Lightweight Detection of DoS Attacks
|
|
|
- Marian Curtis
- 9 years ago
- Views:
Transcription
1 Lightweight Detection of DoS Attacks Sirikarn Pukkawanna *, Vasaka Visoottiviseth *, Panita Pongpaibool * Department of Computer Science, Mahidol University, Rama 6 Rd., Bangkok 10400, THAILAND g @student.mahidol.ac.th, [email protected] National Electronics and Computer Technology Center (NECTEC) 112 Phahol Yothin Rd., Klong Luang, Pathumthani 12120, THAILAND [email protected] Abstract-Denial of Service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections (falsepositive). This research proposes a lightweight method to identify DoS attacks by analyzing host behaviors. Our method is based on the concept of BLINd Classification or BLINC: no access to packet payload, no knowledge of port numbers, and no additional information other than what current flow collectors provide. Rather than using pre-defined signatures or rules as in typical Intrusion Detection Systems, BLINC maps flows into graphlets of each attack pattern. In this work we create three types of graphlets for the following DoS attack patterns: SYN flood, ICMP flood, and host scan. Results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positive. Keywords Network security, intrusion detection, denial of service, traffic classification. I. INTRODUCTION Denial of Service (DoS) attacks pose a serious threat to the Internet. The main aim of DoS attacks is to disrupt service and network availability by attempting to reduce a legitimate user s bandwidth, or preventing access to service or system. This kind of attacks aims at rendering a network incapable of providing normal service by targeting either the network s bandwidth or its connectivity. These attacks achieve their goal by sending a stream of packets to overload a victim s network or its processing capabilities. Well-known examples of DoS attacks are flooding of TCP SYN packets and ICMP packets. Before launching attacks, attackers use tools such as port scan and host scan to discover services they can break into. To secure networks against DoS attacks, tools such as Intrusion Detection System (IDS) must be deployed. IDS can detect DoS attacks either by matching traffic to signatures of well-known attacks (signature-based IDS), or by recognizing deviations from normal system behaviors (anomaly-based IDS). The drawback of the signature-based IDS is that it cannot detect new attacks. While the anomaly-based IDS can catch new attack patterns, its accuracy is a concern. It may flag a new non-attack activity as intrusion, resulting in a false positive. In general, IDS is notorious for its enormous resource consumption because it requires deep packet inspection and flow state maintenance. In this paper, we propose a lightweight technique to identify DoS attacks without relying on payload inspection, or statistical behavior of overall traffic. Our technique is based on the concept of Blind classification or BLINC [1]. We evaluate our technique on four types of DoS attacks: SYN flood, ICMP flood, port scan, and host scan. Preliminary results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positives. Following this introduction, the paper is organized as follows. Section 2 outlines previous studies in the area of DoS attack detection, namely Intrusion Detection System (IDS) and BLINd classification (BLINC) technique. Section 3 describes in detail our propose DoS detection technique and attack graphlets. Section 4 describes our experiments and results. Section 5 discusses limitations of our proposed method. Finally, conclusion and future work are discussed in Section 6. II. RELATED WORK A. Intrusion Detection System (IDS) An Intrusion Detection System (IDS) [16] is designed to analyze computer and network activities to detect intrusion attempts as they occur. IDSs can detect DoS attacks either by using traffic signatures or by recognizing anomalies in system behaviors. A signature-based IDS uses the signatures of the well-known attacks to determine if the packet represents a suspicious activity. Examples of type of signatures are port numbers and specific strings in packet payload. This concept is similar to anti-virus software on a PC that scans files and memory for known patterns of computer viruses. Anomaly-based IDS will detect abnormal behaviors by monitoring network traffic and comparing it with the baseline behaviors. The baseline will identify what is normal for that network. The baseline activity could be identified by a combination of average packet size, number of packets per second, flows per second, and bytes per second. Then the system can trigger an alert when it finds a significantly deviation from the baseline. A hybrid IDS that uses both technologies is also possible, where both signatures and baseline behaviors are used together either in series or in parallel. A signature-based IDS and an anomaly-based IDS have following tradeoffs. A signature-based model is common in commercial IDSs. A signature-based IDS uses known signatures, so it may not be able to catch new attacks. However, the accuracy is high and the false positive rate is relatively low. On the other hand, an anomaly-based IDS can
