Visual Correlation of Network Alerts

Size: px
Start display at page:

Download "Visual Correlation of Network Alerts"

Transcription

1 Visualization for Cybersecurity Visual Correlation of Network Alerts Stefano Foresti, James Agutter, Yarden Livnat, and Shaun Moon University of Utah Robert Erbacher Utah State University Society s dependence on information systems has made cybersecurity an increasingly important issue. Computer networks transport financial transactions, sensitive government information, power plant operations, and personal health information. The spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Of particular concern is the identification of sophisticated attacks. Naive attacks are easily detected and have small likelihood of success for instance, system administrators and The VisAlert visual network analysts aren t very concerned with script kiddies or unsophisticated vulnerability exploits correlation tool facilitates because intrusion detection systems situational awareness in (IDSs) readily detect them. Port scans are another example. These complex network attacks try to identify the services running on a system by sending network packets to that service (a spec- environments by providing ified network port). A naive scan a holistic view of network uses simple TCP connect packets sent as quickly as possible. An IDS security to help detect can easily detect port scans because of their close proximity in time and malicious activities. high volume. Sophisticated attacks are harder to detect because they use stealthy mechanisms and more capable techniques. A sophisticated port scan can use alternatives to TCP connect packets or dilute the scan over time such that there is a delay of 0.4 seconds, 15 seconds, 5 minutes, or even longer between packets. This delay prevents easy algorithmic identification and can cause activities to be lost in the noise. IDSs analyze network traffic and host-based processes in an attempt to detect malicious activity. When they identify anomalous activity or activity matching known malicious activity, these systems generate an alert to notify the administrators or analysts of their impending doom. Each alert identifies the threat type using the alert type classification system. IDSs often store these in stove-piped databases that aren t easily correlated to other or logs on the network. Thus, network analysts must use a myriad of tools that show different information in different formats, making it difficult for them to gain an overall understanding of the network s security status. The high rate of false positives that these systems generate compounds this complexity. Because attacks are dynamic, if analysts can t absorb and correlate the available data, it s difficult for them to detect sophisticated attacks. Developing tools that increase the situational awareness and understanding of all those responsible for the network s safe operation can increase a computer network s overall security. System administrators are typically limited to textual or simple graphical representations of network activity (Bejtlich 1 describes many available capabilities and their applications). Information visualization techniques and methods in many applications have effectively increased operators situational awareness, letting them more effectively detect, diagnose, and treat anomalous conditions. 2 A growing body of research validates the use of visualization to solve complex data problems 3-5 (see the Previous Work sidebar). Visualization elevates information comprehension by fostering rapid correlation and perceived associations. To that end, the display s design must support the decision-making process: identify problems, characterize them, and determine appropriate responses. It must also present information in a way that s easy for the user to process. Our visualization technique integrates the information in log and alert files into an intuitive, flexible, extensible, and scalable visualization tool VisAlert that presents critical information concerning network activity in an integrated manner, increasing the user s situational awareness. Objectives and assumptions We based our research and development on several premises to ensure that visualization for cybersecurity reflects the needs of operational environments. In general, the visualization techniques must be scalable, robust, and effectively and intuitively represent the data and relationships that are relevant to decision making. The objective is to overcome the limitations of existing 48 March/April 2006 Published by the IEEE Computer Society /06/$ IEEE

