Network Traffic Anomalies Detection and Identification with Flow Monitoring
|
|
|
- Ira Neal
- 10 years ago
- Views:
Transcription
1 Network Traffic Anomalies Detection and Identification with Flow Monitoring Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi Department of Computer Engineering, Chonnam National University, Korea Abstract-Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. Researchers are still struggling to find an effective and lightweight method for anomaly detection purpose. In this paper, we propose a simple, robust method that detects network anomalous traffic data based on flow monitoring. Our method works based on monitoring the four predefined metrics that capture the flow statistics of the network. In order to prove the power of the new method, we did build an application that detects network anomalies using our method. And the result of the experiments proves that by using the four simple metrics from the flow data, we do not only effectively detect but can also identify the network traffic anomalies. I. INTRODUCTION Internet traffic measurement is essential for monitoring trends, network planning and anomaly traffic detection. In general, simple packet- or byte-counting methods with SNMP have been widely used for easy and useful network administration. In addition, the passive traffic measurement approach that collects and analyzes packets at routers or dedicated machines is also popular. However, traffic measurement will be more difficult in the next-generation Internet with the features of high-speed links or new protocols such as IPv6 or MIPv6. Traffic measurement at high speed links is challenging because of fast packet-processing requirement. Though packetlevel measurement can describe the detailed traffic characteristics, it is not easy to support high-speed line rates of multi-gigabit per second. Moreover, standalone systems for packet-level traffic monitoring will be expensive for the wide deployment and easy management in a large-scale network. Hence, ISPs or big ASes will generally prefer the flow-level traffic measurement approach that could be easily embedded into routers or switches to dedicated packet-level traffic monitoring systems. Currently, flow-level measurement modules at routers such as Cisco NetFlow [1] have become popular, because flow-level measurement could generate useful traffic statistics with a significantly small amount of measured data. While monitoring the traffic and detecting anomalous activities is important, it is equally important to keep the rate of false alarms low. A high false alarm means that the genuine events will be lost in the snow of false events. Suppose that we apply one s statistical anomaly detection method on large networks (with thousands of switches and routers involved and millions of users), even a very small false alarm rate may result in enough false alarms to overwhelm that network operation staff. In the worst case, false alarms undermine anomaly detection, as operation staff tire of reacting to false alarms, and ignore or turn the system off entirely. Currently, researchers are still struggling for a simple but robust method for anomaly detection, with high detection rate and low false alarm. Although anomaly detection has been addressed in many prior projects, there is the fact that few works have been succeeded in statistically characterized different types of network traffic flow anomalies. Furthermore, most anomaly detection methods are limited to analyzing the entire traffic as one entity, which makes them unable to quantify network anomalies, and their validities are affected when many anomalous activities occur simultaneously. From that we see the need for a method that can effectively detect and classify network anomalies based on flow statistics. In this paper, we analyze traffic flow information to detect abnormal behaviors. Traffic flows are created from all packets captured from a network link. There are many network anomalies, but whenever a network anomaly occurs, traffic behavior will change abruptly. These changes can be inspected by tracking various parameters of traffic flows. Not only monitoring fundamental flow parameters such as flow size, number of packets, which represent major flow features, we also statistically collect certain extended metrics in order to infer the connection trends of flows. These flow metrics are not only used for detecting but also for identifying a number of network anomalies as flows in various anomalies has their distinctive set of flow metric values. Within each metric, we use a standard technique called Holt-Winters [6] to extract the anomaly indicators. Holt-Winters algorithm will constantly monitor each single metric, and maintain a list of historical data for the anomaly detection purpose. Whenever the value of a monitored metric goes outside the range of predicted data, Holt-Winters algorithm will raise an anomaly flag on the metric. The network is then likely to be undergoing anomalous activities; this is the case when the system needs attention from the network operation staff /08/$ IEEE.
