Inspecting DNS Flow Traffic for Purposes of Botnet Detection
|
|
|
- Geoffrey McCoy
- 9 years ago
- Views:
Transcription
1 Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation to the botnet presence in the observed network. We focus on the DNS traffic generated by the botnets in general and inspect existing botnet detection methods using DNS data. DNS traffic in the form of IP flow data is studied and the possibility to use DNS detection methods on the IP flow data is discussed. An analysis of DNS traffic from backbone network is presented and directions for future work are provided. 1 Introduction The botnets represent one of the biggest Internet threats nowadays and they are still more frequent and spread all over the world. They are developed rapidly due to the huge hidden economics behind them [11], therefore their detection and defense against them is more difficult. The botnet research is and will be the important task for nowadays Internet security researchers. Malicious traffic is traditionally detected by deep packet inspection: the payload is searched for signatures of known attacks. However, this is very resource-intensive task and scalability is a growing problem in current multigigabit networks. Contrary, an intrusion detection based on an analysis of network flows (usually in the NetFlow format) scales well and is capable to capture a wide spectrum of attacks [13]. A network flow (NetFlow) is defined as an unidirectional sequence of packets with some common properties that pass through a network device, i. e., IP addresses, protocol and ports [4]. These flow statistics were originally generated by routers and switches for accounting and management purposes only. Nowadays, there are many network devices (including stand-alone probes) exporting NetFlow for the purposes of network behavior analysis and the anomaly detection. The detection is feasible even in 10 Gbps+ networks without any packet loss using flow-based approach, because the flow exporting process inspects only packet headers, not the entire packet payload. In our experience of deploying and running many NetFlow probes at campus network, NetFlow monitoring is very usable and powerful tool. In the following work, we are discussing possibilities to detect the botnet traffic by inspecting DNS network traffic stored in the NetFlow format. This work is based on the fact that each bot performs DNS queries in order to connect to the command and control (C&C) server or to download its update from the 1
2 botnet server. Existing methods distinguish legitimate DNS queries from the botnet queries using various types of metrics, e.g., the amount of DNS queries going outside the local network, the frequency of dynamic DNS usage, similar DNS behavior of host groups etc. A main problem is that these existing methods are using data and information contained in data payload and not present in the NetFlow statistics. Therefore, we will try to examine existing methods and their possibilities to apply them on the NetFlow data. Especially, we will focus on the following questions: Is it possible to detect botnets from the NetFlow data with no knowledge about packet payload? Is it possible to detect botnets by monitoring group activities of DNS queries? Is there a relationship between DNS connections going to the outside (nonlocal) DNS servers and possible botnet infection? In this report, we provide an overview of the DNS traffic generated by the botnets (Section 2), then we provide a description of existing botnet detection methods using DNS traffic (Section 2.2) and we list important features contained in DNS traffic suitable for botnet detection (Section 2.3). Following Section 3 discusses the NetFlow data and what information about DNS traffic it contains. An analysis of NetFlow data containing DNS traffic is presented in Section 4. The possible directions for future work are suggested in Section 5. 2 DNS Traffic Generated by the Botnets Domain Name System (DNS) [15] associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. DNS is one of the core services of current Internet. It is used not only for obvious benign purposes, but also for malicious use. As example we can see its usage in case of botnet command and control servers (C&C), phishing sites or download sites with malicious code. If we will take a look to the existing botnet infrastructures more in detail, we will see a strong need for management of large number of bots. These bots need to communicate with C&C centers to receive commands and to pass harvested information. The IP addresses of C&C servers cannot be hard-coded to the binary codes of bots - in such case, it would be easy to take down a particular botnet by blocking this particular IP address of command server. Therefore, by using DNS services, the attackers are able to change IP addresses of C&C servers with no need to modify bot codes (where is hard-coded only URL address of C&C server). They have also a possibility to hide malicious servers behind the proxy services using FastFlux technology [8]. 2.1 Specific Aspects of Botnets DNS Queries If we compare DNS queries generated by benign hosts and by malicious sources, there is enough differences to be able to distinguish between malicious and 2
