A survey of Cyber Attack Detection Strategies
|
|
|
- Elfrieda Alisha Fox
- 10 years ago
- Views:
Transcription
1 , pp A survey of Cyber Attack Detection Strategies Jamal Raiyn Computer Science Department Al-Qasemi, Academic College of Education Baqa Alqarbiah, Israel [email protected] Abstract Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virtual networks and can get every home. Nowadays, we consider the homeland security field however we set the cyber attack detection area the highest priority in our research. This paper introduces the overview of the state of the art in cyber attack detection strategies. Keywords: homeland security, cyber attack 1. Introduction The main task of homeland security is to secure the nation from the many threats. Homeland security includes different areas, video surveillance, image detection [1], cyber attack detection and a new homeland security smartphone app. This paper considers the cyber attack detection area. Since exist of the internet society the human life is divided in real world and virtual world. Large number of the people spends their life in virtual world. Many people have misused the internet society. Cyber attacks crime and cyber attacks terror increase exponentially. To save innocent people life we suggest to set ethical rules for virtual world according to real life. Furthermore new security actions are required to protect private life in virtual world. This paper introduces a survey of cyber attacks detection. Cyber attacks are actions that attempt to bypass security mechanisms of computer systems. Cyber attack detection has been defined as the problem of identifying individuals who are using a computer system without authorization and those who have legitimate access to the system but are abusing their privileges. We add to this definition the identification of attempts to use a computer system without authorization or to abuse existing privileges. The paper is organized as follow. Section 2 introduces the review of cyber attacks types and attacks detection strategies. Section 3 introduces cyber attacks detection source in real-time. Section 4 concludes the paper. 2. Cyber Attack Types 2.1. Denial of Service Attacks: Denial of service (DOS) is class of attack where an attacker makes a computing or memory resource too busy or too full to handle legitimate requests, thus denying legitimate user access to a machine. ISSN: IJSIA Copyright c 2014 SERSC
2 Remote to Local (User) Attacks (R2L) A remote to local (R2L) attack is a class of attacks where an attacker sends packets to a machine over network, then exploits the machine s vulnerability to illegally gain local access to a machine. It occurs when an attacker who has the ability to send packets to a machine over a network but who does not have an account on that machine exploits some vulnerability to gain local access as a user of that machine User to Root Attacks (U2R) User to root (U2R) attacks is a class of attacks where an attacker starts with access to a normal user account on the system and is able to exploit vulnerability to gain root access to the system in which the attacker starts out with access to a normal user account on the system (perhaps gained by sniffing passwords, a dictionary attack, or social engineering) and is able to exploit some vulnerability to gain root access to the system Probing Probing is class of attacks where an attacker scans a network to gather information or find known vulnerabilities. An attacker with map of machine and services that are available on a network can use the information to notice for exploit Attacks Detection Strategies Modern cyber attack detection systems monitor either host computers or network links to capture cyber attack data [6] Intrusion Detection Systems (IDS) Host intrusion detection [15] refers to the class of intrusion detection systems that reside on and monitor an individual host machine. Intrusion Detection Systems are categorized into two categories based on detection techniques they use: Misuse Detection/Misbehavior Detection Misuse detectors analyze system activity, looking for events or sets of events that match a predefined pattern of events that describe a known attack. Misuse detection technique is the most widespread approach used in the commercial world of IDSs. The basic idea is to use the knowledge of known attack patterns and apply this knowledge to identify attacks in various sources of data being monitored. Therefore, misuse detection based IDSs attempt to detect only known attacks based on predefined attack characteristics Signature based Approach Signature based approach of misuse detection works just similar to the existing anti-virus software. In this approach the semantic characteristics of an attack is analyzed and details is used to form attack signatures. The attack signatures are formed in such a way that they can be searched using information in audit data logs produced by computer systems Anomaly Detection Anomaly detectors identify abnormal unusual behavior on a host or network [7]. They function on the assumption that attacks are different from legitimate activity and can therefore be detected by systems that identify these differences. Using statistical method for anomaly detection is one of the oldest techniques applied in IDS research. In this approach, the normal user behavior is first defined based on what is acceptable within the system usage policies. 248 Copyright c 2014 SERSC
