DDoS Detection and Alerting
|
|
|
- Vincent Harrison
- 10 years ago
- Views:
Transcription
1 DDoS Detection and Alerting University of Amsterdam MSc System & Network Engineering Daniel Romão Niels van Dijkhuizen February 10th, 2014 Abstract: Distributed Denial of Service attacks are becoming very popular nowadays. The easy access to services and resources that can be used for this purpose, and the high resulting amount of damage, are the main reasons for this. Current detection and mitigation systems are not accurate enough and can be very expensive. Previous research has led to detection methods that even though can be accurate for certain kinds of anomalies, no effective real solution or system has been proposed or made. By analyzing NetFlow data from the core routers of the ISP where this research was done, we defined categories for different kinds of traffic, which are treated in a different way. We created a model for volumetric Distributed Denial of Service attacks detection and we created a statistical method to find optimal thresholds for detection of such anomalies. We individually analyze protocol-port combinations that are either popular or have potential to be used for this kind of attacks, which are handled individually for a more accurate detection. By subtracting the individually analyzed traffic, we also analyze the remaining traffic for new attacks detection. For traffic where a repetitive behavior over time is observed, we created baselines from past traffic data, which will adapt over time to mimic the traffic trends. Our method revealed to be particularly effective for repetitive traffic with noise, where the statistically calculated values where a good match, avoiding normal traffic noise while detecting traffic peaks related to anomalies. We developed a prototype in a form of a NfSen plugin, where the results of our analysis were applied.
2 1 Introduction A Distributed Denial of Service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users from multiple hosts. These attacks are becoming a serious threat to businesses, institutes and governments. The easy access to services that provide DDoS attacks for little or no fee, allow even inexperienced users to generate attacks. Attackers use Botnets and so called DDossers, Booters or Stressers 1 for DDoS attacks in order to saturate the targets bandwidth. Cloud computing and high bandwidth Internet connections are widely available for whatever purpose its users intend and therefore can also be abused for DDoS attacks. DDoS attack techniques change from day-to-day and are not only becoming more frequent, but also more sophisticated. Gartner wrote a report 2 on the increasing use trend of the hard-to-detect application layer attacks for the year The high volume or flooding attacks are currently still the most common ones. Good attack detection and mitigation systems are very expensive, and are still far from preventing every kind of DDoS attacks on a network. Detection systems often rely on proprietary detection schemes. Effective DDoS detection requires active monitoring which is both hard and time consuming. As a result a lot of networks are vulnerable to DDoS attacks. Often network administrators only realize that they are being victims of such an attack when systems or networks already have availability issues. In those cases the harm is already done. The core network of our Internet Service Provider 3 generates NetFlow 4 traffic statistics. Among other things NetFlow data consists of source and destination IP addresses, IP protocol and UDP/TCP port numbers for both source and destination. This data is fed to Arbor Peakflow to do DDoS detection and traffic washing. NfSen is another tool used to monitor the same NetFlow data. Currently NfSen is configured to monitor flows with fixed absolute threshold values. These are being picked manually by the administrators by educated guess. The ISP likes to know if steps towards automated mitigation of DDoS attacks can be made. Therefore our main research question is: Can we derive DDoS mitigation rules from the available production data in near real-time in order to alert and mitigate? In order to answer this question, we define some sub-questions: What kind of DDoS attacks can we detect? Can we detect them on a near 5 real-time basis? Can we extract enough information for mitigation? By analyzing a part of the ISP s flow-data, we expect to find patterns for specific traffic. We propose a model for near real-time NetFlow analysis on traffic with special interest and for residual traffic. We will pick out commonly used protocol-port combinations as well as combinations that can be used for amplification and reflection attacks. By categorizing this traffic and by looking for correlations we derive rules for anomaly detection. With the categorized traffic and anomaly rules, we expect to be able to detect anomalies more accurately than what is possible with the ISP s current methods. The rest of traffic statistics will be summed up per transport layer protocol in order to detect new types of anomalies. We expect that NfSen provides enough flexibility to implement our model in the form of a prototype plugin to do anomaly detection on a near real-time basis. The system will send out an alert to the administrators when an anomaly occurs. The alert contains the information to perform the actual mitigation. 