3 regular DNS query, as described in [2]. We can find various methods described in literature to differentiate regular and botnet DNS queries. Specific behavior of botnets is implied by the following characteristics [1]: Botnet structure one to many the relationship between botmaster and bots is usually one C&C server to many bots and therefore we can detect similar group behavior of all bots in the network traffic. Botnet synchronization as the C&C server issues the command for bots, they communicate in the same time and also perform attacks in the same time. Therefore we are able to detect the increased amount of traffic related to the bot group compared to the traffic generated by the benign hosts. Bots response time as the bots receive a command from the botmaster, they perform requested activities with a constant response time compared to a wide variety of response times in the case of legitimate host. Therefore we can measure the response time to discover bots presence in the network. This specific behavior is present also in the DNS traffic generated by the botnets. E.g., the move of C&C server to a new location, when the old one is blocked, generates massive group DNS queries to find the location of the new C&C server. In these requests, botnets differentiate by the fixed group size generating DNS queries and also by the activity of botnet groups appears immediately compared to continuous and random activity of legitimate hosts [3]. 2.2 Existing Detection Methods The existence of botnets and botnets wide spread lead to many research studies focused on botnets behavior, detection, classification, etc. There are also some works focusing on the use of DNS queries for analysis and revealing botnets in ordinary traffic. In the work of Dagon et al. [7] were identified key metrics for measuring the utility of a botnets and in the following work [6], the authors analyzed canonical DNS request rate and compared DNS density. Similar approach was presented in the work of Kristoff et al. [9]. Techniques and heuristics for detecting DNS blacklist (DNSBL) reconnaissance activity, where botmasters perform lookups against the DNSBL to determine whether their spamming bots have been blacklisted, is suggested in [12]. Anomaly based botnet detection mechanism focusing on a group activity in DNS queries simultaneously sent by distributed bots is presented in [3]. Data mining approach was conducted in [14]. Approach identifying abnormal domain names issued by the malicious botnets and also analyzing DNS traffic requested by group of hosts is presented in [10]. Finally, the complex work by Bilge et al. [2] uses passive DNS analysis, examines a wide set of DNS traffic features and incorporates machine learning techniques. 2.3 DNS Query/Answer Features By studying the DNS behavior of known malicious and benign domains [2], we are able to identify distinguishable generic features that are able to define the 3
4 maliciousness of a given domain. From the DNS queries and DNS answers we can retrieve information like the name of the domain queried, the time the query is issued, the duration the answer is required to be cached (i.e., TTL) and the list of IP addresses associated with the queried domain. From this information, the authors of [2] identified 15 different features suitable in the detection of malicious domains Time-Based Features These set of features is based on the time, when the request was made. The time itself isn t very useful by itself, however, when we analyze many requests to a particular domain over time, patterns indicating malicious domain may emerge. The authors propose to use following set of features: Short lived domain a domain, which suddenly appears in the global scope time series and disappears after a short period of activity. If a domain is benign, even if is is not very popular, the number of queries should exceed the threshold at least several times during the monitoring period. Daily similarity this feature checks if there are domains that show daily similarities in their request count change over time. Repeating patterns this feature aims to detect regularly repeating patterns. Access ratio this feature checks whether the domain is generally in an idle state or is accessed continuously DNS Answer-Based Features The DNS answer from the DNS server can contain several DNS A records. In such cases, the DNS server cycles through the different IP addresses in a round robin fashion. This technique is useful for load balancing. Attackers typically use domains that map to multiple IP addresses, and IPs might be shared across different domains. Number of distinct IP addresses the number of IP addresses resolved for a given domain during defined time window. Number of distinct countries. Number of domains sharing the IP with. Reverse DNS query results number of reverse DNS queries of the returned IP addresses TTL Value-Based Features Time To Live (TTL) specifies, how long the corresponding response for a domain name should be cached. Ordinary values are set between 1 and 5 days. Setting lower TTL values is useful for the attackers. Using this approach, malicious systems achieve higher availability and become more resistant against DNS 4
