Statistical analysis of Snort alarms for a medium-sized network
|
|
|
- Dwayne Booth
- 9 years ago
- Views:
Transcription
1 Statistical analysis of Snort alarms for a medium-sized network Kitti Chantawut [[email protected]], Bogdan Ghita [[email protected]] Centre for Security, Communications, and Network Research University of Plymouth, UK Abstract Statistical analysis of network intrusions has been an active topic for researches for many years. However, due to the complexity and security concerns associated with the Internet, this area of research remains challenging, from the monitored networks and methodology used to the focus of the analysis and presentation of the results. This paper aims to provide additional insight into this area by analysing a set of IDS alarms collected over a period of three months from the external interface of the edge router at the University of Plymouth. The motivation of this study is to quantitatively classify and understand the nature of current Internet threats, as observed at a medium stub network, leading to long-term analysis of trends and recurring patterns of attacks. In the study, fundamental features of intrusions activities are investigated through a number of characteristics, from the daily volume of intrusion attempts to the source/destination of the intrusion attempts as well as the specific attack type. The results of the study show high levels and wide variety of intrusion attempts. It also shows that the attacks reflect daily timescales and the on/off patterns exhibit recurrence of correlated behaviours. Furthermore, the Slammer worm appears to feature on the Internet long after its original release. Deeper investigation reveals that the sources of attacks spread uniformly, apart from a large proportion of intrusions generated by a small number of IP addresses located in China. Keywords Trend analysis, Intrusion detection system, Snort, Slammer 1. Introduction Prevention is universally recognized as the best strategy to protect critical information infrastructure from malicious attacks. As part of their duties, security staff and network administrators must understand the trend of the threats in order to be able to prevent any significant damage to their networks. Understanding the trend of the attacks would help organisations to determine the current fitness of their security systems and the budget for improving the system to defense against cyber attacks due to the uncertainty of the occurrence of the attacks. Currently there are a number of tools that can be use to analyse intrusion data, such as BASE (Basic Analysis of Security Engine) or SnortSnarf. These tools provide querying and presenting the intrusion analysis in easy to use graphical mode, but they offer only a basic set of analytic options to users. For instance, they do not provide the support to perform in depth statistical analysis from geolocation mapping the source of attacks to forecasting the attack trends in the future. The aim of this study is specifically to conduct such analysis on the set of collected alarms. The methodology used included an online alarm collection stage, where snort was run on the monitoring machine, followed by offline analysis of the alarms to gain an understanding of the behaviour of the threats. The analysis included statistical profiling of the alarms, such as the source countries, number of attacks per unique IP, the distribution of attack on the targets, and profiling the nature of some of the threats using normal statistic and time series analysis theory. 2. IDS and alarm profiling 2.1. Network based Intrusion Detection System (NIDS) NIDS monitors the traffic in specific network segment or subnet. NIDS looks for anomalies in the traffic, such as port scanning or denial of service attacks. In order for NIDS to be effective, it has to be located where it can monitor the most traffic that an organization deems critical. Therefore, placement is critical to the success of uncovering of anomalous traffic or behaviour in the monitored area. There are, typically, two types of detection mechanisms using by NIDS which are signatures (or rules) based detection and anomaly based detection. In signature based detection, the NIDS look in bytes codes and expressions to match any known attacks expressions (signatures or rules). When it matches any intrusion, flags an alarm. Signature based detection is useful for detect known threats but it cannot detect new unknown threats or even the variants of already defined attacks. In anomaly based detection the NIDS first establishes a normal activity model (a baseline) after training the system for specific period of time. Then the NIDS will use the baseline model to detect suspicious events that deviate from normal activity model. If an anomaly is detected, the will flag alerts for an intrusion. The benefit of anomaly detection is that it