2 Related Work DDoS attacks have been subject of several studies, especially during the last few years. Even some practical implementations of detection and mitigation systems were made. Bhuyan et al. [1] did a comprehensive survey on current DDoS attack architectures and existing detection methods, highlighting some open issues, research challenges and possible solutions. Even though it doesn t provide concrete answers on detection of DDoS attacks, the work they did is relevant when starting research on this topic. The DDoS threat spectrum White Paper by David Holmes from F5 Networks [2] also presents relevant information on DDoS attacks. The most common We did our research at a relatively big Dutch ISP Near in our case means around 5 minutes 1
3 types of DDoS attacks were characterized according to profiles. An economical overview is also presented, such as the relation of the cost of attack launch versus incurred cost to target, and the possibility of extortion by threatening companies to pay a relevant amount of money if they don t want to be attacked. Usually, the high volume DDoS attacks are UDP based. Bardas et al. [3] investigate the assumption of a proportional packet ratio to classify UDP traffic. They assume that regular UDP traffic is received in the same amount that is sent, which is something that according to their experiments, verifies for most of the UDP-based applications. However, the normal behavior of some UDP-based application will raise false alarms. This method does not detect large scale source IP address spoofing where the traffic is spread across many IP s. Cho et al. [4] present a baseline traffic model using NetFlow data collected on various points of an ISP network. By looking at the flows per second and bits per second information of the data collected, they used the simple linear regression analysis technique to find an optimal relation between those variables that identifies regular traffic. Even though they were successful on detecting some types of attacks, this method revealed to be very limited, and as such, can only be applied to certain kinds of network traffic. It is important to make clear that the baseline model type presented in this paper differs from ours, as will be seen in the later sections. The baseline model presented refers to the flows per second and bits per second ratio, while our baseline is the collected statistics of the amount of various parameters of the traffic, in order to learn what the regular behavior of the traffic is. Another approach, presented by Jun et al. [5], is to look at the entropy of several parameters of the traffic and define thresholds. The first parameter being analyzed is the total volume of the traffic. If the entropy threshold is achieved, the entropy of the destination IP addresses is assessed. If this second parameter is higher than its threshold, the same is done for the source ports, and if again it is higher than the threshold, the same is done for the source packets. If all of these parameters are abnormal, then a DDoS attack is happening. The first limitation regarding this method, is that due to its high sensitivity, it is best used with data collected in a router that is close to a customer (edge router), not on the core routers of an ISP where our research is intended. Also, the efficiency of this detection method is not clear on the paper The work done by Chen et al. [6] differs from the previous as it is meant for preventing botnet generated DDoS attacks. Web botnets disguise control messages over HTTP, especially this kind of botnet attacks can be troublesome to detect. By doing deep packet inspection, they were able to recognize patterns that lead to successful detection of botnets. The deployment of deep packet inspection systems is in many cases not feasible, either due to legal and ethical constraints, or due to resource limitations in high traffic environments. 3 Methods In order to define a scope for the research project, we took the following parameters and resources into account: The data set of the ISP is based on captured NetFlow data with a one on hundred sampling; The data set can be picked only from a limited period of time (1 month max.); Two weeks for experiments and development; Development and off-line analysis on a Linuxbased VM with non-production like flowtraffic capturing possibilities and full access rights; Testing possibilities on a FreeBSD server with production-like flow-traffic. Limited access rights. The focus of the research will be on statistical network anomaly detection. We expect to primarily detect flooding attacks, which include amplification and reflection attacks. These volume-based methods should be detectable with a statistical approach. Figure 1 shows the topology of the data collection and analysis system, in which our prototype will reside. The NetFlow data is transmitted by the core routers of the ISP. This data is collected by machines running NfCapd 6, which stores the information of the flows. To analyze this information, NfDump 6 can be used, or in a visual way with Nf- Sen 7. 2
