Real-Time Feature Extraction for High Speed Networks
|
|
|
- Elmer Allison
- 10 years ago
- Views:
Transcription
1 Real-Time Feature Extraction for High Speed Networks David Nguyen, Gokhan Memik, Seda Ogrenci Memik, and Alok Choudhary Department of Electrical and Computer Engineering Northwestern University Evanston, IL {dnguyen, memik, seda, Abstract With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support high performance demands. Feature extraction (or flow monitoring), an essential component in anomaly detection, summarizes network behavior from a packet stream. This information is fed into intrusion detection methods such as association rule mining, outlier analysis, and classification algorithms in order to characterize network behavior. However, current feature extraction methods based on per-flow analysis are expensive, not scalable, and thus prohibitive for large-scale networks. In this paper, we propose an accurate and scalable Feature Extraction Module (FEM) based on sketches. We present the details of the FEM design on an FPGA and show that using FPGAs we can achieve significantly better performance compared to existing software and ASIC implementations. Specifically, the optimal FEM configuration achieves Gbps throughput and 97.61% accuracy. 1 Introduction Traditionally, intrusion detection techniques fall into two categories: signature (or misuse) detection or anomaly detection. Signature detection looks to find well-known patterns of attacks and intrusions by searching for pre-classified signatures either in network traffic or data patterns. Since general-purpose processors (i.e., software implementations) cannot meet the required performance limitations, numerous projects have investigated dedicated hardware (including reconfigurable hardware) for such tasks [1-4, 8, 17]. Anomaly detection, which is designed to capture behavior that deviates from the norm, is the counterpart to signature detection. These systems predict anomalous behavior. Hence, they can detect new/unknown intrusions. However, they suffer from false alarms (false positives) and also not sounding alarms when attacks do occur (false negatives) [19]. Since the number of new attacks is increasing and variations of old attacks are more prevalent, next generation IDSs must employ anomaly detection. Regardless of the underlying algorithm, the first step in anomaly detection is the real-time network feature extraction. Due to the complexity of gathering detailed information in high speed links, existing techniques only monitor a small amount of features in a packet stream, limiting their effectiveness. Feature extraction mines more information than is readily available at the packet level. Besides the packet payload, a single packet does not offer much information. Yet by processing a series of packets, one can mine for additional characteristics of the network activity between hosts. Our architecture allows for characterization of a sudden increase network activity. This information is needed for anomaly detection algorithms such as rule mining, classification, and outlier detection. In this paper, we propose a Feature Extraction Module (FEM). FEM accurately characterizes network behavior and always provides an up-to-date view of the network
2 environment. Depending on the application utilizing this information (e.g., rule mining, classification), different properties get monitored in the network. As we will describe in the following sections, our architecture can be easily configured to gather such different types of information. By utilizing the reconfigurable capabilities of FPGAs, these changes can be effectively performed. Because of such configuration and high performance requirements, FPGAs are an ideal implementation medium for their reconfigurability and inherent parallelism. Our simulation results prove the sketch data structure a viable alternative to expensive per-flow methods. In addition, our FEM implementation requires a constant amount of memory and achieves a guaranteed performance level, important characteristics for networking hardware design. This paper is organized as follows. Section 2 presents a background of feature extraction measures and an introduction the types of attacks plaguing many networks. Section 3 presents the FEM architecture and its components. Section 4 demonstrates the applicability of our architecture. Simulations and FPGA implementation are diagrammed in Section 5. Then related work is shown in Section 6 with conclusions in Section 7. 2 Background Our architecture is a necessary precursor for online anomaly detection. Although FEM can be configured to gather information for any anomaly detection scheme, in this paper we focus on detecting two of the most popular network attacks: denial-of-service (DoS) attacks and port scanning, a mechanism in worm propagation. A majority of DoS attacks are SYN floods, which send connection requests faster than a machine can process them. The well-known TCP 3-way handshake is below. 1. Client sends a SYN segment with client s ISN (Initial Sequence Number). 2. Server responds with a SYN-ACK segment, which is Server s SYN segment with its own ISN and an acknowledgement to Client s SYN with Client s ISN Client sends ACK with server's ISN+1. Initially, the attacker creates a random source IP for each packet with the SYN flag set to request a new connection. The victim responds with a packet having the SYN and ACK flags set and then waits for a confirmation packet, which will never arrive. Typically connection tables wait a period of time before dropping the entry. In this time, the victim is bombarded with SYN requests and the table fills up. As a result, the victim refuses any additional connection requests even if they are legitimate. Typical SYN flood behavior involves a large amount of packets with the SYN flag set directed at a victim. In section 4, we explain how the FEM architecture is configured to watch for this behavior. Port scanning, on the other hand, is probably the most common and versatile type of intrusion mechanism. For example, with worm propagation, in order to distribute copies of itself, the worm must find other hosts vulnerable to it. Worms may target a specific host or search for any number of hosts. We classify three well-known port scan methods: vertical scan, horizontal scan, and block scan [11, 18]. Figure 1 is a visual abstraction of these port scanning methodologies. Horizontal scans are the most common, scanning a range of IPs on a particular port. The port number is often unique as it reflects the susceptibility the worm is exploiting. Vertical scans target a specific host and search for open ports on that host. The third scan type, block scan, is a combination of horizontal and vertical scans for different ports and machines. Fortunately, port scanning requires a real source IP address instead of a spoofed one.
