Anomaly detection, graph databases and NetFlows - from SECOR project perspective
|
|
|
- Annis Wade
- 10 years ago
- Views:
Transcription
1 Anomaly detection, graph databases and NetFlows - from SECOR project perspective Maciej Miłostan 45 th TF-CSIRT meeting Poznań, 22 nd May 2015 Work supported by the National Center for Research and Development of Poland(NCBiR) grant no. PBS1/A3/14/2012 SECOR
2 Outline SECOR beyond events correlation Architecture Anomalies Detection components NetFlow/IPFIX and graphs Graph DBs Complex Event Processor Future plans 2
3 SECOR - Facts sheet Project name: Security data correlation module for recognition of unauthorized activities and aiding decision processs Code word: SECOR Source of funding: The National Center for Research and Development (NCBiR) Applied Research Programme path A (support in scientific field) Partners: Military Communication Institute (MCI) PSNC ITTI Project duration: 30 months ( r r.) 3
4 Motivation Quite obvious Rising a level of e-protection of e-infrastructures for e- science (including grid environments and NREN facilities) Going beyond signature based systems to address emerging threats Awareness building and early warning capabilities Discovering complex events in large heterogenous data streams Need for multi-level protection 4
5 Goal Implementation of SECOR prototype including: Novel detection methods covering various levels of IT environment and based on: Advanced statistics Machine learning Petri-Nets and ontologies Correlation of detection results coming from wide range of methods / correlation of aggregated and raw symptoms of attack or threat Visualization Promoting open standards for exchange of events 5
6 System architecture
7 System architecture 7
8 Anomaly and anomaly detection Definition of an anomaly Dictionary: something that is unusual or unexpected Anomaly detection Behavior anomaly detection Identification of strange events (outliners) or trends that are not consistent with previous observations or theoretical model Discovery of possible threats among anomalies (not all anomalies are threats and vice versa) We need events and/or model to detect anomaly 8
9 Event sources Main categories of event sources System level Service level Network level Modules of SECOR analysis blocks work on different levels, but altogether cover all three levels 9
10 System level
11 Events on system level Windows Linux Microsoft API Hooks / Detours e.g. System events Library calls (ltrace) System calls (syscalls) Kernel messages (e.g. dmesg) We have separate modules for Linux and Windows 11
12 Behavioral analysis PRONTO (MCI, Bartosz Jasiul) EVENTS ARE GATHERED USING API HOOKS IN WINDOWS 7 12
13 Neural Networks (PSNC, Tomasz Nowak, linux library calls) 13
14 Methods based on analysis of system/library/api calls on OS level Pros Detection of unknown attacks based on knowledge about behavior of known malicious code that possibly could be reused in new malware Detection of exploits activities on the basis of change in system and library calls patterns Low number of false-positive alarms (errors) Cons Complex implementation Time-consuming detection Necessity of continuous maintenance of models (new models are needed for new malware or new/updated executable) 14
15 Service level
16 Events on service level Let s focus on web-based applications: Application logs Web server logs Access logs Database logs Within SECOR, ITTI implemented a set of machine learning algorithms for SQL-injection attacks. 16
17 Network level
18 Events on network level Ethernet layer (e.g. port statistics, MAC addresses, Ethernet flow etc.) IP layer NetFlows IPFIX Within SECOR, we use NetFlows and/or IPFIX (depending on device or software probe capabilities) 18
19 NetFlows and IPFIX Few remarks Potential problems with NetFlows Most probes generate unidirectional NetFlow record, thus to get bidirectional traffic we have to aggregate them Problem to distinguish source and target (problem with getting right flow direction) this is in most cases true for TCP and even in more cases for UDP Identification of correct direction of information flow is crucial for successful application of network (communication) graphs IPFIX support bi-directional flows, so better use it if you can (in case of software probes for example use yaf instead of fprobe) Beware of dump delays 19
20 NetFlows Pros Widely deployed many devices support it Distributed vswitches in VMWare vsphere Enterprise Plus support it as well Cisco Nexus 1000V can be used in Microsoft Hyper-V
21 NetFlows in SECOR Statistical methods Analysis of entropies Graph theory based methods Analysis of communication graph properties
22 Statistical methods (MCI, Przemysław Bereziński)