4 3.1 Model In order to do near real-time anomaly detection, we propose a model that can be either used in a centralized or decentralized set-up. Figure 2 shows a schematic view of our model. Captured NetFlow data will be split up into source and destination traffic and statistical values will be registered for a profile within a short interval. For accurate analysis, we decided to split the traffic up in profiled traffic and the non-profiled traffic. The profiled traffic includes all the protocol-port combinations that will be subject to individual analysis. Figure 2: Model for DDoS detection Figure 1: Network and Services topology The NetFlow values for a profile can be tested against a set of conditions in order to detect an anomaly. When such is detected, an alarm will be raised until the anomaly is no longer applicable for that specific profile. All statistics of the profiles are summed up into totals and destination and source traffic are combined per transport layer protocol (UDP, TCP and ICMP). These values will be subtracted from the rest of the transport layer protocols in order to get the residual statistics of each transport layer protocol. This residual transport layer protocol traffic will be called non-profiled. A set of conditions will again be applied on these values in order to detect potential new network application abuse, and an alarm will be raised in case of anomaly detection. By creating profiles for certain protocol-port combinations (such as DNS/UDP, NTP/UDP,...), we can individually monitor the protocols that are currently popular for DDoS attacks, or that have potential for this purpose. The statistical values include the amount of Flows, Packets and Bytes. The captured statistics of a profile are stored in a database (this is sometimes referred to as a baseline) in order to do time-series data analysis. Analysis can be done fast in this way, because there is no need to keep track of each individual flow and therefore the amount of queries on the flow-data will be limited. 3.2 Data Analysis To begin with our analysis, we first collected one week of NetFlow data. The period of data we could choose from was between the last two weeks of December 2013 and the first two of January The first three weeks were not representative for a normal week of traffic, since the Holidays caused significantly lower traffic statistics. We chose to pick week two of 2014, which had representable values for an average week. This period contains one restart of the NetFlow collector on Friday just before midnight. This explains a gap in the data which can be seen in figure 4 at the rightmost arrows of both the top and bottom graphs. 3
5 Figure 3: An example of two protocols with different behavior Profiled traffic We did analysis on the protocol-port combinations of table 1. We found out that this traffic can be divided into several categories: Repetitive traffic with noise; Repetitive traffic without noise; Non-repetitive traffic. Because we had both source and destination traffic of the profiles and all statistics on flows, packets and bytes, we could verify if there is a correlation on them. So therefore we also looked at byte/packet correlation and source/destination correlation. The Figure 3 show two very different kinds of traffic: repetitive traffic with noise (left) and non-repetitive traffic (right). In the left column we have Domain Name System (port 53) and on the right we have Network Time Protocol (port 123), both UDP. The top row illustrates the repeating regularity of the 4
6 flows of both protocols. On the DNS side one can clearly see the difference between day and night and working days versus the weekend. NTP on the other side doesn t have this regularity and apparently is also more symmetrical than DNS. The middle row shows the average packet size for both protocols. DNS shows an almost constant value around 90 bytes per packet with some shootouts. With NTP we also see a distinct line around 90 bytes/packet for the first half of the week. At the end of Friday, a sudden raise on the average packet size can be seen. It has been confirmed that this was an attack. The bottom row of figure 3 shows the ratio between the destination and source flows on a logarithmic scale in order to show the symmetry of the traffic. One can see that the ratio of the source and destination traffic is around zero, which proves symmetry. The spikes indicate a sudden anomaly. For DNS spikes occur on both sides. NTP has bigger peaks at the source than at the destination Non-Profiled traffic On the top part of the figure 4, the one week of UDP flow traffic can be seen. The black line represents the total amount of UDP flow traffic, while the grey line represents only the profiled UDP flow traffic. The left two arrows of the top graph point at two example anomalies that are reflected in the profiled data. By extracting the totals of the profiled traffic from the total traffic, we get a smoother graph without most of the noise and peaks caused by anomalies. This can be seen in the bottom part of figure 4. The main reason of this is the protocols being exploited for DDoS attacks were profiled. By having a cleaner non-profiled data, the detection of new kinds of attacks will be easier, as the noise caused by those will be easily seen. In such situation, the same analysis can be applied and the new type of attack can be profiled, leading again to a cleaner non-profiled data. 5