3 Therefore, it is possible to track port scan behavior from the source IP address. Taking this into account, section 4 details how FEM will trace this type of activity. 3 FEM architecture Figure 1: Port Scanning Methods In this section, we introduce the feature extraction module (FEM), which characterizes network behavior within an interval of time or specified interval of connections. Network behavior represented by the FEM sufficiently reflects the current state of the network. Thus, real-time profile of the network is always available for processing with intrusion detection schemes such as data mining, outlier analysis, statistical methods, etc [10]. The architecture s data storage component models the idea of sketches [13], which are used in data stream modeling for summarizing large amounts of information requiring a small constant amount of memory. Sketches are a probabilistic summary technique for analyzing large network streams without keeping per-flow state that make vector projections onto other sketches to infer additional information [13]. Our case study will show how the relationships between sketches aid in inferring additional network characteristics that are not explicitly monitored. To achieve fast execution and to achieve effective adaptation, we implement our architecture on an FPGA. The regular structure of sketches maps well onto an FPGA. We exploit the inherent parallelism in the sketch to increase throughput and obtain significant link speeds. Following is an explanation of the core component of FEM. It is possible to model anomalous behavior associated with two general types of intrusions: time-based and connection-based. Time-based attacks cause an increase in network activity in a period of time, referred to as bursty attacks. SYN floods are an example, where connection tables are flooded in a period of time disabling the victim machine to service new connection requests. Connection-based attacks do not have a recognizable temporal aspect. They are sometimes referred to as pulsing zombie attacks. Port scans may release connection requests in the span of seconds or days. Therefore, intrusion detection methods focusing on large volumes of network activity are ineffective. Our architecture can capture both connection and time-based statistics. 3.1 Feature Extraction Functions There are two main functions supported by the FEM: UPDATE (k, v) to change the value in the sketch ESTIMATE (k) to correctly retrieve a value from the sketch Both functions take in a key k, which is input to H hash functions in the feature sketch. The key k, in this case, is any combination of the 5-tuple fields present in TCP/IP packet headers: {source IP, destination IP, source port, destination port, protocol}. The 6-bit flag field, also in a packet header, assists the control logic for intelligent hashing of the 5-tuple fields depending on what network characteristics are analyzed.