2 can detect unknown threats without having to understand the cause of the threats. The main problem for this approach is that it is prone to false alarms Time Series Analysis In general, the analysis of a time series will be based on the fact that observations close together in time will be more closely related than observations further apart and values in a series for a given time will be expressed as deriving in some way from past values, rather than from future values Stationary Time Series In stationary time series, the random variables fluctuate about a fixed mean level, with constant variance over the observational period. This property is a requirement for time series analysis because there must be a sort of regularity exists in the time series so that the behaviour of the time series can be predicted. Various levels of stationarity exist; however, in a context of univariate time series, the time series must satisfy the assumption of weakly stationary, that the mean is a constant, independent of any time shift Autocorrelation (ACF) ACF is a statistical measure that captures the correlation between different time shift samples (or lag) of the process. (NIST/SEMATECH, 2006) has summarised the main purposes of ACF into two points. The first purpose is to detect the non-randomness in time series and the other is to identify an appropriate time series model if the data are not random Long Range Dependency (LRD) and Self Similarity (SS) A stationary process is said to exhibit Long Range Dependency if it has a high degree of correlation between distantly separated data points, even across large time shifts. Whereas in short range dependence processes, the correlation between values at different times decreases rapidly as the time difference (lag) increases. Self Similarity is a property of an object whose appearance remains unchanged regardless of scale of which it is viewed. Self similarity detected in the intrusion data could explain certain characteristics and behaviours of a specific intrusion attempt. It is also useful to note that some self-similar processes may exhibit LRD, but not all processes have LRD are self-similar. The degree of SS and LRD can be estimated by the calculation of the Hurst parameter H. For a self-similar process with LRD, the value of H will be in the range of 0.5 < H < 1. As H 1, the degree of both self-similar and LRD increases. Any pure random processes would have H = 0.5. The rescale adjusted range statistics (R/S) method can be used to evaluate H. R/S states that, for a self similar data set, the rescaled range or R/S statistic grows in proportion to a power law with exponent H as a function of and the time-aggregation block size (m). As a result, a log-log plot of R/S against m has a gradient equal to the estimate value of H Related Studies The trend analysis of network attacks is an important subject in IDS. A number of studies focused on the field of statistical analysis of Internet intrusion trends. Many of the studies are based on packet level investigation of intrusion logs generated by either firewalls or IDS. On worldwide scale, a number of well known projects were set up to collect large scale attack data from firewalls and intrusion detection logs. Two of the most recognised such initiatives are the SANS Internet Strom Center and Symantec s Deep Sight system. On the research side, (Moore, 2004) provides the analysis that gives a better understanding of the nature and the long term trend and recurring patterns of the denial-of-service (DoS) attacks on the Internet. The study concludes that DoS attacks are a common threat for those depending on the Internet. Similarly, (Yegneswaran, 2003) investigates fundamental features of intrusions activities by evaluating the log data along a number of dimensions such as the daily volume of intrusion attempts, the source and destination of the intrusion attempts, and specific types of intrusion attempts. On the trend identification area, the studies of (Jouni, 2009; Kim, 2007; Wu, 2005) focus on finding best-fit forecasting model for anomaly detection analysis, more specifically representing the dynamics of intrusion and attack activities including the comparison of the model accuracy. 3. Examining Snort Alarms 3.1. Data Collection The data for this study was collected from the Internet gateway of the University of Plymouth network. The collection used a SPAN port of a core switch; the mirrored port was located in front of the university firewall, allowing traffic capture prior to filtering. This ensured that the overall behaviour of Internet attacks on internal network can be studied; the purpose of the study was not to test the efficiency of the university firewall, but to observe the amounts, structure, and evolution in time of the alarms.
3 Capturing network traffic on high speed network requires very large storage. Therefore, in order to overcome this problem, Snort, running in packet logger mode, was used to capture the network traffic. The filter was set to capture only the traffic destined to the internal subnet of the University of Plymouth (UoP) network. This limited somehow the scope of the analysis, not allowing observation of packet exchanges following the attack, nor any possible attacks mounted by hosts within the university network. The traffic traces were collected in 2009, between 24th of April and 28 th of July. Due to user privacy and network security concerns, the destination IP addresses of traces (the IP addresses within the university) were anonymised using a prefix-preserving technique prior to the analysis, so that the traces would still contain the structure and distribution of local IP addresses. The anonymisation tool used (AAPI) and the associated procedure can