NSC E
|
|
|
- Sophia Short
- 10 years ago
- Views:
Transcription
1
2 NSC E
3 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive s, surf the web sites, and chat with friends on the Internet everyday. Unfortunately the Internet is not secure as we more rely on it for personal or business purposes. Malicious probes, stealthy intrusions, and worms spreading happen on the Internet constantly. Undoubtedly security has become one of the most important and urgent issues on the Internet. It must be a common thought of all the Internet users that we need reliable and efficient network services with strong and confident network security. Real-time network traffic monitoring provides the network administrators the status and the patterns of the network traffic and the signs of any possible abnormal traffic and possible potential problems within the administrative domain. During a development of an incident, the attacker might send packets to inquire or collect the detailed information of the target system. In the early stage of spreading, if there is one monitoring system to detect the irregular activities and to gather related information, the network administrators may identify the possible attack through the monitoring and thus can respond to the situation in time to prevent it from getting worse. The audit trail of the network activity can be collected for future investigation, such as what happened, how or why it happened and how to prevent in the future. These logs might be the only evidence of intrusion, in case the victim s logs have been compromised. The network administrators typically use the SNMP-based tools to collect network traffic count from network service equipments like a switch or a router supporting SNMP protocol. These tools usually consist of two components. One, namely the collector, is to collect SNMP data, and the other, the grapher, is to generate HTML formatted output containing traffic loading image which provides a live and visual representation of the network traffic and traffic trends in time-series data of the network. These traditional SNMP-based traffic monitoring tools, such as MRTG [1] and Cricket [2] may provide abnormal warning that there is something strange--an unexpected increase in traffic may indicate that a security incident is being in progress--but SNMP-based tools only provide information about levels and changes in traffic volume. For security purposes, the volume-changing information is insufficient for network administrators to determine whether there is anything wrong with the network and to find out the trouble. Making a judgment needs more detailed data to be provided. Packet sniffers and other packet sniffing related tools are prevalent recently and have been deployed rapidly at present. These tools capture the traffic packets, decode the packet header fields, and even dig into the packet content to provide much more detailed information. Although they can provide details on packet activity, they lack information on the network as a whole. They typically focus on the content of single network packets, not on global network activities, and thus lack high-level support to management activities. 1 This work has been published in FIRST 2005 conference on Computer Security and Incident Handling
4 Timely analysis and storing this usually tremendous volume of traffic data sometimes can be impractical in some environments, especially on large scale and busy networks. Increasing traffic bandwidth and throughput make data capture and analysis more problematic and unstable when the traffic is heavy. There may be a breakdown when the traffic is too heavy to handle with. Furthermore, the purpose of these tools is usually and originally designed for detecting individual attacking event, not for monitoring overall network traffic condition. Accordingly using them for monitoring networks will be awkward and breakable. The most important is that we are unwilling at all to create an artificial bottleneck and uncertain factor in our network for network monitoring and network information gathering. As we described above, the network administrators have realistic and pressing needs of getting more detailed information about the live network than the traditional SNMP-based tools can provide. Furthermore they don t either want to sacrifice performance and stability of the network for using packet sniffing tools. Moreover while worm spreading and DoS attacks have been the most critical problems that network administrators are facing at present time, they should have the capability to detect the puzzle as soon as possible. Consequently we desire to develop a new network monitoring method and even build a practical system for network administrators to help them to examine real time network utilization statistics, look at traffic patterns, and perform early detection of worm propagation and DoS attacks. The Proposed Mechanism and the system We propose a network monitoring mechanism based on NetFlow log. First, the collecting module collects the flow logs exported from NetFlow-supported networking devices, writes the collected flow records into the disk periodically. The statistic module then reads in and perform summarization and produces the visual statistic report on-line. The administrator can understand the current status of the traffic pattern in real time based on the statistic report. The flows will be examined later more thoroughly and comprehensively to see if there is an on-going event. If a suspicious activity is found, the system alerts. The proposed system is illustrated in Figure 1 and the modules will be described in detail below. Figure 1: The proposed system