2 detect unknown attacks, but it may result in a high false positive rate. That is, it may flag a normal activity as an intrusion. It remains a challenge for current intrusion detection technology to achieve high accuracy and low false alarms [8]. B. BLINC The early detection of applications associated with TCP flows is an essential step for network security and network management. Port-based classification has been used extensively, but it is ineffective for applications whose ports change dynamically. A new trend of traffic classification is based on summarized flow information, such as flow duration, number of packets and packet inter-arrival time [4], [5], [6], [7]. BLINd Classification or BLINC [1] introduces a new approach for traffic classification without knowledge of port numbers, user payload, or summarized flow information. BLINC represents these patterns using graphlets. Graphlets are created by observing behaviors of hosts in three levels the social level, the functional level, and the application level. At the social level, BLINC focuses on the popularity of a host, namely the number of distinct hosts a node communicates with. For example, p2p applications often interact with a large number of other hosts in a short time period. At the functional level, BLINC identifies the role of a host by observing the number of source ports a particular host uses for communication. For example, if a host uses a single source port in majority of its flows, BLINC assumes that this host provides a specific service (e.g., web server). At the application level, BLINC combines knowledge from two previous levels with transport layer interactions between hosts to identify the application of origin. For each application, BLINC creates behavior pattern in a form of graphlets. BLINC classification is the process of matching flow behaviors to a set of pre-defined graphlets. Moreover BLINC uses heuristics to refine final classification and to discriminate complex or similar graphlets. For instance, gaming, malware, and SpamAssassin flows, which have similar flow behaviors, are characterized by a series of packets of constant size. The uniqueness of BLINC is that instead of studying TCP or UDP flows individually, BLINC looks at all flows generated by specific hosts. A key advantage of BLINC is that it can identify unknown applications, such as a new P2P protocol and malicious flows, which emerge as deviations from the expected behaviors. Note that these cases cannot be identified by payload or port-based analysis. III. METHODOLOGY This section describes our technique. Our proposed method for lightweight DoS detection is based on the idea of BLINd classification or BLINC [1]. In this work we focus on classifying four types of DoS attacks, namely SYN flood, ICMP flood, port scan, and host scan. We define three additional graphlets for SYN flood, ICMP flood, and host scan, and use the port scan graphlet defined previously in [1] (Figure 1). We detect each type of attacks by comparing flow behaviors against the graphlets as follows. srcip prot dstip srcport dstport First, SYN flood exploits vulnerability of the TCP threeway handshake [2], [15]. During SYN flood, an attacker sends a lot of TCP SYN packets with a source IP addresse that does not exist or is not in use. The attacker also uses many random source ports to connect to a single destination port of a victim. Since the number of requests is large, the system will run out of resources and starts dropping normal connection requests. This results in a graphlet with multiple source ports shown in Figure 1(a). Secondly, ICMP flood attempts to crash operating system of a target host by sending many ICMP echo request packets. ICMP flood can be identified by the large volume of ICMP packets destined to the same destination IP address. Figure 1(b) shows the graphlet of ICMP flood. Port scan and host scan are the tools attackers use to discover services they can break into. Although they may not necessarily cause service disruption, they provide good indicators of an onset of attacks. The