2 Experience has shown that, just giving trivial alerts does not turn out to be very helpful for the problem diagnosing. Usually, alerts just give limited amount of clue for the operation staff to identify and react to the problem. And in some cases, a false alarm may cause a huge waste in the effort when network operators try to seek for a problem that does not exist. Our method alleviates the issue. When flags are raised indicating anomalous activities, the network administrator will then use the combination of the flag to identify the type of network anomaly. Giving out the clue for the anomaly will provide great information for network administrators to trace back and perform network forensic. The organization of this paper is as follows: Section 2 provides the overview of the related work. Then, in Section 3, we describe the core of our anomaly detection method, the Holt-Winters algorithm. Section 4 will describe the most popular malicious network traffic attacks and the way to identify each ones, the overall of our technique will be summarized at the end of Section 4. Section 5 describes how to build the flow monitoring system, the flow monitoring application that uses our new method and its experimental results. Finally, the conclusions and future directions will be given in Section 6. II. RELATED WORK As stated above, anomaly detection has been addressed in many prior projects, and previous works have primarily focused on security tasks (detecting DDoS attacks, worms, or other intrusion ). In many cases, providers use very simple techniques for anomaly detection, such as fixed threshold, packet capturing and analyzing for the case of DDoS detection, Cisco and Juniper [2] also embedded in their routers a simple flood attack protection based on threshold technique. For the 3 rd party solutions in network traffic anomaly detection such as D-Ward, Multops they also tried to define thresholds for TCP, UDP and ICMP applications, then an attack or anomalous activities will be detected and given alarm whenever a threshold is exceeded. These methods are quite limited since there is no fixed threshold for different kind of networks. Also these methods call for experienced network operators to define thresholds and constantly monitor and modify them. There has however been some more sophisticated works in the detection and analysis of network anomalies. Instances are [7] [8] [9] [10] [11]. Of these, the most directly relevant to this paper is [11] which tests the use of Holt-Winters forecasting technique for network anomaly detection. In this paper, we also focus on exploiting Holt-Winters algorithm for the anomaly detection purpose, but with a different way. Holt- Winters will be used for monitoring the 4 predefined metrics and the network administrator will identify the anomaly when it happens based on anomaly flags of the metrics. (Of course, we did make some modifications on the original Holt-Winters algorithm in our experimental implementation.) Although the method we use here is very simple, it gives good performance and detecting result. And it s quite open in the mean that other researchers can easily apply our techniques in the combination with theirs to improve their detection schemes. III. HOLT-WINTERS FORECASTING TECHNIQUE Holt-Winters Forecasting is a sophisticated algorithm that builds upon exponential smoothing. Holt-Winters Forecasting rests on the premise that the observed time series can be decomposed into three components: a baseline, a linear trend, and a seasonal effect. The algorithm presumes each of these components evolves over time and this is accomplished by applying exponential smoothing to incrementally update the components. The prediction is the sum of the three components: y t+1 = a t + b t + c t+1-m. (1) The update formulas for the three components, or coefficients a, b, c are: Baseline ( intercept ): a t = α ( y t + c t-m ) + ( 1 α )( a t-1 + b t-1 ). (2) Linear Trend ( slope ): b t = β ( a t a t-1 ) + ( 1 β ) b t-1. (3) Seasonal Trend: c t = γ ( y t a t ) + ( 1 γ ) c t-m. (4) As in exponential smoothing, the updated coefficient is an average of the prediction and an estimate obtained solely from the observed value y t, with fractions determined by a model parameter (α, β, γ). Recall m is the period of the seasonal cycle; so the seasonal coefficient at time t references the last computed coefficient for the same time point in the seasonal cycle. The new estimate of the baseline is the observed value adjusted by the best available estimate of the seasonal coefficient (c t-m ). As the updated baseline needs to account for change due to the linear trend, the predicted slope is added to the baseline coefficient. The new estimate of the slope is simply the difference between the old and the new baseline (as the time interval between observations is fixed, it is not relevant). The new estimate of the seasonal component is the difference between the observed value and the corresponding baseline. α, β and γ are the adaptation parameters of the algorithm and 0 < α, β, γ < 1. Larger values mean the algorithm adapts faster and predictions reflect recent observations in the time series; smaller values means the algorithm adapts slower, placing more weight on the past history of the time series. These values should be optimized when the algorithm is implemented. IV. NETWORK TRAFFIC ANOMALIES Within the scope of this paper, we address a set of networkcentric anomalies which exhibit abnormal changes in network traffic. Other kinds of application-related attacks such as buffer overflow, guess password are not included in the