be found in (Koukis, 2006; Foukarakis, 2007). Then the next step was the analysis the anonymised traces. For this study, Snort (version and VRT Certified Rules released on 21/07/09) was run in off-line mode to extract the detailed alerts in the captured traffic traces using signature based detection method. As the large amount of traffic traces were analysed, the unified alert record format was set as the output in the snort.conf because of the small size and the completeness of details contained in the output. Subsequent to successfully creating the complete unified alerts, Barnyard was used to convert all the unified alert files generated by snort into a single output file in csv format Distribution of Alerts A total of 71 types of alerts were detected, distinguished by unique Snort s signature ID (SID), detected by Snort which produced a total of alerts. Only 3 types of alerts, which are triggered by Snort Signature IDs (SID) 2003, 2004, 2050 represent almost 95% of all the attacks. All the three alerts are triggered by the MS-SQL (Slammer) worm attacks; the 2003 and 2004 SIDs have the same trigger (only differ by the review code), while 2050 differs slightly but appears to register the same packets. Name/SID Number of events Slammer (2003) ICMP NMAP(469) ICMP L3(466) ICMP CyberKit(483) MS-SQL probe (2329) Double decoding (2) Experimental TCP (58) IIS Unicode/FTP encrypt (7) SNMP trap (1419) ICPMP fragment (255) ICMP redirect (472) TCP offset<5 (46) Truncate TCP options (55) TCP port 0(524) Other* (55 alarms) Total* (filtered) Table 1 - Distribution of alerts in the dataset Table 1 lists the main contributors to the dataset. The Total and Other entries in the table do not include the 2004 and 2050 SIDs which were matching very closely the figure for the 2003 SID. After removing the duplication, by removing the 2004 and 2050 SIDs, the total number of alarms went down to , of which (86.9% of the alarms) were due to Slammer. The next type of alarm to dominate the dataset is the class of ICMP scanning attacks: ICMP NMAP PING (SID469), ICMP L3retriver (SID466) and ICMP PING CyberKit (SID463). Based on these preliminary statistics, the trend analysis focused on Slammer (SID2003) and ICMP scanning (SID469) scanning, given their contribution to the dataset Analysis of Slammer The analysis of Slammer attacks showed that the attacks came from 125 countries. While the geographical distribution appeared to be uniform, almost 95% of the alarms were from five countries: China (88.6%), Korea (1.8%), United States (1.6%), Romania (1.5%) and Mexico (0.8%). Interestingly, there was no significant correlation between the ranking of the total number of alarms and the number of source hosts, as it is shown in Table 2, but China remains the highest contributor, with hosts out of a total of attackers.
4 Cummulative % Alerts per source IP address Source Country Slammer alerts (%) Number of Hosts China Korea United States Romania Mexico Table 2 - Distribution of Slammer alerts and number of sources The 50 millions Slammer attacks were created by a total of unique IP addresses. The cumulative distribution function (CDF) plot of the number of attacks during the observation period per unique IP is shown in Figure % % 80.00% 60.00% 40.00% 20.00% 0.00% Number of Attacks Figure 1 - CDF plot of the Number of Attacks per IP of Slammer As shown by the CDF, most of the hosts (90%, equivalent to approximately hosts) sent out attacks less than 50 times, 232 hosts sent out the attacks more than times, 66 hosts sent out attacks more than times and a number of 12 hosts (all of them from China) created each more than alerts The Targets In order to determine whether any specific hosts were targeted by the Slammer attacks, statistical analysis was applied to the number of alarms per IP address. The target systems consisted of IP addresses which covered the whole class B of the University of Plymouth s allocated space. One of the typical characteristics of the Slammer worms is that, once the host is infected, the worm will generate random IP addresses and send itself to the random targets. This means that the Slammer worms had been broadcasted all over the IP range with no specific target. Hence, the expected amount of number of attacks on each target IP would be random. To confirm the above statement, the histogram and the probability density function plot (PDF) of the number of attacks per target IP address will be examined to verify the randomness in the numbers. From the dataset, the mean is equal to and the standard deviation is The following figures show the histogram of the number of attacks per IP and PDF plots of the number of attacks compare with the normal distribution plot using the mean and standard deviation of the samples. As it can be seen, most of the targets experienced approximately 760 attacks, with a small number of targets experiencing smaller or higher number of attacks. The PDF plot of the number of attacks is bell-shaped with a peak at the centre of the curve. Comparing this PDF plot against the normal distribution curve with the same mean and standard deviation, it can be seen that the PDF of the dataset is almost perfectly fitted to the normal curve. Therefore, it can be concluded that the Slammer attacks on targets were truly random and automated processes.