objective of port scan is to find out vulnerable ports of a target host. In general, port scanning attackers use a single source port to connect to a range of ports at a single destination IP address. Note that the reverse behavior of port scan looks like SYN flood behavior and vice versa as shown in Figure 1(c). Finally, host scan checks a range of IP addresses for a certain service port. The resulting graphlet shows communication between a host and multiple destination IP addresses at a single source port and a single destination as shown in Figure 1(d). Re al traffic stream 6 (a) SYN flood Keep flow records flow records Matc h with graphlets (b) ICMP flood srcip prot dstip srcport dstport srcip prot dstip srcport dstport 6 17 (c) Port scan (d) Host scan Figure 1. DoS attack graphlets srcip prot dstip Identify DoS attack Figure 2. Flowchart for DoS detection flows associated with attack To identify all occurrences and hosts associated with DoS activities, we follow steps in the flowchart in Figure 2. Our detection has following three steps. The Keep flow records module captures real network traffic based on 5-tuple flow records (srcip, protocol, dstip, srcport, and dstport) and sends flow records to the Match with graphlets module, which maps each flow record to pre-defined graphlets shown in Figure 1. Finally, the Identify DoS attack module uses predefined threshold value to identify flows associated with 1
3 DoS activities. Flows that match with one of the graphlets are then classified as DoS traffic. Note that the graphlet matching is performed every fixed interval. The graphlets that have been classified in each interval will be removed from memory. The flows classified as DoS attack will be kept for future reference. Any unclassified graphlets will be carried over to the next analysis interval. The key advantage of the proposed method is its lightweight. It can identify a group of hosts associated with DoS activities without analyzing packet content, packet size, or packet inter-arrival time. Furthermore, our technique can detect other network anomaly if they pose similar behaviors as these DoS attacks. IV. EXPERIMENTAL EVALUATIONS In this Section, we evaluate our lightweight DoS detection scheme through experiments with real attack traffic. Effectiveness of our scheme is measured in terms of detection accuracy and percentage of false positives. Accuracy is defined as a percentage of attack flows correctly classified as DoS attack over the total number of attack flows. Similarly, false positive is a percentage of non-attack flows misclassified as DoS attack over the total number of nonattack flows. The effectiveness of our method depends on two parameters. One is the analysis interval time for each round of graphlet matching. The other is a threshold value for graphlet matching. For example, to detect SYN flood, threshold is the number of source ports used by an attacking host. For ICMP flood, threshold is the number of ICMP packets. For port scan and host scan, thresholds are the number of destination ports per source IP and the number of destination IP addresses respectively. In our experiments, we use software tools Neptune [9], nmap [10], jping [11], and nbtscan, [12] to creating DoS attacks. Neptune is a SYN flood attack tool from Project Neptune. It will attack a victim host by continuously sending TCP SYN packets at a rate of 248 SYN packets per second on average with a spoofed source IP address. Jping is a DoS tool that will crash a remote host by flooding a large number of ICMP packets at a rate of 472,297 ICMP packets per second on average. Nmap is one of the most powerful information-gathering tools available. There are a variety of scanning modes available, such as port scanning and TCP fingerprinting. In our experiments, we use nmap to run port scan attacks. Nmap will send TCP SYN packets to a range of destination port of a target host and wait for each response. If a SYN-ACK packet is received, it indicates that the port is listening. On the other hand, if a RST is received, it is indicative of a non-listener, i.e., closed port. This technique is often referred to as "half-open" scanning, because it doesn t open a full TCP connection. The average number of TCP SYN packets generated by nmap is 7,930 packets per second on average. Finally, we use nbtscan to generate host scan attacks. Nbtscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in a supplied range. For each responded host, it keeps record of IP address, computer name, logged-in user name, and MAC address. The average scanning rate is 91 UDP packets per second. Next we discuss five