture, multi-layer perceptron (MLP) and hybrid forms (MLP + SOM) are adapted. 4 Need of the Intelligent Firewall The intelligent firewall is our proposal for increasing the strength of firewalls. It will have the ability to examine entire data packets and to apply standard as well as intelligent detection techniques to identify misuse. 4.1 Data Packet Detection In order to identify viruses/worms in attachments, one exploits that a virus has a unique character, the virus signature. In addition to the usual network control ability of a firewall, data packet detection is necessary in the intelligent firewall to identify packets containing malicious data: Unique characters will also appear in the data packets. For instance, the beginning of the Code Red s attack packet looks like the following [7]: GET/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3 4.2 Dynamic Packet Handling Ability Although a firewall is able to control a network and maintain its connectivity, it handles packets only statically. Through open ports, a firewall would not
4 62 InSeon Yoo and Ulrich Ultes-Nitsche inspect/control packet willingly. According to the analysis of distributed denial of service attack tools, it is well known how to use that TFN [3], TFN2K, Trinoo [4] and Stacheldraht [5]. These programs not only use TCP and UDP but also ICMP packets. Moreover, because the programs use ICMP ECHOREPLY packets for communication, it will be very difficult to block attacks without breaking most Internet programs that rely on ICMP. Since TFN, TFN2K and Stacheldraht use ICMP packets, it is much more difficult to detect them in action, and packets will go right through most firewalls. The current only sure way to destroy this channel is to deny all ICMP ECHO traffic into the network. Furthermore, the tools mentioned above use any port randomly; it is hard to prevent a port from malicious attacks in advance using the fixed port close scheme in current firewalls. Therefore, to prevent degradation of service on the network and to deny this kind of malicious packet, dynamic packet handling on the level of firewalls is crucial. 4.3 Intelligent Detection Engine To prevent malicious self-propagating virus attacks from entering intranets, dynamic filtering of data packets is compulsory. Having the ability of anti-virus systems and IDSs, a malicious-data-packet-detection engine needs to be developed. Like a firewall, this system would have the ability to accept or deny packets. Equivalent to an intrusion detection system, it would examine a packet s content, flags, and headers to make a decision. As we examine virus packets filtered by MailScanner, which is running in the Southampton ECS intranet, the front parts of these packets display similar patterns. And indeed, if we capture good packets, which have already been filtered by the ECS firewall and MailScanner, these good packets are different. Most front parts of the good packets display a variety of patterns. In order to capture the investigated packets we have used the libpcap [8] packet capturing ability of snort [12]. However, in some of the good packets, we could see patterns very similar to the ones possible in packets containing malicious code. These were packets sent by Microsoft Servers to NetBios and DNS lookup services. For example, port 137 is reserved for the NetBIOS name service and port 138 is reserved for the NetBIOS datagram service. The subsequent packet was assumed to contain the signature of the BAT 911/Chode worm even though it was a benign packet: 05/24-13:10: :137 - > :137 UDP TTL:128 TOS:0x0 ID:47635 IpLen:20 DgmLen:78 Len: x0030: EEFDFDEFC 0x0040: ACACACACACACACAC 0x0050: C ACACABL.... Except these Microsoft Server packets, all other packets we have captured had a considerably different front part from data packets containing virus code. This observation suggests that malicious and benign packets look sufficiently different to consider an anomaly-based virus detection approach possible, which could identify new, unknown viruses.