3 [16] applied a statistical modeling technique, a Hidden Markov Model (HMM), on system calls to detect anomalous intrusions. To determine various state transitions that a special UNIX based process goes through from the start to the end, they collected all the system calls specific to that process and applied these system calls to a HMM. Using these state transition sequences, they built database of normal sequences and then monitored system call sequences against this database to detect anomaly Analysis Approach Currently there are three basic approaches to cyber attack detection. The CADS uses its analysis engine to process this data in order to identify cyber attacks. Modern systems primarily employ three approaches to perform this analysis: Misuse/misbehavior: Misuse (signature) detection is based on the knowledge of system vulnerabilities and known attack patterns. Misuse detection is concerned with finding intruders who are attempting to break into a system by exploiting some known vulnerability. Ideally, a system security administrator should be aware of all the known vulnerabilities and eliminate them. Artificial Immune System The Biological immune system (BIS) [11] can quickly recognize and detect the presence of foreign microorganisms in the human body. It is remarkably efficient, most of the time, in correctly detecting and eliminating pathogens such as viruses, bacteria, parasites, and in choosing the correct immune response.when confronted with a pathogen, the BIS relies on the coordinated response from both of its two vital parts: the innate system: the innate immune system is able to recognize the presence of a pathogen or tissue injury, and is able to signal this to the adaptive immune system. The adaptive system: the adaptive immune system can develop during the lifetime of its host a specific set of immune responses. For an immune reaction to occur, it is necessary that i) a cell has been classified as a pathogen and ii) this cell could cause some damage to the human organism. This means that the BIS is only reactive with infectious cells, i.e., with pathogens that can indeed cause harm. This demonstrates that a two-way communication, hereafter referred to as co-stimulation, between the innate and adaptive immune systems is common [10, 12]. In the subsequent sections we will introduce and evaluate an approach inspired by the interplay between the innate and adaptive immune system. The goal of this approach is to help suppress false positives and at the same time achieve energy efficiency. The early work in adapting the Biological Immune System to networking has been done by Stephanie Forrest [13]. In one of the first BIS inspired works, Hofmeyr and Forrest [13] described an AIS able to detect anomalies in a wired TCP/IP network. Sarafijanovi c and Le Boudec [8] introduced an AIS for misbehavior detection in mobile ad hoc wireless networks. They used four different features based on the network layer of the OSI protocol stack. They were able to achieve a detection rate of about 55%; they only considered simple packet dropping with different rates as misbehavior. An AIS for sensor networks was proposed by Drozda et al., in [13]. The implemented misbehavior was packet dropping; the detection rate was about 70%. Copyright c 2014 SERSC 249
4 Anomaly It assumes that a cyber attack will always reflect some deviations from normal patterns. Anomaly detection may be divided into static and dynamic anomaly detection [8]. A static anomaly detector is based on the assumption that there is a portion of the system being monitored that does not change. Usually, static detectors only address the software portion of a system and are based on the assumption that the hardware need not be checked. The static portion of a system is the code for the system and the constant portion of data upon which the correct functioning of the system depends. For example, the operating systems, software and data to bootstrap a computer never change. If the static portion of the system ever deviates from its original form, an error has occurred or an intruder has altered the static portion of the system. Therefore static anomaly detectors focus on integrity checking. Dynamic