sets of experiments to test the effectiveness of our method. A. Experiment I: Pure Single Attack In this experiment, we generate DoS attack traffic between two computers with the set up shown in Figure 3. This experiment contains four sub-experiments. Traffic data of each sub-experiment consists of one pure type of DoS attack, namely TCP SYN flood, ICMP flood, port scan, and host scan. The attack traffic is generated for the duration of 10 minutes. We repeat each sub-experiment five times. We evaluate accuracy of our method at the 2-minute analysis interval. The thresholds for SYN flood, ICMP flood, port scan, and host scan are 10,000 source ports, 250,000 ICMP packets, 8,000 destination ports, and 35 destination hosts respectively. The accuracy and false positive rate of the four sub-experiments are shown in Table I. Attacker (observation point) Ethernet Figure 3. Pure DoS attack testbed Victim TABLE I ACCURACY OF PURE, SINGLE DOS ATTACK DETECTION Exp Attack type Accuracy False positive I-1 SYN flood 100% 0% I-2 ICMP flood 100% 0% I-3 Port scan 100% 8.17% I-4 Host scan 100% 0% From Table I, we found that our method can detect DoS attacks with 100% accuracy. There is no false positive in all except the port scan experiments. A closer look reveals that the false positive in port scan is a result of misclassifying a set of reverse port scan flows as SYN flood. The reverse traffic of port scan is the SYN-ACK or RST packets from a victim sending in response to the SYN packets of the attacker, which inevitably match the SYN flood graphlet. B. Experiment II: Single Attack + Background Traffic In this experiment, we add real background traffic on top of single DoS attack traffic in experiment I. The setup is shown in Figure 4. The background traffic is collected from a research office at National Electronics and Computer Technology Center (NECTEC). Users in this office are 35 undergraduate students. All hosts are on the same broadcast LAN 100 Mbps. The captured interval time is two minutes. We apply the same thresholds from previous experiment I. Table II shows characteristics of captured traffic and accuracy of each sub-experiment, averaged after five repetitions. From Table II, we found zero false positive in all but the port scan experiments, similar to the result of experiment I. It turns out that if traffic data contains real background traffic,
4 the false positive in case of port scan is less than that of pure attack traffic. This is because the background traffic interrupts the reverse flows of port scan, causing slower arrival of response packets. TABLE II ACCURACY OF DOS ATTACK DETECTION WITH BACKGROUND TRAFFIC percentage of false positive Attacker (observation point) Hub Switch Figure 4. DoS attack testbed with background traffic Exp Attack Total Byte False Accuracy type Flows (MB) positive II-1 SYN flood 24, % 0% II-2 ICMP flood 203, % 0% II-3 Port scan 33, % 5.97% II-4 Host scan 3, % 0% C. Experiment III: Threshold Evaluation In order to cope with false alarms, we experiment with different threshold values for each attack graphlet. We find appropriate thresholds for detecting each attack, assuming a two-minute analysis interval. For each graph, we generate five sets of single attack traffic on real background traffic collected at the same location as experiment II, and compute average accuracy at different thresholds. Figure 5 shows effects of different threshold values to the false positive of detection. Effect of threshold values to the false positive of detection victim 35 users SYN flood Port scan Host scan threshold Figure 5. Effect of threshold to the false positive of detection We found that thresholds of 400 source ports, 300 destination ports, and 50 destination hosts are sufficient to detect SYN flood, port scan, and host scan generated by Neptune, nmap, and nbtscan respectively. ICMP flood shows zero false positive for all thresholds because there is no ICMP packet in background traffic. To differentiate ICMP flood from real ICMP traffic, we use threshold of 10,000 ICMP packets. D. Experiment IV: Multiple Attacks + Background Traffic Next we evaluate accuracy of our method, assuming twominute analysis interval and graphlet thresholds from experiment III. We carry out two sub-experiments. The first sub-experiment consists of one instance each of SYN flood, ICMP flood, port scan, and host scan. The second one contains two instances per each of the four attacks. Both experiments were performed five times on real background traffic from the same location as experiment II. Table III lists characteristics of captured traffic and accuracy of the two sub-experiments. Exp