2 Previous Work Historically, visualization has been applied to network monitoring and analysis, primarily for monitoring network health and performance. Initial visualization techniques for intrusion detection system (IDS) environments focused on simple scales and color representations to indicate state or threat level. The need for better analysis mechanisms for security and IDS-related data has motivated the exploration of more advanced visualization techniques. Many of these techniques effectively visualize malicious activities such as worm or denial-of-service (DoS) attacks. However, these visualization techniques tend to focus on specific problems rather than general alert correlation for an entire enterprise. Other techniques have focused on visual pattern matching that is, the representation of known attacks. Teoh et al. 1,2 analyze worms and other large-scale attacks on Internet routing data. Similarly, McPherson et al. 3 developed a technique for visualizing port activity that s geared toward monitoring large-scale networks for naive port scans and DoS attacks. Yin et al. 4 and Lakkaraju et al. 5 focus on representing netflows and associated link relationships. Such techniques are critical for analyzing attacks and IDS data, but they quickly suffer scalability issues and are limited as to the number of representable parameters. Wood 6 describes basic graph-based visualization techniques, such as pie charts and bar graphs, and how analysts can apply them to typical network data available to all system administrators. This work describes how users can implement visualization and apply it to such data, as well as the meaning behind the identified results. The technique is limited only in the visualization s simplicity, which currently can t analyze the high-volume, high-dimensional data generated by today s environments. This remains a major challenge for IDS data analysis in general. Traditional representations and network alert-reporting techniques tend to use a single sensor-single indicator display paradigm. Each sensor uniquely represents its information (indicator) and doesn t depend on information gathered by other sensors. The benefit of such an approach lies in the separation of the various sensors. The user can thus optimize each sensor s indicator for the data it produces, and then can choose which sensors to use in an analysis. Furthermore, the failure of one sensor doesn t impact the rest of the system s capability. Consequently, the separation between sensors is also the weakness of this representation technique. Because each indicator is isolated, the user must observe, condense, and integrate information generated by the independent sensors across the entire enterprise. This process of sequential, piecewise data gathering makes it difficult to develop a coherent, real-time understanding of the interrelationship between the information being displayed particularly the identification of malicious attacks. References 1. S. Teoh et al., Case Study: Interactive Visualization for Internet Security, Proc. IEEE Conf. Visualization, IEEE CS Press, 2002, pp S. Teoh, K. Ma, and S. Wu, Visual Exploration Process for the Analysis of Internet Routing Data, Proc. IEEE Conf. Visualization, IEEE CS Press, 2003, pp J. McPherson et al., Portvis: A Tool for Port-Based Detection of Security Events, Proc. CCS Workshop Visualization and Data Mining for Computer Security, ACM Press, 2004, pp X. Yin et al., Vis-Flowconnect: Netflow Visualizations of Link Relationships for Security Situational Awareness, Proc. CCS Workshop Visualization and Data Mining for Computer Security, ACM Press, 2004, pp K. Lakkaraju, W. Yurcik, and A. Lee, NVisionIP: Netflow Visualizations of System State for Security Situational Awareness, Proc. CCS Workshop Visualization and Data Mining for Computer Security, ACM Press, 2004, pp A. Wood, Intrusion Detection: Visualizing Attacks in IDS Data, Global Information Assurance Certification (GIAC) Practical, SANS Inst., cybersecurity tools and visualizations that focus on narrow problems, work on small data sets, or don t effectively map to the human visual and decision-making processes. To this end, our premises include: Analyst involvement. We worked with security analysts with experience in large government networks. Their continual interactive involvement has ensured our work s value and validity and thus a good fit between problem and solution, based on user needs. Realistic data. We developed a realistic scenario to validate the design and used simulated data for testing. Data size and completeness. The visualization handles an organization s subnets and hosts, numerous data sets, and disparate relationships across multiple logs. Our scalability solution has widespread applicability in visualization research. Holistic view. Providing a visual holistic view of the network s status the least fulfilled need in state-ofthe-art technology helps analysts quickly decide how pervasive and severe problems are, and how to direct further attention. Environment extensibility. We gave users the ability to add new data sources, alert types, attack signatures, and data views, as well as to enrich the visualization with user suggestions. Our goal is to aid analysts decision making by providing a visual correlation mechanism. We don t try to solve the entire intrusion-detection problem, nor do we aim to make decisions for the user. Interdisciplinary design process We employed a user-centered interdisciplinary methodology 6 for developing information displays that promotes design as a function of human behavior and interaction between subject and object. We drew our research techniques from several disciplines, including IEEE Computer Graphics and Applications 49

3 Visualization for Cybersecurity Team Information architecture Analysis Problem space analysis Mental model analysis Data analysis Design Conceptual representation scheme Scenario representation Refinement solid task analysis at the onset tend to be consistently more useable, lead to better human performance, and require less training. 10 In the study, we used the knowledge of intrusiondetection analysts, network administrators, and security-assessment professionals. The goal of the analysis is to ensure that the intended users will find the visualizations meaningful and intuitive, identify the components from a list of alternatives, and extract useful information from the domain-specific design. To achieve an understanding of the user s mental model, we Team User interaction Usability testing Design evaluation protocol Implementation Refinement Refinement performed background analysis, including a literature review and informal consultations with researchers; conducted semistructured interviews with administrators, security analysts, and decision makers; made unstructured naturalistic observations of problem solving; and organized and reported the data into workflow diagrams. Computer science Cognitive psychology Technical representation assessment Prototype development Formal testing High-fidelity simulation During the domain analysis, we attempted to gain understanding in these key areas: rules of thumb or tricks of the trade that guide reasoning; empirical knowledge gained by experience, drawing on laws and relationships; expert s overall model of the problem; and tasks, including control, prediction, diagnosis, planning, monitoring, instruction, and interpretation. Company Success 1 Interdisciplinary design methodology using techniques from cognitive psychology, architecture and design, and computer science. architecture, cognitive psychology, and computer science (see Figure 1). We loosely based our design approach on Snodgrass and Coyne s hermeneutical circle concept, 7 which is an iterative process of implementing a design, learning and understanding from discussion and feedback, and subsequently refining the design. Domain analysis Our domain analysis study aims to identify the most important objects and operations in the chosen domain, these objects attributes, the relationships among objects, and how people in the domain interact with them. 8 The result is a conceptual model representing the system scenarios and the functional relationships and criticality among variables, whether objective or subjective (in the user s mental model). This is necessary to design the software and the visual displays that fulfill a group of people s needs for a particular purpose. 9 Systems that have been designed or modified with a We ll submit the specifics of the procedure used for domain analysis and the details of the cognitive analysis studies to a cognitive and human-factor studies publication. Decision-making process The domain analysis work identified six discrete steps in the decision-making process. These steps identify critical areas where analysts need additional support, and where visualization can provide the greatest benefit. 1. Identify an incident related to the computer network that the individual is responsible for (that is, detect that an incident occurred). 2. Evaluate the incident to see if it s a benign alarm or an indication that further investigation is needed (that is, is the detected incident suspicious?). 3. Determine how prevalent the problem is and what else is being affected. The analyst determines the problem s boundaries by analyzing other information to gain knowledge about the problem s criticality. Analysts also explore what other machines are experiencing these problems. 4. Drill down data to identify patterns and test hypotheses. The analyst tests multiple hypotheses with detailed information about the questionable matter. 5. Report and mark results to communicate information to others. After identifying a problem, the ana- 50 March/April 2006