3 proposed method because their malicious purposes are carried within the payload of the packets. A. UDP flood A UDP flood attack is a kind of DoS attack. An attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As the result, the distant host will check for the application listening on this port. After seeing that no application listens on the port, the host will reply with an ICMP Destination Unreachable packet. Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to unreachable by other clients. If enough UDP packets are delivered to the ports on the victim, the system will go down. When a network undergoes a UDP flood attack, it is expected from the perspective view of flow that there will be a tremendous amount of UDP datagrams from one or many outside sources to a specific destination on the network. In order to detect and identify this type of attack, we need to work with the flow size and packet count of the flows. Flows of UDP flood contain many large-sized packets with the intention to overwhelm the destination. Therefore, they will likely to have large values of these two metrics. We then hereby define the first two metrics: TotalBytes: total volume of flows in bytes. TotalPackets: total packets in flows. The monitoring process over the first two metrics may plot a noticeable increase of the metrics when network under attack. B. ICMP flood ICMP flood or ping flood is a simple attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets with different sizes. This method is an upgrade from its predecessor, the Ping-of-Death attack. PoD tries to send an over-sized ping packet to the destination with the hope to bring down the destination system due to the system s lack of ability to handle huge ping packets. Ping flood brings the attack to a new level by simply flood the victim with huge ping traffic. The attacker hopes that the victim will too busy responding to the ICMP Echo Reply packets, thus consuming outgoing bandwidth as well as incoming server bandwidth. Similar to UDP flood, ICMP attack also generate a huge amount of data towards the destination. So using TotalBytes and TotalPackets is enough to plot this type of attack. Of course, using the same method means that we can t distinguish ICMP from UDP flood since we use the same signature for the two types of attack. This problem can easily be solved by using another metric for monitoring the total number of ICMP or UDP traffic going into the network; then when the attack occurs, we can easily distinguish between the two. In this paper, however, we will treat these two attacks the same way. C. TCP SYN attack This method takes advantage of a flaw in how many hosts implement the TCP three-way handshake. When host B receives the SYN request from host A, it must keep track of the partially opened connections in a listening queue for at least n seconds (e.g.: 75 seconds). Many host implementations can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never reply to the sent back SYN and ACK. By doing so, the destination host s listening queue will be quickly filled up, and it will stop accepting new connections. Due to the characteristic of TCP SYN, the effect of this attack on network traffic is quite different from the two previous attacks. Flows of TCP SYN have small values. The real number of packets differs from each attack implementations, but usually the flows contain less that 3 small size packets. Since the attacker just has to generate a small amount of network traffic in order to bring down a particular host, we can t rely on TotalBytes or TotalPackets to plot this kind of attack; we need to define a new metric that can group together all flows in the attack: DSocket: number of flows with similar volume to the same destination socket (IP and port). D. Portscan A portscan attack is carried out with a port scanner, a piece of software to search a network host for open ports. A port scanner is often used by network administrators to check the security of their networks, and it also used by hackers to compromise the system security. Many exploits rely upon port scans, for example to find open ports and send large quantities of data in an attempt to trigger a condition known as buffer overflow, or to send some specific port data packets with malicious purposes A portscan operation will result a big number of packets sent from a remote host to a destination on the network, but with different destination ports. Flows in portscan are small flows with the size of only several bytes and packet count of 2 or 3. This malicious activity cannot be detected with the three metrics we already have. In order to gather together all flows in a portscan attack for the detection purpose, we need to define another metric that has the capability to aggregate all these flows: DPort: number of flows that have a similar volume, same source and destination address, but to different ports. E. Anomaly detection and identification TABLE I ANOMALY IDENTIFICATION TABLE WITH THE FOUR METRICS Anomaly TotalBytes TotalPackets DSocket DPort Flooding High High Normal Normal TCP SYN Normal Normal High Normal Portscan Normal Normal Normal High Normal Normal Normal Normal Normal Other