5 Pattern of attacks Figure 2 - Histogram and PDF Plots of Number of Attacks Aside from the total figures, the analysis also investigated the pattern of attack from high contributing countries belonging to different time zones on the university s network. The aim of this analysis was is to determine whether attacks from the same geographical area exhibit different periodicity patterns, determined by the local time of the source hosts. Figure 3 - Numbers of attacks against Hours of a day from China and the USA Data of the hosts from two different countries (US and China)/continents were analysed. The number of attacks from China and the number of attacks from the USA on two consecutive days (25/05/09 and 26/05/09) were extracted from the log file and plotted on hourly basis as shown in Figure 3.The hourly plot exhibits pattern in every 24 hours. The plots of the USA data show less clear trend of periodic pattern due to the small number of attacks per hour. However, they both still show a periodic pattern with peaks at about 9 am to 10 am and 4 pm until midnight and a dip between 10 am to 4 pm, whereas, the plots from Chinese IP addresses data clearly show peaks during midnight to 10 am and low from 10 am until 4:30 pm. As mentioned earlier, Slammer infected hosts would broadcasting the code automatically as fast as they can at all time using single UDP packets as the mean of transport. Therefore, the worm is able to broadcast scans without requiring responses from the potential targets. From the aggressive nature of the UDP transport mechanism, the propagation of the worm would interfere with its own growth because there is no congestion control built in the protocol. As a result, each of the infected hosts must compete with each other for limited Internet access bandwidth. Hence, these competitions for available bandwidth may contribute to the diminishing of the entire growth rate of Slammer, issue also identified in (Moore, 2003).The apparent reduction of the number of attacks detected during office hours might also have been caused by the local Internet traffic congestion as well as packet sniffer (the sensor) missing dropping some of the traffic. Unfortunately, no statistics were collected regarding the performance of snort or the number of dropped packets (anywhere between the mirrored port on the core switch and the TCP/IP stack on the monitoring host) throughout the collection period. It is acknowledged that, in order to obtain more precise view of the attack pattern, a network tap could be implemented to connect the sensor at the network gateway instead of connecting the sensor to the mirrored port.
6 Number of Alerts Number of Alerts Time Series Analysis Time series is a sequence of data where the same measurement is taken at regular time intervals. The series can be analysed using various methods, such as autocorrelation function (ACF) analysis, time series modelling and forecasting. There are two main goals of time series analysis. Firstly, it used is to identify relationship of values between different points in time and formalise (model) the dynamic behaviour observed in time series data. Secondly, once the time series model has been derived, the model is used to predict the future events of the time series based on the idea that the past behaviour has some correlation (relationship) with the future behaviour and can be used to estimate (or predict) the future values of the time series. This is known as time series forecasting. The time series used for this analysis is the measurement of the aggregate number of Slammer attacks (SID2003) on the university s network sampling at regular interval of 1 hour. Time Series Plot of SID Time (hour) Figure 4 -Time Series of Slammer attack Time Series Plot of SID Time (hour) Figure 4 shows a time series of number of Slammer that occurred per hour during observation period. With the first glance on the time series plot, it could be noticed that the time series is not stationary as its means and variance are not constant over time. The sample s Auto-Correlation Function (ACF) and Partial Auto-Correlation (PACF) plots of the time series are investigated to confirm the non-stationary property of the time series as shown in Figure 5.
7 PACF ACF Series: data LAG LAG Figure 5 - ACF and PACF of Slammer It can be seen that the ACF plot shows repetitive patterns at lag 24, 48, etc. with relatively slow decay of its peaks. This confirms the findings above, showing strong correlation and nonstationary character of the time series (seen in the slow decaying of the ACF and the pattern repeating itself every 24 lags/hours) Self Similarity (SS) and Long Range Dependency (LRD) Slow decaying of variance (hence, autocorrelation) is a property of a self similarity process. From Figure 5, it can be seen that the ACF plot of Slammer time series shows very slow decay of autocorrelation. This is why this time series is needed be tested to see if there is any sign of any self similarity (SS) with long range dependence (LRD). The R/S method was applied to the dataset to estimate the value of H. Figure 6 shows the plot generated by the R/S method. The R/S method gives the estimation of H , which indicates strong degree of SS and LRD in the time series Analysis of ICMP NMAP PING Figure 6 -R/S plot of Slammer The list of target systems included a total of IP addresses; this is very close to the whole class B (65535 IP addresses) allocated to the University of Plymouth. This is a good indication that the targeting was indiscriminative, given that the network includes a significantly lower number of hosts/allocated IP addresses. And, indeed, as it is revealed by CDF in Figure 7, the hosts that were attacked 20 times or less during the observation period represent more than 99% of the total number of targeted hosts (approximately hosts). Further investigation shows that there were only 12 hosts heavily targeted by ICMP NMAP PING almost every day, accounting for 95% of all attacks. Each of these 12 targets was attacked 4000 times per day or more. Given that the IP addresses from the trace were anonymised, the 12 hosts cannot be identified, but they are likely to be servers rather than workstations. The rest of the targets (up to hosts) received just overt 250k alarms during the observation period.