4 Network flow data Size Protocol Port IP address Heuristic knowledge External information Query: view 20 suspicious source IP s flow data Hint from Jonzy: 20 suspicious source IP s sending too much Suspicious source IP isolated by previous experience; others were legitimate Contacts suspicious source IP user Check suspicious source IP flow Destination IP not in use Machine is probably compromised and sends large amounts of Port scan on suspicous IP: blocked by firewall Check protocols used by suspicious source IP Discovers protocols not frequently used Internet storm center states protocol is increasingly dangerous Will check change tomorrow; will repeat process 2 A portion of the network analysts workflow diagram resulting from the domain analysis. lyst records and describes it within the larger context. 6. Direct a response. The analyst directs the responsible individuals to respond appropriately to the problem. Figure 2 shows the workflow diagram section resulting from the domain analysis. These workflow diagrams help designers determine the most relevant information to visualize different stages of the decision-making process. Relevant factors in data analysis and user requirements The domain analysis work also let us identify the data analysis priorities and process. Our relevant findings include: A false-positive alert shouldn t appear correlated to other, but a sustained attack will likely raise several. Furthermore, real attack activities will likely generate multiple of different types. Users need a primary view of the destination IPs in their network of responsibility. The source IP might become an object of interest and investigation after they detect a problem. Detecting potentially dangerous attacks requires the query and correlation of enterprise-wide large data sets. Users want access to all sorts of data, but need the capability to filter and remove clutter. Our findings provided guidelines and priorities for designing the visualization. Visualization design The first step in the design phase is to develop a set of visual metaphors and descriptors along with rules defining why, how, and where to use each descriptor. The objective is to represent information by exploiting perceptual abilities innate to human beings and embedding them into a set of objects graphic properties, behaviors, and relationships. We use basic 2D and 3D design principles such as mapping data values to 1D, 2D, and 3D geometrical primitives; IEEE Computer Graphics and Applications 51

5 Visualization for Cybersecurity When determined that must possess what we term the W 3 premise: the when, where, and what attributes. This concept lets us visually correlate multiple. When refers to the point in time at which the alert occurred. Where refers to the local network node for example, an IP address that the alert pertains to. What refers to an indication of the alert type for example, ($log = snort, gid = 1, sid = 103$). Where 3 The VisAlert W 3 visualization concept: a line connecting an alert type (what) at time (when) to a resource (where) represents an alert instance. What assigning graphic attributes such as color and texture; using graphic associations such as proximity, location, similarity, and contrast; and assigning transformations such as changes in the design geometry or organization. For instance, the application of perceptual grouping (using color, similarity, connectedness, motion, sound, and so on) can facilitate the understanding of the relationships between individual pieces of data. Proper presentation of information also affects the speed and accuracy of higher-level cognitive operations. Modern human factors theory suggests that for effective data representation we must present information in a manner consistent with the user s perceptual, cognitive, and response-based mental representations. When the information is consistent with cognitive representation, performance is often more rapid, accurate, and consistent. Conversely, failure to use perceptual principles appropriately can lead to erroneous information analyses. It s therefore imperative that we present information in a manner that facilitates the user s ability to process it and minimizes any mental transformations that must be applied to the data. This qualitative filtering and depiction of information toward achieving a clear end essentially constitutes representation design. 11,12 W 3 concept The main problem in correlating from disparate logs is the seeming lack of mutual grounds on which to base any kind of comparison between. We ve We typically correlate based on their when or what attributes. If we group the based on their what attributes, we correlate them within their groups based on additional attributes associated with that attribute. However, the alert s real value relates to the local resources it pertains to. Preserving the resources status and integrity is in fact an IDS s main focus. The what and when attributes have little if any inherent value by themselves. Consequently, visually correlating with respect to resources is the key factor of this work. A discussion of prior work and issues of correlating is available elsewhere. 13 The need to correlate the who attribute is secondary in the decision-making process. Using the W3 concept lets us simplify the representation, considering the visual clutter that would arise from such a huge domain as remote IPs. We can thus concentrate on the local resources, which are what analysts try to protect. However, we incorporate the who to obtain a full representation of who, when, where, and what (W4) using the virtual log, which we describe later. Visualization concept Figure 3 shows our design layout, which maps an alert s where attribute into the center of the circle. We represent this using a topology map of the network under scrutiny. The layout maps an alert instance s what attribute to the different sections of the outside circular element. This arrangement allows for flexibility with regard to the number of alert types as well as easy integration of new alert types. The layout maps the when attribute of an alert instance to the circle s radial sections, moving from most recent (closest to the topology map) to the least recent as it radiates outward. We can now visualize alert instances as lines from ρ(what, when) (angle, radius) on the outer ring, to Ψ(where) (x, y) in the inner circle, where ρ and Ψ are general projections of the into our two domains. Our system lets the user dynamically control and configure these two projections as necessary. To reduce the possible visual clutter when showing all simultaneously, we divide the when space into varying intervals and show only the alert instances for the most recent history period. The remaining history periods show only the number of alert instances that occurred during that period. Additional visual indicators We incorporated additional visual indicators that encode information to increase the user s situational 52 March/April 2006