7 Figure 4: Non profiled traffic (UDP) Baselines and thresholds In order to obtain more accurate baseline, we manually adjusted the most obvious anomalies from the flow-data. After that, we applied the Friedman s smoothing algorithm to remove noise. This can be seen in the top graph of the figure 5. To find a good relative value (one that will be added to the baseline) that can be used as a threshold, we subtracted the now smoothed baseline to the traffic, obtaining only the noise. Then, by calculating the upper outlier of the boxplot of this data (also known as upper whisker), we found the threshold value seen in the middle graph of the figure 5. As can be seen, all the insignificant noise is below the threshold, while the peaks (network anomalies) are above the threshold. The bottom graph of the figure 5 shows the original traffic and the final threshold. Again, as expected, all the small noise is below the threshold, while the peaks are above. 6
8 Figure 5: Traffic base lining and analysis 3.3 Prototype The advantages of the integration with NfSen, is the possibility to use NfSen functions, such as e- mail capabilities, the possibility of development of a web interface integrated in the NfSen portal, and the automatic run when a new sample file is available, which happens every five minutes. NfSen plugins (like ours) are written in Perl. NfSen defines functions that need to be implemented, and run on different situations (NfSen start, new sample file, etc.). Our plugin has all of its logic implemented in Perl, and relies on a SQLite database for retrieval of the baselines, which are also updated by the plugin, retrieval of absolute and relative threshold, profiles, and other specific information, such as the weighting value for baseline updates and layer 4 protocols to be analyzed. The database also contains the active alerts and a history of past alerts. For alerts viewing and profiles management, a web interface was developed. This web interface, which is integrated in the NfSen portal, was written in PHP and HTML. A list of profiles is shown, along with the all the information related, such as absolute or relative thresholds, and protocol and port. Within the web interface it is possible to add and remove profiles. 7
9 4 Results Our analysis showed us that we can indeed detect network anomalies. After applying our statistical method to the profiles we created, we found that it was the most effective for repetitive traffic with noise. When dealing with repetitive traffic without noise, we found that smoothing is not necessary and even results in wrong baselines. With no or almost no noise, it not possible to get a proper outlier value either. Even though we use baselines for this kind of traffic, we had to define relative thresholds by analyzing visually the graphs. The non-repetitive traffic had to big differences between the normal traffic and the anomalies, that our statistical approach resulted in the outliers being too low in most cases. SNMP/UDP and NTP/UDP were effective though, because the destination traffic was repetitive but the source was non-repetitive. For non-repetitive traffic, we found that using a baseline is not an effective solution. In the end we concluded that the best approach for non-repetitive traffic is to simply define absolute thresholds. The following table shows the profiles we created for the prototype, the categories where they belong, and the method applied. Name Protocol Port Category Baseline Method chargen_tcp tcp 19 Non-repetitive No Absolute threshold chargen_udp udp 19 Non-repetitive No Absolute threshold dns_tcp tcp 53 Repetitive with noise Yes Relative threshold dns_udp udp 53 Repetitive with noise Yes Relative threshold http_udp udp 80 Non-repetitive No Absolute threshold http_tcp tcp 80 Repetitive without noise Yes Relative threshold https_tcp tcp 433 Repetitive without noise Yes Relative threshold https_udp udp 443 Repetitive with noise Yes Relative threshold netbios_tcp tcp 137 Non-repetitive No Absolute threshold netbios_udp udp 137 Non-repetitive No Absolute threshold ntp_tcp tcp 123 Non-repetitive No Absolute threshold ntp_udp udp 123 Non-repetitive No Absolute threshold qotd_tcp tcp 17 Non-repetitive No Absolute threshold qotd_udp udp 17 Non-repetitive No Absolute threshold snmp_tcp tcp 161 Non-repetitive No Absolute threshold snmp_udp udp 161 Non-repetitive No Absolute threshold ssdp_tcp tcp 1900 Non-repetitive No Absolute threshold ssdp_udp udp 1900 Non-repetitive No Absolute threshold ssh_tcp tcp 22 Non-repetitive No Absolute threshold ssh_udp udp 22 Non-repetitive No Absolute threshold Table 1: Profiles For the residual traffic, we found that our statistical method was effective. The approach taken for the repetitive with noise category was also applied for this traffic. By having our prototype running on a system with production flow-data, we were able, as expected, to detect network anomalies and raise alarms when that happens. Unfortunately due to lack of time, we were not able to manually verify, when possible, the type of anomalies for all the alarms raised, however, the following was verified: Profiled traffic: Some of the DNS/UDP and NTP/UDP traffic alerts were verified by the administrators to be DDoS attacks. Others could not always be verified since in some situations the verification has to be done with the customers, which is a time-consuming process. Non-profiled traffic: A TCP anomaly was detected. It has been verified that it was an anomaly caused by an Access Grid application used for video conferencing. In this case, it was legal traffic. 5 Conclusion During this research project, we looked at several protocols that can be used for DDoS attacks. Some are currently very popular, such as DNS and NTP, while others are, at least at this moment, not being used for this purpose. We did statistical analysis on 8