4 3.2 Architecture Figure 2 highlights our architecture, consisting of a comprehensive feature controller (FC), hash functions (HF), feature sketch (FS), and a data aggregate (DA). The FEM architecture provides a fast, scalable, and accurate platform from which important network characteristics can be monitored and tracked in real-time. FEM can be configured to monitor a plethora of network characteristics by using the semantics of the TCP/IP protocol. Also, FEM requires a small memory footprint while maintaining a high level of accuracy, making it an attractive alternative to expensive per-flow methods. The feature controller (FC) coordinates the inputs to the hash functions using the flags of a packet header. The reconfigurable aspects of FPGAs make reprogramming possible to monitor a variety of network statistics. Our case study in Section 4 focuses on open connection requests originating from or incoming to hosts by utilizing the SYN and ACK flags. Other possible statistics include the number of live connections, the flow size of active connections, amount of service-related traffic, or connection based statistics such the number of connections for specific services on a host. These measures would utilize the PSH (push), RST (reset), FIN (finish), and URG (urgent) flags. For instance, a feature sketch monitoring web traffic at a particular host would use the source IP and destination port fields. Port 80 is designated as the port for http. Other destination ports such as 20 or 21 are designated for FTP traffic and 23 for telnet services. However, each FS monitors only one network characteristic. By using multiple FSs along with the relationships between FSs, we can infer additional network behavior information. Figure 2. Feature Extraction Module with one FS The feature sketch (FS) is an application of sketches used for data stream modeling. It uses a constant amount of memory and has constant per-record update and reconstruction cost. Each row in the FS is accessed in parallel with different hash functions. This favors FPGAs versus expensive per-flow methods. An FS contains H rows each of length K. When H>1, the accuracy of ESTIMATE queries improves. Section 5 presents the accuracy results. This increased accuracy is achieved by addressing each row in the FS with a different hash function (HF). This way, the distribution of information varies for each row. We chose the Jenkins Hash for its speed and provable scatter properties. It is implemented in various Linux kernels as a component to the IPtables connection tracking module [9, 15]. With an FPGA, all hash functions are computed in parallel. Also, by pipelining the Jenkins Hash, FEM can accept a packet on every clock cycle, thus increasing throughput. Lastly, the data aggregate (DA) component takes H values and estimates the actual value for a query. Using statistical estimation techniques, we show that ESTIMATE queries to the
5 FS are accurate. The heuristic we implement to estimate the value of a query takes the minimum of the H values in the FS. The minimum value suffers the least from collisions. Other estimation techniques are plausible [10, 13] but we found the minimum estimate usually gives the best results and the least hardware complexity. Minimum comparisons are performed in parallel such that this module is not on the critical path of FEM. 4 Case Study: Edge Router Level Application In this section, we present an application of FEM at the router level for characterizing network behavior. Figure 3 is a simple diagram of network traffic occurring at any two nodes A and B. Node A represents outgoing traffic. The figure depicts different types of incoming traffic to node B through different ports. Port scans and SYN floods access any range of ports. Figure 3. Incoming and Outgoing Packets If the FEM is placed at the host level, for example at A, the architecture is simple. Each node is aware of its location when processing network packets so the feature controller FC easily preserves connection ordering. However, when placing FEM at a router, additional logic is needed to preserve connection ordering. For example, when A and B communicate with each other, the source IP/port and destination IP/port fields in a packet are not consistent with the particular node which started the connection. This case study illustrates how to apply FEM to monitor network activity usually associated with SYN flood and port scans from a router s perspective. Each FEM consists of a number of FSs. For each FS, the key is denoted K and the feature value is denoted V. The source IP is designated SIP, destination IP DIP, source port SPORT, destination port DPORT, and protocol, PROTO. The flags applicable for this case study are the SYN and ACK flags. We want to track the behavior associated with these two attacks. First, it is known that SYN flood traffic is directed at a (DIP, DPORT) combination. Port scans are more flexible and use any combination of (DIP, DPORT). With an array of FSs, network behavior can be characterized for any given window of packets in a network stream. To monitor the behaviors of port scans and SYN floods, we propose the setup in Figure 4. Four FSs are accessed and updated in parallel with a stream of packets. Each FS monitors a different network characteristic. Our architecture favors FPGA implementation since the feature controller can be reprogrammed and easily placed back into the network without any modification to the core architecture. Section 5.2 details the FPGA implementation and performance of a FEM module with one FS. Because multiple FSs are accessed in parallel, the width of the FEM has a minor impact on performance.