6 awareness. In the design s first iterations, we used color to identify alert classifications. In current display implementations, color indicates that user-determined thresholds have been exceeded. For instance, red indicates high priority, while green indicates low priority. We ve also adopted a method of increasing the icon size for nodes experiencing several. The assumption is that a resource or node on the topology that s experiencing multiple unique from both host- and network-based sources has a higher probability of malicious activity than one experiencing only one alert. A scan of a particular machine is an example. Although the scan might generate a Snort alert, the activity might be benign; however, a standard IDS will catch this simple probe and reject the traffic. If, on the other hand, a machine is receiving a Snort alert in addition to a Windows log alert, that machine might be experiencing an intrusion attempt or even a successful attack. The node s size is a clear indicator and easily distinguishes the node from other machines, thus attracting the attention of the user, who can correct the problem on the suspect machine. The alert beams encode a problem s persistence. If many of the same are triggered on a particular machine over a given time interval, the line thickens to show the number of (see Figure 4). In this manner, continual or recurring problems quickly become evident, letting the user take swift action. A beam s color encodes the alert s severity when available for example, Snort associates a severity level with each alert. Thus, more severe problems become immediately distinguishable from other. Visual filters VisAlert provides many ways to filter the data to reduce visual clutter or help network analysts focus on particular events of interest. Users can turn the alert beams on and off globally, resulting in small lines indicating which alert has been triggered on the particular nodes using color and orientation. Users can selectively turn particular alert beams on or off by clicking the desired beam. Users can turn alert groupings and individual on or off through a dialog box. This can help users fine-tune the display to show only that are relevant and of high priority to their organization, eliminating many instances they would otherwise observe. In addition, users can filter the data to show machines experiencing a certain number of alert types, with specific IP ranges, experiencing the same, or that have the same outside IP associated with them or a particular alert. Simulated attack scenario We used a simulated attack scenario to validate the display s efficacy prior to implementation. The sequence of the images in this scenario shows how a malicious attack emerges out of the background noise in our visualization design, helping users to rapidly detect and identify the attack. The attacks consisted of exploiting a vulnerable host to gain access to more secure machines. A security assessment expert developed the scenario. He generated an attack using different methods and broke Where When 4 VisAlert exhibiting multiple and additional relevant visual indicators, including alert type using color coding, larger node size showing more alert types, and larger beam size for persistence of a particular problem. the attack into different stages. To add sufficient noise, we fed this information into a data set polluted with other network traffic. We characterize this scenario as an external attacker with five distinct stages. During the five stages, as it moves from normal network activity to data exfiltration, the visualization will show how the node under attack slowly emerges out of the background because of the number of types of it receives. Stage 1: reconnaissance Reconnaissance is the identification of hosts and services on a targeted network. This form of reconnaissance often involves simple Web queries, social engineering, and dumpster diving. Figure 5 (next page) shows the network s status during the reconnaissance stage. Given the attacker s lack of presence on the network, this can also be considered normal network activity with multiple instances of Snort tripped at a particular time. In this initial attack stage, the attacker is generally passive with respect to the network. At this time, identifying an attack in the noisy normal network activity is unlikely. Stage 2: probe In this context, a probe is an attacker s attempt to gather information about services on a targeted host or hosts discovered during the reconnaissance phase. Analysts could see the Internet Protocol Communication (IPC) violations during this phase because of a particular Snort alert that was tripped on a machine on their What IEEE Computer Graphics and Applications 53