8 Cummulative % % % 80.00% 60.00% 40.00% 20.00% 0.00% Number of Attacks Figure 7 - CDF plot of the Number of Attacks per Target IP Unlike Slammer, the ICMP attacks came mostly from the US. Although there were a number of contributors with higher numbers of attacks, the distribution was not dominated by any subset of hosts. As for Slammer, the R/S method was used to determine the self similarity and long range dependency within the ICMP attacks. The method produced an estimation of H , indicating a strong degree of self similarity. Figure 8 - R/S plot of ICMP NMAP PING 4. Comparison of the results to previous studies The analysis shows the similar finding as the two prior studies (Moore, 2004; Yegneswaran, 2003) in the way that DoS activities are numerous, a very small collection of sources are responsible for a significant fraction of intrusion attempts and there is a little sign of reduction of such intrusion attempts. This could mean that the behaviour of intrusion attempts on the Internet, especially DoS attacks, has not been changed very much since the earlier studies of the attacks and the situation tends to be going on as common threats on the Internet for very long period of time. 5. Conclusion The analysis showed that the majority of the alarms in the dataset were due to Slammer. The Slammer attacks were governed by small clusters of hosts each automatically and constantly broadcasting a substantial amount of traffic, therefore the number of attacks did not correlate with the number of the attacking hosts. Additionally, it was found that the periodic pattern of attacks in every 24 hour might cause by the competition for Internet bandwidth among the Slammer sources and the overloading of the mirrored port during peak hours may have also contributed to the results. There was no specific target of the attacks as the number of attacks on each unique IP was normally distributed all over class B of the University of Plymouth s allocated space. The analysis of the time series of number of the attacks per hour showed that the time series was nonstationary, however, strong degree of correlation and periodicity could be spotted from the ACF plot which was supported by further analysis on Self Similarity (SS) and Long Range Dependence (LRD) through the high estimated value of the associated Hurst parameter. 6. References HIDESHIMA, Y. and KOIKE, H. (2006). STARMINE : A Visualization System for Cyber Attacks. In Proc. Asia Pacific Symposium on Information Visualisation (APVIS2006), Tokyo, Japan. CRPIT, 60. MISUE, K., SUGIYAMA, K. and TANAKA, J., Eds. ACS
9 JOUNI, V., HERV, D., LUDOVIC, M., ANSSI, L. & MIKA, T. (2009) Processing intrusion detection alert aggregates with time series modeling. Information Fusion, 10, KIM, D., LEE, T., JUNG, D., IN, P. H., LEE, H. J. (2007) Cyber Threat Trend Analysis Model Using HMM. Information Assurance and Security, International Symposium on, The Third International Symposium on Information Assurance and Security. KOUKIS, D., ET AL., (2006) A Generic Anonymyzation Framework for Network Traffic. Communications, ICC '06., 5, NIST/SEMATECH (2006) e-handbook of Statistical Methods. The National Institute of Standards and Technology (NIST), (Accessed on 30/06/09). WU, Q., SHAO, Z (2005) Network Anomaly Detection Using Time Series Analysis. Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services. IEEE Computer Society. YEGNESWARAN, V., BARFORD, P., ULLRICH, J. (2003) Internet intrusions: global characteristics and prevalence. Proceedings of the 2003 ACM SIGMETRICS international Conference on Measurement and Modeling of Computer Systems. San Diego, CA, USA, ACM.
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic John Week University of Nevada, Reno United States Email:[email protected] Phone: (775) 741-1555 Polina Ivanova University of Nevada,
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Intrusion Detection Systems with Correlation Capabilities
Intrusion Detection Systems with Correlation Capabilities Daniel Johansson [email protected] Pär Andersson [email protected] Abstract Alert correlation in network intrusion detection systems
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro Instituto Superior Técnico, Universidade Técnica de Lisboa, Lisboa,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Intrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
Intrusion Detection Systems. Darren R. Davis Student Computing Labs
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010
December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Traffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Monitor Network Activity
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
CaptIO Policy-Based Security Device
The Leader in Denial of Service Prevention CaptIO Policy-Based Security Device The CaptIO Policy-Based Security Device automatically detects, identifies, validates, and stops Denial of Service attacks
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