6 Figure 4. Case Study Example FS 1 aids in SYN flood detection by monitoring the number of un-serviced SYN requests for specific services. When a machine services SYN requests, it responds with a packet having the SYN and ACK flags set. For a SYN packet, a count value is incremented. For a SYN/ACK response the count is decremented. By placing FS 1 at an edge router, connection ordering relative to the DIP is easily preserved by checking the flags in the packet. All connections in FS 1 are candidates for SYN floods and we denote this set SYNFLOOD set. FS 2 is monitors hosts with a large number of partially completed SYN requests. This activity indicates vertical scans or SYN floods. Notice FS 2 is a superset of FS 1. FS 2 contains all types of traffic at a particular IP. By querying both FSs with ESTIMATE, we can approximate the percentage of types of traffic at any DIP. Removing SYNFLOOD set from FS 2 leaves candidates for vertical scans, VSCAN set. FS 3 observes the traffic from any SIP that causes incomplete SYN requests. This measure includes vertical, horizontal, and block scans. To differentiate this activity, FS N is implemented to oversee the amount of traffic between any two hosts. For a SIP x FS N, if there is a DIP x VSCAN set and FS 3 returns a value greater than a threshold (pre-determined by other intrusion detection algorithms), we claim SIP x is vertically scanning DIP x. If not, SIP x may be horizontally or block scanning on the network. Using both FS 3 and FS N, we are able characterize additional network behavior. The main difference between each FS is how the FC coordinates addressing each FS. As described, the flags SYN and ACK are used to intelligent configure each FEM. Nonetheless our architecture is general enough to measure other network characteristics. Using SYN/FIN relationships for opening and closing network connections, it is possible keep an FS updated with traffic flow sizes. FEM can be employed at both the edge routers or on specific hosts. Our example contains extra logic for router implementation (connection ordering). Host implementation would actually be simpler because the perspective of network traffic is narrower. 5 Results 5.1 Simulations In this section, we investigate the accuracy of using feature sketches by testing different FS sizes. There are no known benchmarks specifically compiled for feature extraction, so we arbitrarily chose six days of traces from the 1999 DARPA Intrusion Detection Evaluation [14]. Half of the traces contain labeled attacks and the other half do not. Nonetheless, FS should accurately represent the network environment. We simulate a FS (K= (SIP, DIP, DPORT, SPORT), K= (SYN SYN/ACK)). Our test FS is more intensive because more connections are simultaneously being tracked. By virtue of design, FS is constantly updating; so we stream in 24 hours of network activity and query the FS afterwards to compare the FS estimate with exact per-flow results.
7 K (FS row size) vs %accuracy %accuracy 100% 95% 90% 85% H=4 H=2 H=8 80% 75% H= K (FS row size) Figure 5. K(FS row size) vs. Accuracy Figure 5 presents the accuracy of using a FS. H represents the number of rows in the FS and K represents the size of each row. The accuracy is measured as the percentage of precisely estimated flows (i.e., where the estimated value is equal to the actual value) out of all flows in the DARPA traces. The results of all six days are averaged together. For multiple hash function results (H > 1), we use the Jenkins Hash with different seed values. When keeping K constant and increasing H, the accuracy also improves. For example, with H=1, K=2048, the accuracy is 84.3%. With H=2, K=1024, the accuracy increases to 87.8%. The 3.4% difference equates to 5586 more precisely estimated flows of the total 164,276 flows. However, in most cases increasing K boosts accuracy more than increasing H. This is attributed to hash function limitations, such as poor scattering or lack of variability between different hash functions, or unavoidable collisions in small row size K (ex. H=8, K=1024)). Table 1 represents an example of this behavior. The accuracy improves when increasing the number of rows until H=8, at which point the small K value limits the accuracy. Overall, however, the FS data structure ably satisfies accuracy demands. In Section 5.2, we investigate how increasing H changes throughput and FPGA performance. H K Accuracy % % % % Table 1. Constant Total K = entries Figure 6 reports another measure of the effectiveness of feature sketches, the average deviation of estimations from exact per-flow results. Clearly, increasing H improves estimation of, in this case, SYN SYN/ACK values. This trend persists for other network behavior measures. As in Figure 5, the gap between H=1 and H=2 is the largest. It shows that our datasets result in mostly 2 collisions. This fact favors more balanced FS configurations versus a one row FS where collisions adversely affect the accuracy.