7 Visualization for Cybersecurity Snort Checksum Window event 5 In stage 1, the attacker is doing reconnaissance that is, looking for hosts and services on the network. VisAlert exhibits normal activity. Snort Checksum Window event 6 In stage 2, the attacker probes the network. VisAlert exhibits persistence of an alert on a host. Simultaneously, the attacker triggers a second alert type. network topology. An IPC violation occurs when a connection attempts to violate defined TCP or IP interface FTP FTP HTTP HTTP requirements. This often indicates a forged packet that is, an attacker created a packet not conforming to a proper connection. This could indicate an attempt to hijack a session, scan a system, or attack a vulnerability. The line s thickness indicates the persistence of the same Snort alert over time. A persistent Snort alert indicates its recurrence. This is typical of naive scans in which an attacker begins scanning a sequence of ports on a single or multiple machines. In this case, the attacker has targeted a single host with a long-running scan. Such a scan can not only identify what services are running but can also potentially identify what version of the services are in use, as well as the version of the operating system. An attackers can use this type of detailed information to identify detailed vulnerabilities for known attacks that is, it can identify a version of a service with a known buffer-overflow vulnerability. The environment s extensibility lets the visualization represent any alert, no matter what instrument generated it. In other words, if a new instrument generates other types of, VisAlert can directly incorporate its results through a plug-in architecture. Figure 6 shows a probe and a connection (correlation) between the IPC interface (shown with a higher-priority Snort alert) and a Windows VMTools alert. Such a correlation between events indicates a progressing attack. Stage 3: attack In this context, an attack on a vulnerable system is an attempt to gain unauthorized access to a network host, usually by exploiting a vulnerable network service. We captured several attacks during this simulation. The first attack was an attempt to access the vulnerable system by guessing the administrator password a common brute-force attempt to break into a system. Computer logs indicate repeated failed passwords as attempted logins. The second attack exploited a vulnerability in the Windows Local Security Authentication Subsystem Service. LSASS has a known buffer-overflow vulnerability in several of its versions. Snort uses pattern recognition to identify packets containing the compromised code for this vulnerability and generates an alert on identifying such a packet. MS Windows uses LSASS for all authentication, thus it appears in this attack multiple times. Figure 7 shows another attack, which involves generating heavy scanning activity on another host on the network as a diversion. Sophisticated attackers often create noise to cover their tracks. Generating many through port scanning makes it far more difficult for an analyst to pick out and identify the more noteworthy. The heavy lines that emerge out of the background represent two machines experiencing persistent indications of a scan. Stage 4: dig-in Dig-in is a catch-all term for describing actions taken by an attacker that leverages newly gained privileges on the compromised system. This could include download- 54 March/April 2006

8 ing toolkits or modifying files on the compromised system to hide malicious activity. The end goal is installing a rootkit, which will let the attacker gain easy access in the future, cover his or her tracks, provide complete access to all system resources, and let the attacker identify and attack additional systems using the just-compromised system as a jumping-off point. In this simulation, the attacker generated a Trivial File Transfer Protocol (TFTP) GET command, commonly generated by compromised systems and using automated attack tools and worms. (This TFTP command is part of the first LSASS attack described earlier.) The attack s goal here is to download the appropriate rootkit and the attacker s toolkit for use against other systems in the network. The attack then redirected a Windows command prompt, followed by multiple TFTP GET commands. This redirection let the attacker execute command from a file and subsequently download an entire set of files in rapid succession. Figure 8 illustrates this attack. In this stage, the attacked node begins to expand, which might indicate to a network analyst the need for action. The node s size indicates the number of associated with that host. A large number of distinct suggests a progressing attack. Snort Checksum Window event FTP HTTP Stage 5: migration Migration is a human attacker s attempt to use a compromised system to attack other systems within the targeted network. Migration relies on the fact that the attacker has gained access to a host on the secure side of the firewall, and will be able to see hosts and services not visible from an external host. In this simulation, the attacker generated a successful attack on the victim, followed by a TFTP session to download a toolkit, followed immediately by rapid scans for other vulnerable hosts. Figure 9 (next page) shows the correlation of these almost simultaneous alert triggers of different kinds on the same host, while other hosts have triggered, but of one kind. The node s increasing size lets analysts focus their attention on the host that s actually being attacked, while the divertive or normal activity remains in the background, cause for lesser concern. 7 In stage 3, the attacker attempts to access a vulnerable system and trigger multiple on the host while diverting attention by heavily probing another host. Snort Checksum Window event 8 In stage 4, the attacker attempts to access other systems, triggering multiple on the already compromised system. Testing VisAlert To test our system s capabilities with larger and more complex data, we used a data set generated by Skaion Corporation for use by the Intelligence Community, Advanced Research and Development Activity (IC- ARDA) research projects. This data set, which contained numerous disparate logs and from various sensors and hardware, simulated attack scenarios in large notional unclassified intelligence community environments. Because of the research s sensitive nature, we can t provide additional details on the specifics of the data or attack scenarios. Figure 10 shows for Snort, dragon, and firewall logs. The firewall generated numerous (blocked traffic), but of only two types. On the other hand, the Snort log had thousands of alert types but few were actually triggered in the tests we present here. In contrast, the dragon log provides a rich set of, many of which were triggered. FTP HTTP IEEE Computer Graphics and Applications 55