23 Statistical methods Input in(out)-degree Full NetFlow dumps every 5 Mass functions for features minute Entropy measure Model received from observation of Tsallis normal traffic Tsallis with normalization Considered features Renyi source /destination addresses Shannon and ports, flows durations transferred packets/bytes 23
24 Example: Attack and detection Stage I 15:55 botnet malware infects single host Stage II (can be detected on host level) 16:00 infected host begins network scan and exploits vulnerabilities (can be detected on network level) 16:05 more hosts get infected (detection on host system level) Stage III 18:00 malware communicates Command and Control (C&C) (can be detected on network level) 18:05 malware take part in DNS reflected DoS attack (can be detected on network level) 24
25 Analysis of traffic volume New observation point is generated every 5 minutes 25
26 E N T R O P Y 26
27 Graph based methods (PSNC, Maciej Miłostan)
28 Social network of communicating hosts Who (what) communicates with whom (or what) Dance by Matise Melvin McGee Don t Touch the Painting 28
29 Network flows (NetFlows) collecting data for graph based model NetFlow/IPFIX processing general schema 29
30 Network flows (NetFlows) graph representations 30
31 Examples of simplified NetFlow graphs DARPA sets HTTP+SSH vs. SMTP 31
32 Graph edges dynamics Example for attack scenario show earlier E.g. number of new edges corresponding to UDP connections created after the considered NetFlow dump 32
33 Topological changes 33 33
34 Increased volume Number of octets in flows Aggregated volume information are also stored as properties of edge 34
35 Graph databases
36 Book on Graph Databases: 36
37 Why Neo4j? One of the first Graph Databases (one of the market leaders) Intuitive query language called Cypher JDBC drivers Documented APIs Transactional properties Built-in management console and query console Claimed support for relatively Big-data: data size is mainly limited by the address space of the primary keys for Nodes, Relationships, Properties and RelationshipTypes. Currently, the address space is as follows: nodes 2 35 ( 34 billion) relationships 2 35 ( 34 billion) properties 2 36 to 2 38 depending on property types (maximum 274 billion, always at least 68 billion) relationship types 2 15 ( ) 37
38 Cypher query example Trivial example Identification of service listening on high ports and their clients Cypher query: MATCH (ip:ipclust)-- >(s:ipnode)--> (f:flow {current:true})<-- (d:ipnode) WHERE d.port >1024 RETURN DISTINCT ip.ip,d.ip; 38
39 Result of the query s.ip d.ip Identification of service listening on high ports and their clients Cypher query: MATCH (ip:ipclust)-->(s:ipnode)--> (f:flow {current:true})<--(d:ipnode) WHERE d.port >1024 RETURN DISTINCT ip.ip,d.ip;
40 Adding new data using Cypher CREATE CONSTRAINT ON (n:ipclust) ASSERT n.ip IS UNIQUE; CREATE CONSTRAINT ON (n:ipnode) ASSERT n.ipport IS UNIQUE; MERGE (n:ipnode {ip:" ", port:0,ipport:" :0"}); MERGE (n:ipnode {ip:" ", port:20545,ipport:" :20545"}); MERGE (n:ipclust {ip:" "}); MATCH (n1:ipnode {ip:" ", port:0}), (n2:ipnode {ip:" ", port:20545,ipport:" :20545"}) MERGE (n1)-[:src]->(x:flow {current:true})<-[:dst]-(n2) ON CREATE SET n1.degree=coalesce(n1.degree,0)+1 SET n2.degree=coalesce(n2.degree,0)+1; 40
41 Encountered problems Merging nodes and relations on-line is inefficient due to locking and extensive scans Processing time: 6h30min! Solution use batch inserter instead of merge e.g. batch-import software 41
42 Solution Components nfdump Perl script processing aggregated NetFlow record from nfdump into batchinserter format Additional flat files storing historical edges to be able to spot changes in a communication pattern Batch-import from: Database reloader The whole reload of database with 500k of NetFlow records take less than 30s, including restart of Neo4j engine JDBC based query engine 42
43 >>Executing query: More examples for attack scenario MATCH (n:ipnode)--(c:ipnode) WHERE c.port = 135 or c.port=445 or c.port=593 RETURN n as IPnode, n.ip as Source, count(*) as NumberOfTargets, "RPC Scan Source" as Tag, "0.5" as Confidence ORDER BY NumberOfTargets DESC LIMIT 5 Source: , NumberOfTargets: 167, Tag: RPC Scan Source, Confidence: IPnode: {"ip":" ","port":0.0,"ip_port":" :0","type":"IS"}, >>Results: Source: , IPnode: NumberOfTargets: 3, {"ip":" ","port":0.0,"ip_port":"10. Tag: RPC Scan Source, 1.0.2:0","type":"I"}, Confidence: 0.5 TOP 5 RPC communication 43
44 NTP monitoring for high volume traffic >>Executing query: MATCH (n:ipnode)-[r:toudp]->(c:ipnode) Where c.port=123 and r.sumoctets > return n.ip as Target, r.sumoctets as Octets, c.ip as Source, "NTP DDOS" as Tag, "0.99" as Confidence >>Results: Target: , Octets: , Source: , Tag: NTP DDOS, Confidence:
45 Complex query change of mean values Darpa set MATCH (src:ipnode)-[:src]->(c:flow {current:true})-[:prev*1..10]->(p:flow)<- [:dst]-(dst:ipnode) WHERE c.nf=p.nf+10 and p.nf>5 and c.mean>p.mean RETURN src.ipport,dst.ipport,c.nf,p.nf,c.mean,p.mean,p.std, max(c.mean-(p.mean+2*sqrt(p.std/(p.nf-1)))) as delta_mean ORDER BY delta_mean DESC Standard deviation src.ipport dst.ipport c.nf p.nf c.mean p.mean stdev p.std delta_mean : : , , : : , , : : , , : : , : : , , : : , , : : , ,
46 Additional possibilities Path traversal between a set of hosts Analysis of clusters properties Graph-clustering = process of finding communities (clusters/disjoint subgraphs) in a graphs Clusters groups of vertices; within each cluster the vertices are highly connected whereas there are only few edges between clusters Example methods: Markov Clustering Algorithm (MCL) - it is straightforward to apply it in our model Walktrap Divide and merge strategies 46
47 Complex event processing (PSNC)
48 STIX, WSO2, OSGI All modules are sending events to CEP engine in STIX format WSO2 is used as CEP Correlation rules are defined Modules are controlled using OSGI framework 48
49 User application (1) 49
50 User application (2) 50
51 User application (3) 51
52 Future plans Further research focused on detection algorithms Addition of more advanced correlation methods on CEP level Deployment in production environment Expansion to different environments (e.g. SCADA/ICS, sensor networks, IoT) Usage of obtained experience and results in new project 52
53 Thank you! Dr Maciej Miłostan Security Team of PSNC
54 Poznań Supercomputing and Networking Center affiliated to the Institute of Bioorganic Chemistry of the Polish Academy of Sciences, ul. Noskowskiego 12/14, Poznań, POLAND, Office: phone center: (+48 61) , fax: (+48 61) ,
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing
THE BEST WAY TO CATCH A THIEF Patrick Bedwell, Vice President, Product Marketing AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources,
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik
From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Analysis of Network Beaconing Activity for Incident Response
Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Fast Innovation requires Fast IT
Fast Innovation requires Fast IT 2014 Cisco and/or its affiliates. All rights reserved. 2 2014 Cisco and/or its affiliates. All rights reserved. 3 IoT World Forum Architecture Committee 2013 Cisco and/or
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection Systems with Correlation Capabilities
Intrusion Detection Systems with Correlation Capabilities Daniel Johansson [email protected] Pär Andersson [email protected] Abstract Alert correlation in network intrusion detection systems
SapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Cisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham
PRACTICAL EXPERIENCES OF BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR ` Mark Graham OUTLINE RESEARCH PROBLEM: Botnet detection in Cloud Providers FLOW: IPFIX and NetFlow CONCEPTUAL FRAMEWORK: Build
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net [email protected]
Honeypots & Honeynets Overview Adli Wahid Security Specialist, APNIC.net [email protected] 1 Contents 1. ObjecCves 2. DefiniCon of Honeypot & Honeynets 3. Benefits & Risk consideracon 4. Example of Honeypot
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
AT&T Real-Time Network Security Overview
AT&T Real-Time Network Security Overview Dan Solero Director of Security Technology, AT&T Know Your Enemy: Security Threats Extend Beyond Viruses & Worms Distributed Denial of Service Spam for Hire Social
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Master Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Master Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current status
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
eeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE
NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE Anjali P P 1 and Binu A 2 1 Department of Information Technology, Rajagiri School of Engineering and Technology, Kochi. M G University, Kerala
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Firewalls. Chien-Chung Shen [email protected]
Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective
cinderella: A Prototype For A Specification-Based NIDS
cinderella: A Prototype For A Specification-Based NIDS Andreas Krennmair [email protected] August 8, 2003 Abstract What is actually network intrusion detection? How does it work? What are the most common
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).
1 perfsonar tools evaluation 1 The goal of this PSNC activity was to evaluate perfsonar NetFlow tools for flow collection solution and assess its applicability to easily subscribe and request different
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