8 ave deviation 1.2 H=1 1 K (FS row size) vs Average Deviation H=2 H=4 H= K (FS row size) Figure 6. K (FS row size) vs. Average Deviation 5.2 Implementation Details FEM was implemented on a Xilinx VirtexII xc2v1000 chip. This member of the Virtex II family contains 5120 slices and 40 16Kb Block RAM modules. We used Synplify Pro for logic synthesis and the Xilinx ISE 5.2i suite for placement and routing. For our hash function, the Jenkins Hash was extensively pipelined to operate at MHz. FEM total K = 8192 entries H K slices Frequency (MHz) Throughput (Gbps) FEM total K = entries FEM total K = entries Table 2. Router-based FEM Place and Route Results Table 2 contains the performance and area metrics for FEM implemented for edge routers. The performance results are similar for host-level implementation since the added logic in the feature controller (FC) is not on the critical path of the FEM. We test configurations for H=1, 2, and 4. Throughput, clock frequency, and slices are reported for three overall row sizes K=8192, 16384, and The throughput value is calculated from the 5-tuple data {source IP, destination IP, source port, destination port, protocol} and the 6-bit flag field used to configure the FC. It is clear that for a given total memory size, increasing H increases throughput because it reduces the memory size and hence reduces the access times. Similarly, for a constant H, reducing the total memory amount (K) also increases the throughput. Among the simulated configurations, the best throughput of Gbps is achieved for H=4 and K=2048. However,
9 note that this configuration has a relatively low accuracy of 94.1%. Hence, when one considers the accuracy * throughput product, the best configuration is H=4 and K=4096, which can extract information at Gbps. Note that the increase in number of slices is mostly a result of using multiple hash functions in parallel. Replicating the hash functions allows higher throughput and frequency at the expense of area. If there are area constraints, however, one could use one hash function implementation for multiple FS rows, providing the values to each of them at consecutive cycles. This would result in decreased throughput but also reduced area requirement. Since the Jenkins Hash is pipelined, mapping a hash function to multiple rows would not introduce long extra delays. In conclusion, the simulations show that feature sketches are effective data structures for network behavior characterization. The simulation results demonstrate the gains in accuracy and estimation ability of feature sketches. FPGAs take advantage of multiple FS rows to satisfy Gigabit throughput demands. Consequently feature sketches, the main components of FEM, are attractive data structures for FPGAs to exploit parallelism. 6 Related Work Many networking applications have found their way into hardware implementations [7]. With link speeds increasing and the multitude of network applications, future solutions place a premium on both performance and flexibility. FPGAs qualify for both these requirements. Current generation of FPGAs can operate at speeds ranging from 50 MHz to 250 MHz and have capacity on par with large ASIC designs. For example, FPGAs have been used in developing platforms for experimentation of active networks [4] for services such as detection of Denial-of-Service (DoS) attacks, real-time load balancing for e-commerce servers, real-time network based speed recognition servers for v-commerce, etc. Also, high speed front-end filters and security management applications for ATM firewalls have found their way onto FPGAs to reduce performance penalties at the IP level [12]. As for flow monitors, TCP/IP Splitter [17] has been implemented as part of the FPX (Field- Programmable Port Extender) project to perform flow classification, checksums, and packet routing. However, this implementation is limited to 3 Gbps monitoring. In our previous work, we implemented a flow size monitor similar to FEM [16]. However, the design was not updateable when connections were completed. This limitation prevented achieving an accurate representation of the network. In this paper, we modify the architecture for update information, which increases the accuracy by almost an order of magnitude for comparable configurations. Other studies [6] agree that per-flow methods will not suffice and propose both intelligent algorithms and multistage filters using multistage hash tables to increase accuracy over Cisco s NetFlow (which uses sampling to characterize network traffic). Jupiter T-Series routers also implement a propriety flow monitoring mechanism. Although the router runs at 10 Gbps link speeds, the monitoring is limited to 250K packets per second for each physical interface card. It is also limited in the maximum number of flows (400K) and flow creation rate (12K new sessions per second). Before these dedicated hardware solutions, flow monitoring tools had been implemented in software, such as HTTPDUMP. 7 Conclusions Real-time feature extraction is a core component for any intrusion detection system that claims to be truly real-time. Signature detection can be done live, but live anomaly detection