9 Visualization for Cybersecurity (a) Snort Checksum Checksum Window event Window event FTP FTP HTTP HTTP Note the correlation between from the dragon (blue), Snort (green), and firewall logs (orange). Figure 10c shows a large attack on many nodes. This view includes the virtual log (top talker), which shows the attack s who attribute. These outside IPs show in one view what they ve generated at what time and on what local machine. Using this view, a user could easily see a distributed attack on one node on their system. We deployed the VisAlert prototype at the Air Force Research Lab (AFRL) in Rome, New York. We worked with system analysts with a decade of experience and network-wide responsibility for specific AFRL sites. Such key analysts have been a focal point in our new technology s development and the network data s analysis. In this installation, VisAlert generated a positive response. Users specifically noted its effectiveness, simplicity, and flexibility. They stated that it might increase situational awareness by letting them see a holistic view of their network security status. AFRL staff want to integrate VisAlert with their tools because it lets them see information that their systems might not currently identify. Specifically, they used VisAlert as a visualization front end to demonstrate their Air Force Enterprise Defense system to the US Department of Defense. To a great extent, we ve incorporated the analysts suggestions, resulting in a more usable and useful tool. AFRL continues to evaluate the tool, and we incorporate analysts suggestions as we receive them. Evaluation and testing is scheduled at the Army Research Lab and at the US National Security Agency. We presented VisAlert at the Information Assurance Workshop (Philadelphia, February 2005) and other meetings where it was exposed to analysts and higherlevel officials within the intelligence community and other organizations in the Department of Defense. They expressed interest in performing formal testing in operational environments, including VisAlert in a software bundle for their customers, and further developing the tool, including its incident reporting functionality. (b) Snort 9 In stage 5, (a) the attacker attempts to access a vulnerable system, triggering multiple on that host, while diverting attention by heavily probing another host; and (b) the analyst has filtered out activities of hosts that aren t of interest. The images in Figure 10 show different examples of the visualization in different scenarios. Figure 10a shows normal traffic. A few machines are experiencing ; however, the are uncorrelated, as expected. Figure 10b shows an attack on several local machines. VisAlert features and limitations The VisAlert software already has several interactive features allowing it to filter out or expand details, including the implementation of virtual logs (see the The Virtual World sidebar, pg. 58) and the level of detail of the when and what attributes. In the when axis, VisAlert lets users configure different time increments to explore potential patterns at different time scales. In the what axis, VisAlert software lets users collapse and expand alert groupings, allowing varying detail levels in the log hierarchies. In its current implementation, VisAlert s ability to interact with the where attribute space is limited. We re currently implementing automatic topology generation, which is a priority for testing in different environments. Future research includes detail level in the topology display and the representation of dynamic networks. We distilled the domain analysis underpinning VisAlert s visualization concept into a decision-making process that s common among many of the analysts we observed. However, VisAlert might be limited in its ability to, or inappropriate for, enhancing some problem types experienced by certain analysts and organizations. 56 March/April 2006

10 Future work Ongoing and future work is in several areas. First, we plan to design additional visualization structures to let analysts perform analysis and hypothesis testing of alert details, and to let decision makers view incident reports (the VisAlert system will evolve in a visual continuum to allow seamless transition from a holistic view of the system to detail drill-down). We ll also develop feature enhancements to let users encode and correlate their own alert algorithms, and enhanced capabilities for selecting and displaying detail level. In addition, we ll deploy VisAlert in an operational environment. Finally, we ll perform formal testing that is, measure performance with respect to existing tools on equivalent scenarios in a simulated environment. Formal testing of VisAlert will show whether VisAlert improves recognition and identification of a compromised computer network or workstation. We ll use various simulated network states, both threatened and nonthreatened, to assess the visualization tool s applicability. We ll test users individually in two experimental sessions, counterbalancing network conditions to control for order effects. We also hypothesize that the visualization tool will reduce analysts workload, as workload assessments measured by NASA s task load index tool should indicate. We believe the anticipated difference in workload will derive from the integrated and intuitive presentation of information afforded by the visualization tool. (a) Acknowledgments We thank the network security experts and managers from Battelle, the AFRL, and the University of Utah (Information Security Office, NetCom, Center for High Performance Computing, and Scientific Computing and Imaging Institute), who significantly contributed to the domain analysis work. We also thank AFRL and NSA for hosting tests of the VisAlert system, and to the Skaion Corporation and IC-ARDA for providing us with their attack simulation data set. Special thanks to Jeff Thomas for creating the simulated attack described in this article, Kirsten Whitley for providing valuable feedback and access, and Marty Sheppard for providing continuous feedback and suggestions on the technology development. A grant from the IC-ARDA (with contracting and technical management by AFRL Information Directorate) and the Utah State Center of Excellence Program partially supported this work. (b) References 1. R. Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley Professional, E. Tufte, The Visual Display of Quantitative Information, Graphics Press, K. Lakkaraju, W. Yurcik, and A. Lee, NVisionIP: Netflow Visualizations of System State for Security Situational Awareness, Proc. CCS Workshop Visualization and Data Mining for Computer Security, ACM Conf. Computer and Comm. Security, ACM Press, 2004, pp (c) 10 Visualization of. (a) Normal activity. (b) Attack on specific machines. A purple color log represents the attack s who attribute. (c) Multiple attacks on many machines and a firewall blocking a scan activity. IEEE Computer Graphics and Applications 57