5 blacklisting and take downs. Typical example are Fast-Flux Service Networks (FFSN) [8]. Average TTL simple TTL average, used in various detection methods. Standard deviation of TTL. Number of distinct TTL values. Number of TTL changes. Percentage usage of specific TTL ranges malicious traffic tends to set their TTL values to lower values Domain Name-Based Features The main difference between regular services and malicious servers is that regular services try to choose domain names that can be easily remembered by users. In contrast, attackers are not concerned that their domain names are easy to remember. 1. Percentage of numerical characters in domain name. 2. Percentage of the length of the longest meaningful substring. 3 Flow Data and Its Content Presented existing methods for using DNS traffic for detection of botnets are based on the assumption that we have complete payload data, which we can use for the features extraction. From the payload, we are able to mine out the domain name which was requested, TTL values, number of distinct IP addresses in the answer, etc. Contrary, in the NetFlow data, we have only limited amount of information about the DNS query and DNS answer. Namely, we have the following items: IP address of the host sending DNS query. IP address of the DNS server. Time of the DNS request. Time of the DNS answer. Size (in number of packets/bytes) of the DNS request. Size (in number of packets/bytes) of the DNS answer. Source port of DNS query and destination port of DNS query. Having this limited set of items to use for botnet detection, compared to the various features contained in DNS query/answer payload, we are not able to use presented DNS detection methods and we have to focus on the other possibilities, how to detect botnets. In the following, we will consider following features, which can provide us at least some information about possible maliciousness of particular host in the network. 5
6 Usage of local DNS servers versus public DNS servers ordinary hosts in local network are using local DNS servers to perform DNS queries. In the case of infected computers, they can use their own DNS servers or free DNS services (OpenDNS/FreeDNS). This behavior is possible also in the case of regular benign hosts, but the large amount of DNS queries against outside DNS servers indicates to possible botnet infection. Time of the DNS query group of DNS requests from a group of hosts performed in the same time or in the small time window can indicate a possible command issued from C&C server and its move or update of botnet control servers. Therefore the bots perform DNS request to update addresses of botnet control servers. As we can see, the amount of information suitable for the detection of botnets is very limited in the case of DNS traffic and NetFlow data. In the following, we analyzed a large sample of real traffic with the purpose to evaluate these two possible features and to determine, if they can be used for reliable detection of botnets. Crucial is a place, where is the NetFlow probe deployed. There are big differences in the obtained NetFlow data in the case of NetFlow probe deployed on the backbone link compared to the NetFlow probe deployed inside the local network. The type of DNS traffic data differs significantly: NetFlow probe deployed outside the local network in this case, the Net- Flow data contains only the communication between DNS servers and part of DNS queries going from local network to the public DNS servers. NetFlow probe deployed inside the local network in this case, we are able to inspect both DNS queries against the local DNS servers and also against the public DNS servers. Therefore, we have better data for the detection of possible botnet infection. Another way, how to improve botnet detection, is to employ additional tools for extracting crucial information from the packet payload and add them to the flow data. Current NetFlow format does not support such extension of flow data, but in the case of IPFIX format [5], we are able to add such information to each flow and consequently, to deploy previously presented botnet detection methods using more traffic features. 4 DNS Traffic Analysis To evaluate DNS features available in the NetFlow data, we captured one week traffic from real network and performed analysis of the DNS traffic contained inside this data. Our analysis was focused on the amount of DNS traffic compared to the total traffic, a ratio between UDP DNS queries and TCP DNS queries, how many DNS queries were performed against public DNS servers and if there are some detectable group activities in the DNS queries, revealing possible infected host in the monitored network. The results of the analysis are summarized in the following table and figures. Table 1 provides overview of analyzed NetFlow data and amount of particular 6