5 Collecting Module The router groups the records of the expired flows into the NetFlow export UDP datagrams and an exported datagram generally contains several flow records. Hence, the capturing daemon is used to capture the UDP packets, storing the NetFlow records in its internal format, and rotate the records into the disk for further analysis. A fixed amount of disk space is allocated for such storage. Hence, the records are kept and flushed away periodically once the analysis is done. The number of the records might occupy extremely large space, such as tens even hundreds of megabytes in several minutes in a high traffic network. Hence, the length of the period of the analysis would be affected by the disk space and the maximum traffic load of the network. Therefore, the disk size should be carefully chosen to fit in the user and network equirements. To accelerate the speed of the analysis speed on the flow records, a RAM disk could be used to store the flow files temporarily. Access time of RAM disk is much faster than that of a real disk. Statistic Analysis Module The traffic analysis module examines each flow, maintains the counts of the attribute values, and summarizes and stores the statistics into the database. The statistic information during a period of time will be shown in a visual form in web pages, including the number (count) of flows in each protocol (TCP, UDP, ICMP), the count of application ports, the bandwidth consumption per host, and so on. The network administrator can monitor the network with such visual graphs and hence can understand the network performance, bandwidth utilization, application usage distribution and the big talkers. We observe that monitoring the traffic by flows can spot the anomalies more efficiently than that by bytes, since some anomaly might not cause a large variation in traffic volume (in bps), but it could have an impact on flow counts, such as small packet-size DoS attacks. It is also important to watch the TopN service ports and hosts as we could discover which application or host consumes the most bandwidth. A quiet port or host becoming a big talker might be a sign of anomaly. We also found that the summarized information of the selected services ports should be plotted into separate graphs and the anomaly could then be identified more easily. Figure 2 shows a single graph aggregating all the selected services, while Figure 3 shows the same situation with separate graphs. The single aggregating graph suppresses the variation of the counts and might not be able to spot the unusual event through such visual graph. Hence, the proposed system provides separate graphs for the monitored services
6 Figure 2: Graph with aggregation Rule Based Analysis Module Figure 3: Graphs without aggregation Statistic traffic information helps network administrator shorten the management time, but some attacks may need further analysis and reaction in real time. Hence, the proposed system establishes rules to alerts the attacks such as DOS, DDOS, port scan,
7 network scan, and worm. DoS or DDoS attacks often have the pattern of a distributed or a single source IP address sending out similar small packets targeted at a particular host. Hence, the system will collect abnormal amount of the flows with this pattern in a short time. A threshold is set to find the abnormal traffic load. Port scan may produce small packets, SYN or ACK or UDP, from the same source host to the same destination host, while network scan targets to the different hosts on the same network, not different ports on a specific host. The system needs to know the worm behavior a priori to discover the worm activity. Worms usually scans the specific port, such as TCP 80 port, on random targets. The packets and bytes of the flow are usually the same. For example, Slammer worm generates 404 byte packets, destined at UDP 1434 port to randomly generated hosts. We can use these known characteristics on the destination port, packets, and bytes and establish the filtering rules to discover the worm propagation. Results The practical real network, the campus network of the National Sun Yat-Sen University, is used to evaluate the proposed system. The experimental results are shown as follows. The network administrators use to aggregate different data on the same graph to present simultaneously and comparatively, but such data aggregation might make the information obfuscating. As we can see in figure 4, we almost can see no information except TCP protocol traffic variation. Hence, It is practical to show the different protocol on a separate graph. Note that as what we have emphasized repeatedly, it is beneficial to monitor the flow changes rather than bytes. The peaks in of the flow graph shown in Figure 5 illustrate that the ICMP connection burst might indicate a suspicious event was on-going. The network administrator can then query which TopN hosts in that period of time cause that ICMP traffic and may identify the attack host. The proposed mechanism provides the network administrator a visual aid graphs to show the abnormal traffic and a query system to allow the administrator to do further investigation and to identify the attack origin.
8 Figure 4 Traffic volume (in bps) of the IP protocols Figure 5: Flow graph of the ICMP protocol During the experimental time, monitoing the network with a separate flow graph for each well-know service, we observe that a discrepancy flow volume between the incoming and outgoing TCP port 22 (ssh service). A normal connection should consist of two unidirectional flows and the number of the flows in both directions in a network normally would be the same or approximately equivalent. An unbalanced flow volume between the two directions might signal an on-going event. Figure 6 shows the flow graphs in different time intervals, 5 minutes, half hour, two hours, and one day. All of the flow graphs indicate that the outbound
9 flows are exceptionally higher than the inbound flows. Therefore, we explored the raw flow files or query Ntop hosts to see why there were so many unusual flows. We found that several hosts on our network connected to TCP port 22 of a particular host outside continually and repeated. Such traffic pattern indicates a possible DDoS attack on the network. Further investigation or query is needed to spot the attack site Figure 6: Flow graphs of TCP port 22 An intrusion of worm usually goes through a specific port, eg. A vulnerable service, sometimes, so the traffic of the specific port should be monitored. Therefore, we can detect the attacking instances or the worm propagation as soon as possible and can launch countermeasures promptly to defend against. When the Microsoft vulnerability, MS [8], is announced, the traffic through TCP port 443 (HTTPS service) needs to be monitored. During the experimental time, we observe the abnormal traffic from that port as shown in Figure 7.