11 Visualization for Cybersecurity The Virtual World To expand the domain over which VisAlert operates, we introduce the notion of a virtual world that is, a domain of information or metadata about the logs and stored in the database. In accordance with our general approach, we don t generate new based on in the database. Other intrusion detection systems (IDSs) perform data mining and create new types of logs and. The key difference is that these IDSs generate persistent data that are stored in a database. Our virtual world extension is temporary. The information is gathered on the fly, depends on the current user setup, and isn t archived. Virtual A virtual alert represents any kind of information that occurs during a particular time period and can be gathered from the. We call this information an alert because we provide it to VisAlert via the regular alert mechanism. For example, a key issue raised by the analysts we collaborated with is the notion of top talkers. In the context of our discussion, top talkers are nodes outside the installation that generate the most during a specific time period (for example, the most recent history period or the innermost ring). Obviously, such information can be computed and gathered in the database, but it isn t explicitly stored or computed ahead of time. To facilitate this talkalot example, we define new whose type indicates a remote machine. The alert contains the number of that the remote node generated in the specified time period with respect to our local nodes. Given a specific time period, we aggregate the in the database based on the remote machine, sort them based on the number of per machine, and then select the top 10 talkers. Virtual views The top talkers in particular, and the virtual in general, extend the model domain and increase the number of alert types. As such, we can use the same presentation methods we applied to the regular persistent, such as hierarchical grouping and multiple views. For example, we can group the top talkers based on their IP addresses, or, if we list the top 100 talkers, we can organize them in groups of 10. We can also use a view in which we place the top talkers in order along the circle based on the number of. The problem with this approach is that in the likely event that a top talker in a particular time period is also one of the top talkers in the next period, the relative position might differ. In this case, the user might lose track of the top talker and not notice the problem s persistence. An alternative view might consider the top talkers in the previous time period. Once a top talker is assigned a position around the circle, it stays in that position for as long as it s part of the top-talker group. This approach provides consistency, but requires the user to notice when the top talker drops out of the top group and is replaced by a new top talker. To help the user notice such changes, we add a dark red background to the top talker s name (its IP address). If the top talker remains in place after the next clock cycle, the background becomes brighter, signaling this top talker s persistence. We can also ask for the top talkers with respect to the number of types of (signatures) these remote machines triggered rather than the number of they generated. In this case, the top talker definition differs (total number of versus number of unique signatures) and thus these two views are essentially two different (virtual) logs. However, because these virtual logs represent two views of the same concept (top talker), we can regard them as two views of a single log. W 4 and top talkers Top talkers are an example of how to correlate relevant who attribute information, thus filtering the immense source IP data set. The who information might also be of interest when requesting event details: the source IP can be included in a pop-up display. 4. K. Vicente, K. Christoffersen, and A. Pereklita, Supporting Operator Problem Solving through Ecological Interface Design, IEEE Trans. Systems, Mass, and Cybernetics, vol. 25, 1995, pp J. Agutter et al., Evaluation of a Graphic Cardiovascular Display in a High Fidelity Simulator, Anesthesia and Analgesia, vol. 97, 2003, pp J. Bermudez et al., Interdisciplinary Methodology Supporting the Design Research & Practice of New Data Representation Architectures, Proc. European Assoc. for Architectural Education/Architectural Research Centers Consortium (EAAE/ARCC) Research Conf., Dublin Inst. of Technology, 2004, pp A. Snodgrass and R. Coyne, Models, Metaphors, and the Hermeneutics of Designing, Design Issues, vol. 9, no. 1, 1992, pp D. Monarchi and G. Puhr, A Research Typology for Object- Oriented Analysis and Design, Comm. ACM, vol. 35, no. 9, 1992, pp R. Priéto-Díaz, Domain Analysis: An Introduction, ACM Sigsoft/Software Eng. Notes, vol. 15, no. 2, 1990, pp W. Zachary, J. Ryder, and J. Hicinbothom, Building Cognitive Task Analyses and Models of a Decision-Making Team in a Complex Real-Time Environment, Cognitive Task Analysis, Lawrence Erlbaum Assoc., 2000, pp C. Ware, Information Visualization: Perception for Design, Morgan Kaufmann, A. Triesman, Preattentive Processing in Vision, Computer Vision, Graphics, and Image Processing, vol. 31, 1985, pp Y. Livnat et al., A Visualization Paradigm for Network Intrusion Detection, Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, 2005, pp March/April 2006