TABLE III CHARACTERISTICS OF COLLECTED TRAFFIC DATA Captured time on Total Flows Bytes (MB) Accuracy False Positive IV , % 13.40% IV , % 17.47% The results in Table III have proven that our method can detect all occurrences of DoS attacks (i.e., 100% accuracy). However, it yields higher false positive rate than the case of single attack in experiments I and II. This is mainly due to misclassifying a set of reverse SYN flood flows as port scan and vice versa, as discussed previously. E. Experiment V: Effect of Analysis Interval Another parameter of interest is the analysis interval. While we recognize that two-minute interval provides sufficiently accurate results, we want to know how near realtime our method can detect DoS attacks. We measure detection accuracy as a function of analysis interval, shown in Table IV. The traffic used in the experiments is the same set as that in experiment IV-1. Analysis Interval TABLE IV EFFECT OF ANALYSIS INTERVAL 30 sec 1 min 1.5 min 2 min Accuracy 98.44% 100% 100% 100% False positive 15.07% 13.40% 13.40% 13.40% From our experiments, we found that if we gradually reduce analysis interval from 2 minutes to 1.5 and 1 minute, the accuracy and false positive of detection do no change. However, when the analysis interval is reduced to 30 seconds, the accuracy of detection decreases from 100% to 98.44% and the false positive of detection increases from 13.40% to 15.07%. Therefore, we can conclude that decreasing the analysis interval from two minutes to one minute has no impact on the overall performance of our method. Moreover, one minute is the earliest we can detect attack traffic without compromising detection accuracy.
5 V. DISCUSSION In this Section, we would like to highlight some issues and limitations of our proposed method. False alarms: In our method, there are several events that may cause false alarms of detection. Example scenarios are as follows: In some cases, one attack could fit more than one DoS attack graphlets. For example, a port scan activity could be marked as port scan and SYN flood. Since the reverse behavior of port scan looks like SYN flood behavior and vice versa, our system classifies a set of reverse port scan flows as SYN flood. To avoid such mismatch, we could consider the TCP flag in addition to the 5-tuple flow record. However, this would make our detection method heavy-weight. Instead, we choose to ignore the TCP states and flags, and only match flow records with attack graphlets. Therefore, the false positives between port scan and SYN flood are inevitable. Some applications, such as download manager, often open a large number of connections in short time. An example of this application is Flashget [17]. Flashget will create a large number of connections from multiple source ports to a single destination port of a server for downloading a file. This behavior is similar to that of SYN flood. However, the difference between SYN flood and this kind of application is that the SYN flood will not complete a TCP 3-way handshake with the target victim. Therefore, we may need to apply a technique described in [18] in order to distinguish them. Many P2P file sharing applications are more inclined to use a single source port to connect to a lot of destination IP addresses for sharing files [19]. This behavior looks like a host scan activity. A carefully selected threshold of number of destination IP addresses will help differentiate the two activities. Configuring threshold: As shown in experiment III, accuracy of detection depends highly on setting appropriate thresholds for each graphlet. However, a threshold such as number of flows may depend on many environmental factors, for example, available bandwidth of current network, characteristic of DoS attack tools, number of generated attacks, duration of attack, operating system, and computer architecture of the attack host. Therefore, the threshold values presented in this paper may be specific for our experimental setup only. Network administrators may need to adjust their thresholds according to their network environment to achieve high accuracy and low false alarms. Spoofed IP address: our proposed method cannot identify real attacker if source IP addresses are spoofed. Our system will recognize spoofed source IP address as attacker. Encrypted packet header: our entire approach is based on relationships among the fields of the packet header. Consequently, our technique has the ability to characterize encrypted traffic as long as the encryption is limited to the packet payload. Should layer-3 and layer-4 packet headers be encrypted, our methodology cannot