10 requires a comprehensive picture of the network environment. Our feature extraction module provides this functionality using feature sketches, which map well onto reconfigurable hardware. We took advantage of pipelining and inherent parallelism in FPGAs to increase throughput. Many network behavior parameters can be monitored using our architecture by making small modifications to the design. These characteristics include flow size, number of open connections, number of un-serviced connection requests, etc. The novelty of our design lies in modifying a single FS row into multiple FS rows to increase the accuracy up to 97.61%, reduce the estimation error to an average of packets, and achieve throughputs up to Gbps for a 16K entry FEM. References [1] Michael Attig, Sarang Dharmapurikar, and John Lockwood. Implementation Results of Bloom Filters for String Matching. In Proceedings of: IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), Napa, CA, April 20-23, [2] Z. Baker and V. Prasanna. Automatic Synthesis of Effcient Intrusion Detection Systems on FPGAs. In Proceedings of FPL'04, [3] Z. Baker and V. Prasanna. Time and Area Effcient Pattern Matching on FPGAs. In Proc. of FPGA [4] Dollas, A. et al., Architecture and Applications of PLATO, a Reconfigurable Active Network Platform. 1999, Department of ECE, Technical University of Crete: Greece. [5] Sarang Dharmapurikar, Praveen Krishnamurthy, Todd Sproull, John W. Lockwood. Deep Packet Inspection Using Parallel Bloom Filters. Symposium on High Performance Interconnects (HotI), Stanford, CA, USA, pp , Aug , [6] Estan, C., and Varghese, G. New directions in traffic measurement and accounting. In Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (2002). [7] Hauck, S., The roles of FPGAs in reprogrammable systems. IEEE, Apr.1998, 86: p [8] B. L. Hutchings, R. Franklin, and D. Carver. Assisting Network Intrusion Detection with Recon gurable Hardware. In Proceedings of IEEE FCCM'02, [9] B. Jenkins, Hash Functions and Block Ciphers, [10] B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, Sketch based change detection: methods, evaluation, and applications, in Proc. of ACM SIGCOMM IMC, [11] Lazarevic, A., et. al: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection, Proc. of 3 rd SIAM Conference on Data Mining, San Francisco, May [12] McHenry, J. T., P. W. Dowd, F. A. Pellegrino, T. M. Carrozzi, and W. B. Cocks. An FPGA-based coprocessor for ATM firewalls. In IEEE Symposium on FCCM, April Napa Valley, CA. [13] S. Muthukrishnan. Data streams: Algorithms and applications, Manuscript based on invited talk from 14th SODA. Available from muthu/stream-1-1.ps. [14] MIT Lincoln Laboratory Darpa Intrusion Detection Evaluation. [15] NetFilter/IPtables: Firewalling, NAT and packet mangling for Linux [16] D. Nguyen, J. Zambreno, and G. Memik. Flow Monitoring in High-Speed Networks with 2D Hash Tables. In Proc. the 14th Annual International Conference on FPL, [17] David V. Schuehler, John W. Lockwood. TCP Splitter: A TCP/IP Flow Monitor in Reconfigurable Hardware. Proceedings of Hot Interconnects 10 (HotI-10), Stanford, CA, August 2002, pp [18] S. Staniford, J. A. Hoagland, and J. M. McAlerney, Practical automated detection of stealthy portscans, Journalof Computer Security, vol. 10, no. 1-2, [19] Vinod Yegneswaran, Paul Barford, and Johannes Ullrich, Internet intrusions: Global characteristics and prevalence, In Proceedings of ACM SIGMETRICS, 2003.
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS Sherif Yusuf and Wayne Luk Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ email: {sherif.yusuf, w.luk}@imperial.ac.uk
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: [email protected] This draft
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Malice Aforethought [D]DoS on Today's Internet
Malice Aforethought [D]DoS on Today's Internet Henry Duwe and Sam Mussmann http://bit.ly/cs538-ddos What is DoS? "A denial of service (DoS) attack aims to deny access by legitimate users to shared services
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Slow Port Scanning Detection
Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
UNITE: Uniform hardware-based Network Intrusion detection Engine
UNITE: Uniform hardware-based Network Intrusion detection Engine S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall John W. Lockwood, Christopher Neely, Christopher Zuver, James Moscola, Sarang Dharmapurikar, and David Lim Applied Research Laboratory
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
How To Understand A Firewall
Module II. Internet Security Chapter 6 Firewall Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 6.1 Introduction to Firewall What Is a Firewall Types of Firewall
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
White Paper FPGA Performance Benchmarking Methodology
White Paper Introduction This paper presents a rigorous methodology for benchmarking the capabilities of an FPGA family. The goal of benchmarking is to compare the results for one FPGA family versus another
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services CS4983 Senior Technical Report Brian Chown 0254624 Faculty of Computer Science University of New Brunswick Canada
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700, Korea [email protected]
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada [email protected] Micaela Serra
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