anomaly detection typically operates on audit records or on monitored networked traffic data. Audit records of operating systems do not record all events; they only record events of interest Classification of Cyber Attacks The attacker will expect the process to be harmonized in order to infect the system. Synchronization of the steps involved to steal the information leads them to achieve what they expect. The hackers will get their result in time, in step and in their line. An organized form of the methods will be used by the attacker or hacker lead to infect the system very easily. The usage of logically organized methods leads them to get more efficient results. The attacks are regimented with perfect sequence and in such a way that the resulting damage is severe enough to compromise the working of the organization [3-4]. Reconnaissance Attacks Type of attack which involves unauthorized detection system mapping and services to steal data Access Attacks An attack where intruder gains access to a device to which he has no right for access. Denial of Service Intrusion into a system by disabling the network with the intent to deny service to authorized users Denial of service (DOS) is class of attack where an attacker makes a computing or memory resource too busy or too full to handle legitimate requests, thus denying legitimate user access to a machine. Cyber crime The use of computers and the internet to exploit users for materialistic gain Cyber espionage The act of using the internet to spy on others for gaining benefit. Cyber terrorism The use of cyber space for creating large scale disruption and destruction of life and property. Cyber war The act of a nation with the intention of disruption of another nations network to gain tactical and military. Active Attacks An attack with data transmission to all parties thereby acting as a liaison enabling severe compromise. Passive Attacks An attack which is primarily eaves dropping without meddling with the database Malicious Attacks An attack with a deliberate intent to cause harm resulting in large scale disruption. Non Malicious Attacks Accidental attack due to mis-handling or operational mistakes with minor loss of data. Attacks in MANET Attacks which aims to slow or stop the flow of information between the nodes Attacks on WSN An attack which prevents the sensors from detecting and transmitting information through the network. 250 Copyright c 2014 SERSC
5 2.5. Offered Solutions Embedded Programming Approach In this method some parts of the processing is performed prior to the CADS. This preprocess will significantly reduce the processing load on the CADS and consequently the main CPU. [4] has reported a similar work by programming the Network Interface Card (NIC). This approach can have many properties including lower computational traffic and higher performance for the main processor. Implementing this approach will make it easier to detect variety of attacks such as Denial of Service (DoS) attack. This is because the NIC is performing the major part of the processing while the main processor only monitors the NIC operation Agent based Approach In this approach, servers can communicate with one another and can alarm each other. In order to respond to an attack, sometimes it can be sufficient enough to disconnect a subnet. In this type of system in order to contain a threat, the distributed CADS can order severs, routers or network switches to disconnect a host or a subnet. There are two approaches in implementing an agent based technology. In the first approach, autonomous distributed agents are used to both monitor the system and communicate with other agents in the network. A Multi- agent based system will enjoy a better perception of the world surrounding it. Zhang et al. [9] report implementing a multi-agent based CADS where they have considered four types of agents: Basic agent, Coordination agent, Global Coordination agent and Interface agents. Each one of these agents performs a different task and has its own subcategories Software Engineering Approach The programming language with its special components will improve the programming standard for the CADS code. CADS developers can enjoy the benefits of a new language dedicated to the CADS development. Such a language will improve both the programming speed and the quality of the final code [10] Artificial Intelligence Approach Researchers have proposed application of the fuzzy logic concept into the cyber attack detection problem area. Some researchers even used a multi disciplinary approach, for example, Gomez et al., [16] have combined fuzzy logic, genetic algorithm and association rule techniques in their work. [4] Reports a work where fuzzy logic and Hidden Markov Model (HMM) have been deployed together to detect cyber attacks Cyber Attack Detection in Cloud