10 Figure 7: Flow graph of TCP port 443 After exploring the flow records further, we found suspicious scans coming from a single source host, sending to multiple victims of a specific network, and having the same packets and bytes. Such abnormal flow may be generated by an attacking tool or a worm. The proposed system could find the abnormal traffic through the flow graphs showing the real-time traffic statistic information and the further analysis can find the attack site or identify the problem. The administrator can use the pattern to detect other suspicious activities afterwards. According to this collected pattern, then we do discover more and more questionable traffic of the same characteristic spreading on the network. Conclusions Many security events happened on the network nowadays. The administrators seek a solution to shorten the network management time in a large network and to find the malicious activities in progress as soon as possible in order to launch effective and efficient countermeasures to defend against. They often monitor the network by collecting the real time traffic data, but they might find it may be too little or too much information. Too less information might not be able to discover the on-going event, while too much information may require more analysis effort and could not be able to discover the anomaly promptly. The proposed mechanism use flow information to monitor a large network in real-time. Based on the experimental data collected from the real network, campus network of a university, we found that the proposed mechanism based on flow log does help the network administrator monitor a large network in a timely manner and that the flow graphs and the flow records provide enough information for the network administrators to identify suspicious network abuse in a large network. We also discover that separate flow graph for each monitored service is easier to identify anomaly than aggregated flow graph of all monitored services, especially detecting DOS attacks and worm propagation.
11 The proposed mechanism use rule-based approach to filter well-known worm or DOS attack flows. Data mining or artificial intelligent approach may be used to discover the spreading of unknown worms or new DOS attacks from the flow records. 1. Tobias Oetiker, Dave Rand. MULTI ROUTER TRAFFIC GRAPHER, 2. Jeff R. Allen, Cisco White Paper. NetFlow Services and Applications Cisco, NetFlow Services Solutions Guide Dave Plonka, FlowScan: A Network Traffic Flow Reporting and Visualization Tool John-Paul Navarro, Bill Nickless, & Linda Winkler - Argonne National Laboratory, Combining Cisco NetFlow Exports with Relational Database 13. Technology for Usage Statistics, Intrusion Detection, and Network Forensics Daniel W. McRobb, cflowd configuration,
12
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Enabling NetFlow on Virtual Switches ESX Server 3.5
Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and
Computer Technology Department, De La Salle University, 2401 Taft Ave., Manila
Local Area Network Analyzer with Multivendor Support without Agents using Switches (LLAMAS) Kristen Cyril B. Aquino 1, Geanne Ross L. Franco 2, Carlos Javier M. Javier 3, Ria Bianca V. Santiago 4, Dannison
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
WhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
NetFlow Tips and Tricks
NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor
Contents CHAPTER 1 WhatsUp Flow Monitor Overview What is Flow Monitor?... 1 How does Flow Monitor work?... 2 Supported versions... 2 System requirements... 2 CHAPTER 2 Configuring WhatsUp Flow Monitor
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Capacity Management Plan
Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)
Network Traffic Performance & Security Monitoring Project proposal minimal project Orsenna;Invea-Tech FLOWMON PROBES 1000 & 100 Contents 1. Introduction... 2 1.1. General System Requirements... 2 1.2.
Demystifying the Myth of Passive Network Discovery and Monitoring Systems
Demystifying the Myth of Passive Network Discovery and Monitoring Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix.
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Network Monitoring as an essential component of IT security
Network Monitoring as an essential component of IT security White Paper Author: Daniel Zobel, Head of Software Development, Paessler AG Published: July 2013 PAGE 1 OF 8 Contents Introduction... Current
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Network Visibility Guide
Network Visibility Guide Even Superman could only see through walls, not networks! We understand your lack of Network visibility. So we give you ManageEngine NetFlow Analyzer! Network visibility is the
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Traffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Cisco IPS Manager Express
Cisco IPS Manager Express Product Overview Intrusion prevention systems (IPSs) are critical to protecting your network and assets against worms, Trojans, and other malicious attacks. Cisco IPS Manager
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Traffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Take the NetFlow Challenge!
TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