5 An Intelligent Firewall to Detect Novel Attacks 63 5 Potential Approaches for the Detection Engine Intending to accomplish the detection engine sketched above, which will be capable of identifying new viruses and generating warnings correspondingly, we consider several approaches. Each approach obviously has its own advantages and disadvantages; we will therefore decide on which approaches to deploy in the detection engine only after thorough examination and experiments. The first approach to consider is the Bayesian Belief Network (BBN). A BBN is a special type of diagram, or graph, together with an associated set of probability tables. Nodes of the BBN represent entities and their attributes; the arcs describe the relationships between these entities. BBNs are beneficial to model uncertain events and arguments about them. Moreover, if Bayesian probability is applied to propagate, it produces useful probability estimates for uncertain outcomes. The second approach is Bayesian estimation. As an aspect of incremental learning, learning the parameters of a model can be addressed by Bayesian estimation. This has the following advantages: incorporation of prior knowledge and constraints, incorporation of models of time evolution, choice of optimality criteria, and, for linear Gaussian models, the Bayesian estimator is optimal under almost any rational optimality criterion. However, it has also disadvantages: a prior distribution must be known, and closed-form solutions are often hard to find. Thirdly, the data mining approach describes the discovery of useful summaries of data based on relations, patterns, and rules that exist in the data. Pattern extraction and discovery as well as feature extraction capabilities of data mining processes seem to offer interesting possibilities for our detection engine. Finally, there is the Neural Network approach. As the anomaly of data packets cannot be reduced explicitly to matching exact patterns, we need a mechanism that is capable of distinguishing between good and bad patterns in data packets based on (incomplete) knowledge about the general structure of these packets. With the aim to detect bad patterns, we take much account of five aspects: pattern classification, competitive learning, unsupervised learning, good performance in noise and error, and flexible time delay. Possession of such features can be found in neural-network-based detection. We will closely investigate 5 neural network models to deal with the 5 aspects of pattern classification as mentioned above: Self-Organizing Maps (SOM), Hopfield Networks, Hamming Networks, Probabilistic Neural Networks (PNN), and Time-Delay Neural Networks (TDNN). A detailed experimental analysis of these different models in regard to their suitability for the detection engine is part of future work in this project. 6 Conclusion and Future Research Currently we have produced a firewall layout using libpcap [8] and snort [12] modules. In order to capture packets from the datalink layer we have used libpcap, and to decode data packets we have modified parts of snort. Our goal is to
6 64 InSeon Yoo and Ulrich Ultes-Nitsche build a smart detection engine and integrate it into the prototype firewall we have built. This engine will be useful if its detection rate is higher than that of traditional IDSs anomaly detection rate with an acceptably low rate of false positives. Please recall that the smart detection engine will not only aim at detecting anomalous network traffic as in classical IDSs, but also to detect unusual structures in data packets that suggest the presence of virus data. With intent to accomplish this goal we are investigating the above-mentioned different classification techniques in detail to identify suitable candidates to implement and experiment with in our firewall prototype. Problems to tackle include the performance of the decision process (to deal with real-time network traffic) and optimisations to avoid the creation of too many false positives. The selection of suitable techniques will require sufficient experimental evidence of their applicability. Such experiments form the next step in the discussed project. References 1. CERT Advisory CA : Continued Threat of the Code Red Worm James Cannady and James Mahaffey: The application of artificial neural networks to misuse detection: initial results. In: Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection (RAID 1998), D. Dittrich: The Tribe Flood Network distributed denial of service attack tool. October D. Dittrich: The DoS Project s trinoo distributed denial of service attack tool. October D. Dittrich: The stacheldraht distributed denial of service attack tool. December Anup K. Ghosh and Aaron Schwartzbard: A study in using neural networks for anomaly and misuse detection sec99.zip 7. L-117: The Code Red Worm, U.S. Department of Energy. CIAC (Computer Incident Advisory Capability), July 19, shtml 8. LIBPCAP: The Tcpdump Group M. Swimmer: Review and Outlook of the Detection of Viruses using Intrusion Detection Systems. In: Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000). 10. Christoph Ludwig Schuba: On the Modeling, Design and Implementation of Firewall Technology. Purdue University, PhD thesis, ftp://ftp.cerias.purdue.edu/pub/papers/christoph-schuba/schuba phddis.pdf 11. Susan C. Lee and David V. Heinbuch: Training a neural network-based intrusion detector to recognize novel attacks. In: IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, July, 2001, 31(4) pp SNORT: The Open Source Network Intrusion Detection System G. Tesauro, J.O. Kephart, and G.B. Sorkin: Neural Networks for Computer Virus Recognition. In: IEEE Expert, 11(4): 5-6, August Ulrich Ultes-Nitsche and InSeon Yoo: An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. In: Proceedings of the 2nd ISSA To be Published.
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
Denial of Service (DoS)
Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Gaurav Gupta CMSC 681
Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls
CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing
Network Security Management
Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security
A Senior Design Project on Network Security
A Senior Design Project on Network Security by Yu Cai and Howard Qi Michigan Technological University 1400 Townsend Dr. Houghton, Michigan 49931 [email protected] Abstract Distributed denial-of-service (DDoS)
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
LoadMaster Application Delivery Controller Security Overview
LoadMaster Application Delivery Controller Security Overview SSL Offload/Acceleration, Intrusion Prevention System (IPS) and Denial of Service (DOS) Overview Small-to-medium sized businesses (SMB) are
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System
Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System Mohd. Jameel Hashmi 1, Manish Saxena 2 and Dr. Rajesh Saini 3 1 Research Scholar, Singhania University, Pacheri
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Network packet payload analysis for intrusion detection
Network packet payload analysis for intrusion detection Sasa Mrdovic Abstract This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick
Queuing Algorithms Performance against Buffer Size and Attack Intensities
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 141-157 Research India Publications http://www.ripublication.com Queuing Algorithms Performance against
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
Using Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology [email protected] Abstract Artificial Intelligence could make the use of Intrusion Detection
City Research Online. Permanent City Research Online URL: http://openaccess.city.ac.uk/1737/
Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi:
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