4 Bases on the analysis above, we can summarize our method within the flow distribution table for the flow metrics as shown in Table I. In our Holt-Winters implementation, the deviation or the time-series data at the time t, d t, and the normal traffic range are calculated by: And: d ˆ t yt yt (1 ) d. (5) t m y d. (6) ˆt t m If y t is above or below the range above, then the traffic is HIGH or LOW, respectively. Whenever a LOW traffic anomaly occurs, is most likely to be network device outages. That type of anomalies is not the main addressing point in our research; therefore we will focus on the HIGH traffic anomaly. Based on the anomaly flags raised by the Holt-Winters algorithm, the network administrator can spot the anomaly and quickly identify it. Our proposed method has some advantages over the others. Our method give anomaly detection based on the combination of different flow metrics. The distribution table of our method is simple, despite its good performance. Whenever an anomaly is detected, the combination of the flags gives us the idea about what is happening in the network. Experience has shown that this information is at great value to network operators to perform trace back and problem forensic. Besides, we do not treat the network traffic as one entity. The detection scheme is based on the four metrics. Therefore, we can still distinguish many types of anomalies when they occur simultaneously (e.g.: if network under both TCP SYN and Portscan attack, DSocket and DPort will both raise the alarm). V. EXPERIMENTS A. Flow data collecting In order to conduct the experiment of our research, we first start with defining the data structure to be gathered. The data have to be simple, but contains enough information for the Fig. 2. IPFIX template with the highlighted fields involved in the monitoring metrics Fig. 3. The experimental environment for measurement of flow parameters. calculation of the four flow metrics. There are many flow data structures that can be used to acquire the objective above, examples are sflow, nflow, NetFlow v5, v9 [1], IPFIX [3]. Cisco NetFlow v5 is the most commonly used data structure for flow-level monitoring in current IPv4 networks. However, NetFlow v5 has a fixed key structure and is not capable of monitoring various kinds of new network protocols and IPv6 traffic [13]. To tackle the drawback of NetFlow v5, IPFIX is equipped with the flexible and extensible template architecture, and it uses reliable SCTP/TCP as the default transport protocol. Therefore in our research, we will collect the data in IPFIX format with the IPFIX template depicted in Fig. 2. However, there is one problem working with IPFIX. Since IPFIX is a new standard and not yet available in all network devices; our router, unfortunately, is incapable of collecting flow data in IPFIX format. To fix the problem, we use a modified version of JNCA [4] to collect flows in NetFlow v9 format at the flow collector, and then we convert the relevant fields into IPFIX and insert the data into a MySQL database for further analysis. B. Anomaly network testbed An IPFIX network testbed for the experiments is depicted in Fig. 3. We tried to shape the real attack environment. There are two networks: attacking network and destination network. They are connected together by two or more routers. In order to simulate beautiful flow data, we made the victim (or destination of attacks) a web server with common services to provide network traffic including: web browsing, , database access, file transfer All accesses to these services are legitimate traffic. Router R1 is the gateway router of the destination network, it has to be able to export flow data in NetFlow v9/ipfix format. The exported flow data will be sent to the IPFIX collector, which located in the destination network. On the IPFIX collector, we run some essential programs to collect and analyze flow data: JNCA for converting NetFlow v9 to IPFIX format, MySQL database for storing flow data and FlowMon (the application built by us) for monitoring flow data and raising anomaly flags. The malicious data can be carried out by The Hacker Toolkit [5], or many attacking tools such as stream2, synhose, synk7, synend, hping [14] however, the usage of these malicious tools will not be stated in our paper.
5 C. Experimental results VI. CONCLUSION Anomaly TABLE II DETECTION RESULT FOR SIMULATION DATA Inserted / Detected Flooding 28 / 26 Distributed flooding 11 / 10 TCP SYN 13 / 13 Portscan 15 / 15 Other anomalies 0 / 0 At first, we set the testbed network up and running for 2 days without any anomalies to model the normal traffic pattern of the network. Holt-Winters algorithm will constantly monitor and study the normal data. This will provide the baseline values of normal network condition. Then we start to insert the anomalous data for 3 hours with a set of network anomalies including: UDP flood, ICMP flood, TCP SYN and Portscan. Attack data will be destined to the victim. The attack scenario is staged by the tools talked above and each attack will occurs in about 5 minutes. Flow data from attackers will be captured by the router and exported to the exporter for storing and analyzing. The detection results are shown in Table II. In Table II, flooding attacks include both UDP and ICMP flooding. Just as we expected, almost all the inserted attacks are detected by FlowMon right after they occurred. We tested the validity of our method in the scenario of multiple anomalies occur at the same time and with different anomalies combination: UDP + TCP, ICMP + Portscan FlowMon still be able to raise the exact flags according to the anomaly type. In the case of TCP SYN and Portscan, all the small malicious flows that go through the router were plotted by DSocket and DPort, and all these attacks were detected and identified. Our method still works well when we switch the attacking method from 1 source 1 destination (flooding) to multi sources 1 destination (Distributed flooding). However, the validity of our method is affected at the end of our 3 hours experiment. After more than 2 hours of gradually inserting the anomalies, we continuously tried to insert flooding/distributed flooding attacks into the destination network in high density. Here then FlowMon could not detect one of the last attacks. The phenomenon can be explained by examining Holt-Winters algorithm. One of the features of Holt-Winters algorithm is to gradually adapt to the current values of the time series. When anomalies happen constantly, after a certain amount of time, the anomaly data became familiar. Holt-Winters algorithm will adapt itself to the anomaly data, and consider anomaly data normal. To prevent that issue from happening, network operators should quickly react to the anomalies, and have solutions to stop them from occurring for a long time. How to protect the network from anomalies, however, is outside the scope of this paper. So far in our research, we proposed a new method for network traffic anomaly detection with four predefined metrics: TotalBytes, TotalPackets, DSocket, DPort. We also built a network testbed and a program called FlowMon to certify the feasibility of our method. Based on the algorithm and experiment verification, the method has proved its efficiency in anomaly detection. This research was dedicated to deal with network centric anomalies that exhibit abnormal changes in network traffic, and our contribution is a new lightweight method that does not only quickly detect network anomalies, but can also pin point what kind of anomaly it is. The method is simple, but it should be seen as an advantage, as simplicity makes the method scalable, and more easily extendible to include other features, for instance, new metrics for other kinds of network anomaly, or applying wavelet analysis for better anomaly detection rate. That s why the method has great potential to be re-used in further researches. For future direction from this research, we would like improve the detection result by implementing more sophisticated algorithms for monitoring the metrics, such as ARAR algorithm [6] or wavelet analysis technique, then we can choose the best algorithm for each case. Besides, our method is open in the mean that whenever an unknown anomaly occurs, we can grasp its abnormal behavior and flow characteristics for further study. ACKNOWLEDGMENT This research was supported by Korea Telecom Inc. REFERENCES [1] Cisco NetFlow [2] Juniper Networks, Denial of Service and Attack Protection, white paper, Juniper Networks [3] IP Flow Information Export Charter [4] Java NetFlow Collect-Analyzer [5] The Hackers Choice Attack Tool [6] Peter J. Brockwell and Richard A. Davis, Introduction to Time Series and Forecasting, Springer, New York, [7] C. Hood and C. Ji, Proactive network fault detection, IEEE Trans. Reliability, vol. 46, no. 3, pp , [8] M. Thottan and C. Ji, Anomaly detection in IP networks, IEEE Transactions on Signal Processing, Aug [9] H. Hajji, Baselining Network Traffic and Online Faults Detection, IEEE International Conference on Communications May [10] V.A. Siris and F. Papagalou, Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, IEEE Global Telecommunications Conference, Dec GLOBECOM '04. [11] J. D. Brutag, Aberrant Behavior Detection in Time Series for Network Monitoring, LISA 2000 (New Orleans, LA), USENIX, December [12] K. Goto and K. Kojima, Network Intrusion and Failure Detection System with Statistical Analyses of Packet Headers, Proc. of ISCEng 05, May [13] N. Choi and H. Son, Experiences with IPFIX-based Traffic Measurement for IPv6 Networks, Proc. of ACM IPv6 07, Aug
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
The ntop Project: Open Source Network Monitoring
The ntop Project: Open Source Network Monitoring Luca Deri 1 Agenda 1. What can ntop do for me? 2. ntop and network security 3. Integration with commercial protocols 4. Embedding ntop 5. Work in
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
Take the NetFlow Challenge!
TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Announcements. No question session this week
Announcements No question session this week Stretch break DoS attacks In Feb. 2000, Yahoo s router kept crashing - Engineers had problems with it before, but this was worse - Turned out they were being
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
Denial of Service Attack Techniques: Analysis, Implementation and Comparison
Denial of Service Attack Techniques: Analysis, Implementation and Comparison Khaled M. Elleithy Computer Science Department, University of Bridgeport Bridgeport, CT 06604, USA Drazen Blagovic, Wang Cheng,
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Detecting Flooding Attacks Using Power Divergence
Detecting Flooding Attacks Using Power Divergence Jean Tajer IT Security for the Next Generation European Cup, Prague 17-19 February, 2012 PAGE 1 Agenda 1- Introduction 2- K-ary Sktech 3- Detection Threshold
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