Developing cyber attack detection strategy in cloud computing service environment should serve the cloud user and cloud providers [5, 9, 14] have introduced a Cloud Intrusion Detection System Service to save the client from cyber attacks. The Cloud Intrusion Detection System Service is divided into three components: Intrusion Detection Service Agent: Intrusion Detection Service Agent: The agent is integrated inside the user network to collect necessary information. According to the location of the agent, the CIDSS could protect a segment of the network or the whole network. Cloud Computer Service Component, collects messages from agents. It formats all messages and send them to the IDSC according to grouping constrains defined for messages. A secure connection path should be established by CCSC to absorb information gathered by agents. Intrusion Detection Service Component Copyright c 2014 SERSC 251
6 (IDSC) is responsible for intrusion detection. There are four sub components playing major rule in IDSC Cloud Intrusion Detection Service Requirements There are a number of challenges that must be considered when implementing CIDSS. Some of these challenges are inherent in what an IDS does and others are simply part of the way that a network is configured. 3. Detecting a Cyber-attack Source in Real-Time Traditional cyber attacks detection involving cyber defense has limitations. The main limitation of misuse detection based IDSs is that they only can detect known attacks accurately. They are unable to detect previously unseen attacks or novel attacks. Moreover, predefine attack specification has to be provided to the IDS for misuse detection, which requires human security experts to manually analyze attack related data and formulate attack specifications. Attack specification can be generated automatically by applying various automated techniques. Most of the misuse detection systems lack this capability. Most of the systems focus on data produced by single source. Desired features for the cyber attack detection system depend on both the methodology and the modeling approach used in building the cyber attack detection system System Model System model infrastructure is divided into cyber attack detection and cyber immune system as illustrates Figure 1. The proposed cyber attack detection is based on adaptive agent. The cyber immune system is based on behavior analysis. The Cyber Attack Detection and Cyber Immune System (CAD&CIS) is divided into four main layers: i. Home agent for monitoring: ii. iii. Social agent for suspect objects detection: Mobile Agent for tracking of suspect objects: The Home Agent aims to monitor and control the CAD&IS units. The CAD&IS units include the CAD&IS components and the offered cloud computing services. Home agent is responsible for legal access users. Social Agent senses the dynamic traffic in the environment. Based on the traffic behavior analysis, the social agent detects the cyber attacks. Social agent makes his decision based on historical information and based on current information. The Mobile Agent has two tasks: The first task is to search suspects object and to update the CAD&CIS. The second task is to track the suspect objects. 252 Copyright c 2014 SERSC
7 3.2. Methodology Figure 1. CAD&CIS Infra Structures Today hundreds of millions of cell phones use GPS and/or WiFi-based technology to support fine-grained location. Tracking exact location (coordinates from GPS or Wi-Fi tracking, postal addresses) is found to be the top concern. In this paper we use the IP address to track exact geographic location of users. Figures 2 and 3 illustrate the CAD & CIS methodology. Figure 2 describes the home agent task. Home agent task is summarized in identification and tracking of our websites visitors. Figure 2. IP tracking Process Figure 3 illustrates social agent task. Social agent monitors the new users activities. Copyright c 2014 SERSC 253
8 Figure 3. User s Activity Tracking Mobile agent aims to follow suspect targets over the internet network. Mobile agent uses multiple strategies to carry out the tracking process as shown in Figure 4. For the CAD & CIS it is necessary to collect information security tools. 4. Conclusion Figure 4. Roaming Process This paper introduced and discussed different cyber attack detection strategies. We have carried out comparison and analysis between different cyber attacks strategies. Cyber attack techniques have been improved dramatically over time, especially in the past few years. Developing new cyber attack detection schemes is necessary because cyber attackers develop their strategies continuously too. Information fusion from multiple sources required intelligence techniques to characteristic the cyber attackers. It seems that traditional cyber attacks detection schemes may prevent cyber attackers temporary and partial. To overcome the lack of traditional cyber attacks detection schemes we propose new scheme for real-time and short-term response to actual attacks. 254 Copyright c 2014 SERSC