10 the flow data of the ISP, and defined baselines and optimal threshold values for the protocols where those could apply, and absolute thresholds for the remaining. A prototype was developed where the result of our research was applied. Our tests and findings show that our baseline model is effective in the detection of high volume traffic anomalies. By following our statistical analysis on the Internet traffic, is it possible to find good thresholds for DDoS attack detection, as long as the traffic contains periodic repetition and contains at least some amount of noise. Our prototype is effective in the detection of network anomalies and able to do this on a near real-time basis, however at this stage, there is no conclusion on the type of anomaly. Additional checks should be performed to point out if the anomaly is a scan, DoS, DDoS or legitimate change in the network flows. We could not detect other anomalies than high volume ones with our method. 6 Future Work After finishing the work on this project, there are some things based on our findings we think are important for continuing this research. On the data analysis sub-section we will point what should be the next step in order to obtain better values for some kinds of traffic, and on the prototype subsection we will tell what would be the next steps regarding our implementation. 6.1 Data Analysis After applying our statistical approach to the profiled traffic, we found that our approach worked significantly better on some profiles than others, leading to some unusable results. Further studies should be done in order to identify which statistical approach leads to the best results for each kind of traffic. Further analysis should be done to find out which complementary tests can be done, either to find more about a current attack, or to detect non-volumetric attacks. 6.2 Prototype Even though our prototype shows in a satisfactory way the results of our research, further testing should be done before deployment on a production system. The first step should be having independent threshold values/thresholds for source and destination traffic, as we verified that in some situations a common value is not optimal. In order to detect if an anomaly was caused by a DDoS attack, further tests should be performed after an anomaly is detected. An interesting extension, which can be seen in the Figure 1, is communication with a mitigation system and the mitigation system itself. As an example, Flowspec could be used to instruct compatible routers to automatically filter out malicious traffic. References [1] Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions December 2012 [2] David Holmes The DDoS Threat Spectrum F5 Networks [3] Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy and Xinming Ou Classification of UDP Traffic for DDoS Detection April 2012 [4] Yoohee Cho, Koohong Kang, Ikkyun Kim and Kitae Jeong Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points January 2009 [5] Jae-Hyun Jun, Hyunju Oh and Sung-ho Kim DDoS flooding attack detection through a step-by-step investigation December 2011 [6] Chia-Mei Chen, Ya-Hui Ou and Yu-Chou Tsai Web Botnet Detection Based on Flow Information December
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Distributed Denial of Service protection
Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT [email protected]
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module
Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module While HTTP Flood and DoS attacks are spreading nowadays, there is a new attack surface reduction
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
TELCO challenge: Learning and managing the network behavior
TELCO challenge: Learning and managing the network behavior M.Sc. Ljupco Vangelski CEO, Scope Innovations Kiril Oncevski NOC, ISP Neotel Skopje Presentation overview Challenges for the modern network monitoring
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.
Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1 Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION
AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION Overview Distributed Denial of Service (DDoS) attacks saturate target networks with service requests that consume the capacity
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool Wayne Routly, Maurizio Molina - (DANTE) Ignasi Paredes-Oliva - Universitat Politècnica de Catalunya (UPC) Ashish
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.
FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals Contents 1 2 3 4 Industry Trends DDoS Attack Types Solutions to DDoS Attacks Summary 2 Cybercrime Landscape DNS Hijacking Malware 3% 3% Targeted
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