12 Stefano Foresti is cofounder and director of the Center for the Representation of Multi-Dimensional Information (CROMDI), senior scientist at the Center for High-Performance Computing at the University of Utah, and president of Intellivis. His research interests include visualization, user-interaction design, security, distributed computing, intellectual property, and technology commercialization. Foresti has a doctorate in mathematics from the University of Pavia, Italy. Contact him at ieee@stefanoforesti.com. James Agutter is an assistant research professor in the College of Architecture + Planning, University of Utah, and assistant director of CROM- DI. His research interests include information visualization, human computer interaction, user interface design, and technology transfer. Agutter has an MS in architecture from the University of Utah. Contact him at agutterja@arch.utah.edu. Yarden Livnat is a research scientist at the Scientific Computing and Imaging Institute at the University of Utah. His research interests include visual analytics with emphasis on situational awareness, scientific visualization, and software common components architecture. Livnat has a PhD in computer science from the University of Utah. Contact him at yarden@sci.utah.edu. Robert Erbacher is an assistant professor in the Computer Science Department at Utah State University. His research interests include computer security, intrusion detection, computer forensics, data visualization, and computer graphics. Erbacher has an ScD in computer science from the University of Massachusetts-Lowell. Contact him at Robert.Erbacher@usu.edu. Shaun Moon is a research assistant at CROMDI and is pursuing an MS in computational design at Carnegie Mellon University. His research interests include communication design and information visualization. Moon has a BS in architectural studies from the University of Utah. He is a student member of the IEEE and the Information Architecture Institute. Contact him at moonsr@arch.utah.edu. For further information on this or any other computing topic, please visit our Digital Library at computer.org/publications/dlib. Join the IEEE Computer Society online at Complete the online application and get immediate online access to Computer a free alias you@computer.org free access to 100 online books on technology topics free access to more than 100 distance learning course titles access to the IEEE Computer Society Digital Library for only $118 Read about all the benefits of joining the Society at IEEE Computer Graphics and Applications 59

A Visualization Paradigm for Network Intrusion Detection

A Visualization Paradigm for Network Intrusion Detection Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 17 19 June 2005 A Visualization Paradigm for Network Intrusion Detection Yarden

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

A Framework for Effective Alert Visualization. SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks.

A Framework for Effective Alert Visualization. SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks. A Framework for Effective Alert Visualization Uday Banerjee Jon Ramsey SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks.com Abstract Any organization/department that

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

A Visualization Technique for Monitoring of Network Flow Data

A Visualization Technique for Monitoring of Network Flow Data A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN manami@itolab.is.ocha.ac.jp

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

Situational Awareness Through Network Visualization

Situational Awareness Through Network Visualization CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation

Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,

More information

Flexible Web Visualization for Alert-Based Network Security Analytics

Flexible Web Visualization for Alert-Based Network Security Analytics Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory lhao2@ncsu.edu

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

RAVEN, Network Security and Health for the Enterprise

RAVEN, Network Security and Health for the Enterprise RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

More information

Network Security Monitoring: Looking Beyond the Network

Network Security Monitoring: Looking Beyond the Network 1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT iburke@headwallsecurity.com iburke@middlebury.edu February 8, 2011 2 Abstract Network security monitoring

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Intrusion Detection in AlienVault

Intrusion Detection in AlienVault Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention

More information

NVisionIP: An Interactive Network Flow Visualization Tool for Security

NVisionIP: An Interactive Network Flow Visualization Tool for Security NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Visualization for Network Traffic Monitoring & Security

Visualization for Network Traffic Monitoring & Security Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/ An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at

More information

Visualization methods for patent data

Visualization methods for patent data Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Overview. Security System Administration

Overview. Security System Administration Better Tools for System Administration: Enhancing the Human-Computer Interface with Visualization Bill Yurcik Manager, NCSA Security Research National Center for Advanced Secure

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Endpoint Threat Detection without the Pain

Endpoint Threat Detection without the Pain WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

A New Perspective on Protecting Critical Networks from Attack:

A New Perspective on Protecting Critical Networks from Attack: Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of

More information

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a

More information

Challenges in Cyber Security Experiments: Our Experience

Challenges in Cyber Security Experiments: Our Experience Challenges in Cyber Security Experiments: Our Experience Annarita Giani, UC Berkeley, George Cybenko, Dartmouth College Vincent Berk, Dartmouth College Eric Renauf, Skaion Outline 1. The Situational Awareness

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

Flow-based detection of RDP brute-force attacks

Flow-based detection of RDP brute-force attacks Flow-based detection of RDP brute-force attacks Martin Vizváry vizvary@ics.muni.cz Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal vykopal@ics.muni.cz Institute of Computer

More information

Effective Intrusion Detection

Effective Intrusion Detection Effective Intrusion Detection A white paper by With careful configuration and management, intrusion detection systems can make a valuable contribution to IT infrastructure security s Global network of

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open

More information

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization WHITEPAPER Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization Understanding Why Automated Machine Learning Behavioral Analytics with Contextualization

More information

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com Intrusion Detection & SNORT Fakrul Alam fakrul@bdhbu.com Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

A Frequency-Based Approach to Intrusion Detection

A Frequency-Based Approach to Intrusion Detection A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform

Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform Sponsored by LogRhythm Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform September 2013 A SANS Analyst Program Review Written by

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics

Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics A Sumo Logic White Paper Executive Summary The huge volume of log data generated by today s enterprises

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information