9 References [1] D. H. Ballard and C. M. Brown, Computer Vision, Prentice-Hall, Englewood Cliffs, NJ, (1982). [2] A. C. Bovik, T. S. Huang and D. C. Munson, Jr, The effect of median filtering on edge estimation and detection. IEEE Trans. Pattern Anal. Mach. Intell., PAMI-9, (1987), pp [3] M. Uma and G. Padmavathi, A Survey on Various Cyber Attacks and their Classification, International Journal of Network Security, vol. 15, no. 6, (2013), pp [4] S. Singh and S. Silakari, A Survey of Cyber Attack Detection Systems, IJCSNS International of Computer Science and Network Security, vol. 9, no. 5, (2009) May, pp [5] A. Zarrabi and A. Zarrabi, Internet Intrusion Detection System Service in a Cloud, International Journal of Computer Science Issues, vol. 9, is. 5, no. 2, (2013), pp [6] K. R. Karthikeyan and A. Indr, Intrusion Detection Tools and Techniques A survey, International Journal of Computer Theory and Engineering, vol. 2, no. 6, (2010), pp [7] A. C. Kim, W. H. Park and D. H. Lee, A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals, International Journal of Network Security, vol. 7, no. 1, (2013), pp [8] K. Lee, Security Threats in Cloud Computing Environments, International Journal of Security and Its Applications, vol. 6, no. 4, (2012), pp [9] A. Zarrabi and A. Zarrabi, Internet Intrusion Detection System Service in a Cloud, International Journal of Computer Science Issues, vol. 9, is. 5, no. 2, (2012), pp [10] M. E. Kuhl, J. Kistner, K. Costantini and M. Sudit, Cyber Attack Modeling And Simulation For Network Security Analysis, Proceedings of the 2007 Winter Simulation Conference, pp [11] A. Fuchsberger, Intrusion Detection Systems and Intrusion Prevention Systems, Information Security Technical Report, ELSEVIER, (2005), pp [12] C. S. Dangi, R. Gupta and G. S. Chandel, Cyber Security Approach in Web Application using SVM, International Journal of Computer Application, vol. 57, no. 20, (2012), pp [13] S. Schaust and H. Szczerbicka, Artificial Immune Systems in Context of Misbehaviour Detection, International Journal of Cybernetics and Systems: Special Issue on Smart Future of Knowledge Management, Taylor and Francis, vol. 39, no. 2, (2008), pp [14] J. H. Eom and M. W. Park, Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing, International Journal of Security and Its Applications, vol. 7, no. 1, (2013), pp [15] D. Stiawan, A. I. Shakhatreh, M. Y. Idris, K. A. Bakar and A. H. Abdullah, Intrusion Prevention System: A Survey, Journal of Theoretical and Applied Information Technology, vol. 40, no. 1, (2012), pp [16] J. Gomez and D. Dasgupta, Evolving Fuzzy Classifiers for Intrusion Detection, Proceeding of the IEEE Workshop on Information Assurance, United States Military Academy, (2001) June. Author Jamal Raiyn received the MS degree in mathematics and computer science from Hannover University in Germany, in 2000 and he finished the PhD study at Leiniz university of Hannover in Germany. In June 2010 he finished his Postdoctoral at the Technion in Israel. Since September 2002 till now, he is Assistant Professor in computer science department at the Al-Qasemi Academy in Israel. Since 2010 he is the head of computer science department at Alqasemi College in Israel. Since 2013 is member of EU ICT COST Action IC1304. Copyright c 2014 SERSC 255
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Wireless Intrusion Detection Systems (WIDS)
Systems (WIDS) Dragan Pleskonjic CONWEX [email protected] [email protected] Motivation & idea Wireless networks are forecasted to expand rapidly (Wi-Fi IEEE 802.11a/b/g ) WLANs offer
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
A Review on Intrusion Detection System to Protect Cloud Data
A Review on Intrusion Detection System to Protect Cloud Data Shivani Arora 1, Rajesh Kumar Bawa 2 M.Tech Student 1, Associate Professor 2 Department of Computer Science, Punjabi University Patiala 1, 2
Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford
Intrusion Detection Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford For this term paper I will be discussing the subject of Intrusion detection. I will be going
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
A Review on Intrusion Detection System based on Artificial Immune System
A Review on Intrusion Detection System based on Artificial Immune System Pavitra Chauhan Nikita Singh Nidhi Chandra ABSTRACT Various approaches from different fields have been proposed to improve the security
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Self-Defending Approach of a Network
Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Securing Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