7 types of DNS traffic. One week traffic was captured from the link with the average load 1,4 Gbps transferring 13,2k flows per second in average. Data Type Flows Packets Bytes All traffic 8.0G 142.6G 104.9TB DNS traffic 491.8M 559.2M 77.0G DNS UDP traffic 490.2M 554.4M 76.7G DNS TCP traffic 1.6M 4.8M 295M Public DNS traffic 45.7M 60.4M 4.2G Table 1: Overview of the analyzed DNS NetFlow data. In the overall traffic volume, the DNS queries and replies represent 6.1% of data. If we will focus on the amount of TCP DNS traffic compared to UDP TCP queries, we can see that TCP protocol is used very rarely. Usually it is used when the response data size exceeds 512 bytes, or for tasks such as zone transfers. But as we can see from the Table 1, TCP DNS traffic represents only 0.3% from overall DNS traffic. As we discussed in Section 3, the increased amount of DNS queries against public DNS services can indicate possible botnet infection. In the analyzed NetFlow data, 9.3% from all DNS queries were targeted to the public DNS services. There were no signs that these queries belong to the infected hosts. The overview of DNS queries against the public DNS services is illustrated on Figure 1. Figure 1: DNS queries to public DNS services. The start time of DNS queries can reveal also botnet presence in the monitored network (see Section 3). Therefore we performed the analysis of 5 minutes windows and estimated the number of queries performed in each time window. Again, there were no remarkable events. The amount of DNS queries (i.e., the amount of DNS flows) is illustrated at Figure 2. In the case of massive network infection by the botnet, there will be remarkable DNS query events, but in ordinary traffic, we are not able to use this method to detect botnets using NetFlow data only. 7
8 Figure 2: Amount of DNS queries during one week period. 5 Conclusion In this internal deliverable, we focused on the possibility to use DNS flow traffic for purposes of botnet detection. In the first part of deliverable, we provided the description of the botnet generated traffic, we introduced existing methods for botnet detection using DNS traffic and we mentioned the set of features used for malicious traffic detection. The following part discussed the flow data itself, which have very limited amount of information about DNS queries compared to the full packet payload. The analysis of one week traffic from real network demonstrated the lack of crucial information contained inside the NetFlow data. One feature, which we are able to monitor with current NetFlow data, is the amount of DNS queries generated from local network against public DNS servers. The aberrant amount of DNS queries against these DNS servers may indicate possible infection of local host by malware or botnet. To conclude, we have to state that using NetFlow data solely, for the purposes of botnet detection, is not possible. There are several ways how to solve this problem. The most promising approach is to extract the important information from packet payload (queried domain names, their TTLs, IP addresses, etc.), use newer IPFIX export format and add the extracted information to each exported flow. In such situation, we are able to use existing botnet detection methods analyzing DNS traffic with advantage. 6 References [1] Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi. A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. Applications and the Internet Workshops, SAINT Workshops International Symposium on, s 82, jan [2] Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi. EXPO- SURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS,
9 [3] Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim. Botnet Detection by Monitoring Group Activities in DNS Traffic. Computer and Information Technology, CIT th IEEE International Conference on, s , oct [4] B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational), October URL [5] B. Claise. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC 5101 (Proposed Standard), January URL [6] David Dagon. Botnet Detection and Response The Network is the Infection. OARC Workshop 2005, 25, URL [7] David Dagon, Cliff Changchun Zou, Wenke Lee. Modeling Botnet Propagation Using Time Zones. NDSS, [8] Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling. Measuring and Detecting Fast-Flux Service Networks. NDSS, [9] J. Kristoff. Botnets. NANOG 32, [10] Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran Ramadass. Detecting Botnet Activities Based on Abnormal DNS traffic. CoRR, abs/ , [11] Namestnikov, Y. The economics of Botnets, URL [12] Anirudh Ramachandran, Nick Feamster, David Dagon. Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2, s. 8 8, Berkeley, CA, USA, USENIX Association. URL [13] Anna Sperotto, Gregor Schaffrath, Ramin Sadre, Cristian Morariu, Aiko Pras, Burkhard Stiller. An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys & Tutorials, 12(3): , URL [14] Hao Tu, Zhi-tang Li, Bin Liu. Detecting Botnets by Analyzing DNS Traffic. In Christopher Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, editors, Intelligence and Security Informatics, volume 4430 of Lecture Notes in Computer Science, s Springer Berlin / Heidelberg, ISBN [15] Wikipedia. Domain name system wikipedia, the free encyclopedia, URL Name System. 9
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Detecting Spam at the Network Level
Detecting Spam at the Network Level Anna Sperotto, Gert Vliek, Ramin Sadre, and Aiko Pras University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Detection of DNS Traffic Anomalies in Large Networks
Detection of DNS Traffic Anomalies in Large Networks Milan Čermák, Pavel Čeleda and Jan Vykopal Institute of Computer Science, Masaryk University, Brno Czech Republic, {cermak celeda vykopal}@ics.muni.cz
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
BOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Preetham Mohan Pawar (1000919136)
Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE Introduction. Basic concepts.( DNS ) Mobile
Selected Topics of IT Security (41.4456) Seminar description
Selected Topics of IT Security (41.4456) Seminar description Sebastian Abt, Frank Breitinger April 3, 2012 1 Introduction The lecture and accompanying seminar target at master-level students interested
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Detecting spam machines, a Netflow-data based approach
Detecting spam machines, a Netflow-data based approach Gert Vliek February 24, 2009 Chair for Design and Analysis of Communication Systems (DACS) Faculty of Electrical Engineering, Mathematics and Computer
2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1
ASE 2014 ISBN: 978-1-62561-000-3 1 Network Traffic Analysis of ZeroAccess Bot Shree Garg, Anil K. Sarje, Sateesh K. Peddoju Department of Computer Science & Engineering Indian Institute of Technology Roorkee,
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1
C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
New Trends in FastFlux Networks
New Trends in FastFlux Networks Wei Xu 408-753-4135 [email protected] Huagang Xie 408-753-4109 [email protected] Xinran Wang 408-753-4108 [email protected] ABSTRACT Fast-flux
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
Protecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham
PRACTICAL EXPERIENCES OF BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR ` Mark Graham OUTLINE RESEARCH PROBLEM: Botnet detection in Cloud Providers FLOW: IPFIX and NetFlow CONCEPTUAL FRAMEWORK: Build
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
A Review on IRC Botnet Detection and Defence
A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Detecting Hidden Anomalies in DNS Communication
Detecting Hidden Anomalies in DNS Communication Ondrej Mikle, Karel Slaný, Ján Veselý, Tomáš Janoušek and Ondřej Surý CZ.NIC Americka 23, 2 Prague, Czech Republic [email protected], [email protected],
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Access Control Rules: URL Filtering
The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations
Practical Experience with IPFIX Flow Collectors
Practical Experience with IPFIX Flow Collectors Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Abstract As the number of Internet applications grows, the number
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
Peer-to-Peer Botnet Detection Using NetFlow Master Thesis
Peer-to-Peer Botnet Detection Using NetFlow Master Thesis Connor Dillon System and Network Engineering University of Amsterdam July 11, 2014. Abstract.. Traditional botnets use a centralized communications
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
Botnet Detection with DNS Monitoring
Botnet Detection with DNS Monitoring Christopher Will Advisor: Oliver Gasser Seminar Future Internet SS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
NetFlow Analysis with MapReduce
NetFlow Analysis with MapReduce Wonchul Kang, Yeonhee Lee, Youngseok Lee Chungnam National University {teshi85, yhlee06, lee}@cnu.ac.kr 2010.04.24(Sat) based on "An Internet Traffic Analysis Method with
Next-Generation DNS Monitoring Tools
Next-Generation DNS Monitoring Tools Cyber Security Division 2012 Principal Investigators Meeting October 9, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected] 404-808-5172
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01 Tianfu Fu [email protected] Dacheng Zhang [email protected] Liang Xia (Frank) [email protected] Min Li
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