analyze. Pinpointing original attackers: A DoS attack may be a part of distributed DoS (DDoS) attack activities. Under DDoSattacks, an attacker may not directly attack the victim, but exploit multiple agents to generate attack on its behalf. In this case, our method cannot identify the original attacker of such DDoS attack activity. VI. CONCLUSION AND FUTURE WORK We propose a lightweight method to identify DoS attacks and their onsets. Our method can identify SYN flood, ICMP flood, port scan, and host scan, based on the idea of BLINC s host behavior analysis. The procedure has two steps. First we create attack graphlets by examining unique flow behaviors. Secondly, we identify an attack flow by matching flow records to the pre-defined graphlets. The advantage of our method is that it can identify all occurrences and all hosts associated with attack activities without relying on packet payload, packet inter-arrival time, or size of individual packets. Moreover, it can effectively detect anomalous behaviors in the network if the flow behaviors are similar to DoS attacks. In addition, our method can perform near realtime detection, within one minute interval, with low false alarms. We are in the process of developing graphlets for other types of DoS and DDoS attacks, such as Smurf, Trinoo, TFN/TFN2K, and Stacheldraht [2], [13], [14]. We also plan to compare our performance with a de-facto IDS, such as Snort [3]. In addition, we plan to improve our method to be more real-time and to distinguish between DoS and applications with similar traffic behaviors, such as P2P file sharing. ACKNOWLEDGMENT We would like to thank the National Electronics and Computer Technology Center (NECTEC) in Thailand for allowing us to collect traffic data. REFERENCES [1] Thomas Karagiannis, Konstantina Papagiannaki, and Michalis Faloutsos, BLINC: Multilevel Traffic Classification in the Dark, ACM Sigcomm, [2] J. Mirkovic, J. Martin, and P. Reiher, A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, ACM Sigcomm Computer Comm. Rev., vol. 34, no.2, 2004, [3] Snort, [4] M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, Classof-service mapping for QoS: A statistical signature-based approach to IP traffic classification, Internet Measurement Conference, 2004 [5] A. McGregor, M. Hall, P. Lorier, and J. Brunskill, Flow clustering using machine learning techniques, In Proceeding of Passive and Active Measurement Workshop, 2004 [6] D. Zuev and A. Moore, Traffic classification using a statistical approach, In Proceeding of Passive and Active Measurement Workshop, 2005.
6 [7] A. Moore and D. Zuew, Internet traffic classification using Bayesian analysis, In Proceeding of ACM SIGMETRICS, [8] Yan Qial and Xie Weixin, A Network IDS with Low False Positive Rate, In Proceeding of the 2002 Congress on, Vol.2, pp , [9] Neptune [10] nmap [11] jping [12] nbtscan [13] CERT Coordination Center, "Denial of Service Attacks," [14] CERT Coordination Center, "Trends in Denial of Service Attack Technology," October 2001, [15] CERT Coordination Center, "TCP SYN flooding and IP spoofing attacks," [16] S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March [17] Flashget [18] Haining Wang, Danlu Zhang, and Kang G. Shin, Detecting SYN Flooding Attacks, In Proceeding of IEEE INFOCOM'2002, New York City, June [19] Security Focus, Identifying P2P users using traffic analysis,
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
How To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Network Monitoring Using Traffic Dispersion Graphs (TDGs)
Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Attacks and Defense. Phase 1: Reconnaissance
Attacks and Defense Phase 1: Reconnaissance Phase 2: Port Scanning Phase 3: Gaining Access Using Application and Operating System Using Networks Phase 1: Reconnaissance Known as information gathering.
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
DDoS Attacks and Defenses Overview
DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]
Denial of Service (DoS)
Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS
How To Prevent DoS and DDoS Attacks using Cyberoam
How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam Applicable Version: 10.00 onwards Overview Denial of Service (DoS) A Denial of Service (DoS) attack
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
Effect of Network Traffic on IPS Performance
Journal of Information Security, 2012, 3, 162-168 http://dx.doi.org/10.4236/jis.2012.32019 Published Online April 2012 (http://www.scirp.org/journal/jis) Effect of Network Traffic on IPS Performance Shahriar
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
