How To Create A System Security System That Can Detect An Anomaly In A System From A Log On A Network On A Computer System
|
|
|
- Andra Dean
- 5 years ago
- Views:
Transcription
1 Intrusion Detection Systems and A View To Its Forensic Applications The University of Melbourne Department of Computer Science Parkville 3052, Australia ABSTRACT Traditional computer security has often emphasised prevention, and to a lesser degree, the detection of system security violations. However, it is recognised that the forensic aspect to the overall model of computer security is equally as important. The area of computer forensics lends itself heavily to the response of a criminal violation that has already occurred on a system. This paper views a forensic application within the framework of Intrusion Detection and details work accomplished on a prototype anomaly Intrusion Detection system.
2 1 Introduction The information revolution currently gripping the world has not only elevated the awareness of information as a valuable commodity, but also the awareness of the computer as the main repository for this information. Together with the evolution of networked computing, and the increasing degree of network interconnectivity, we have acquired the ability to easily access greater volumes of information at continuously increasing speeds. As a result, there exists an ever increasing need to ensure that the the laws that use to govern the old paper world evolve toward the challenges of a new computer dominated environment. Information confidentiality and integrity are both subject to greater vulnerabilities within the electronic medium of today than they ever were in a paper based society. It is therefore a foregone conclusion that computer security will need to keep in step with the unstoppable computerisation of the world s knowledge, information and operations. It is important that security procedures particularly on systems inhabiting security sensitive environments must not only encompass the protection of information against unauthorised disclosure, modification or even destruction, but also maintain the integrity of the computing system and address the ever increasing problem of computer misuse. Today, computer security can be roughly divided into two areas. These are basically those procedures that attempt to prevent security breeches, and those that attempt to detect security violations. The role of both these areas in an ultimate model of system security is clear. However there is an additional aspect to system security, an area often termed computer forensics. It runs closely and often in parallel with the other two in terms of providing a greater depth to the overall scope of system security and response. Forensics has often been defined in terms of software, however computer forensics can often be extended to include the hardware and the executing/logging facilities of a system. Computer forensics can therefore be roughly defined as the process of examining the remains in order to obtain evidence about the factors involved in a crime or violation. As can be expected, levels of computer crime, vandalism and fraud have become prevalent and are rising sharply given the heavy reliance on computers in our society today. Often, criminal activity is perhaps a little misguidedly attributed solely to the presence of external connections to a system. This is typically in response to the perceived threat that accompanies the burgeoning levels of Internet access and the increasingly extensive networking prevalent in many environments. Institutions that erect firewalls and other security procedures, do succeed quite effectively in negating external threat. However, often the serious threat and usually the more insidious, arises from internal violations within the protection of firewalls and other preventive security procedures, ie. from users within a system. An affliction that is more common in society than is often aware of, particularly in commerce. Computer crime arising from computer misuse often manifests itself as anomalous behaviour, both of individual system users and of the system as a whole. Although improvements to operating system security continue, the available computer security features are still not good enough to detect many anomalous behaviour patterns by system users. Current computer security systems do not generally protect against [2]: intruders posing as legitimate system users a highly privileged user behaving destructively a legitimate user taking advantage of mistakes in the configuration of system security measures or other system vulnerabilities Trojan horses, or executable programs that have been altered to perform some new improper function Any of these occurrences may prove to be a suspect vulnerability that may or may not jeopardise the security of a system. However at its worst any one or more of these may serve as a launching point for destructive criminal behaviour on the system. Therefore system anomalies can be viewed as symptoms that may herald criminal activity. It is important to note that crime committed within the electronic environment has the added attraction of a natural anonymity often afforded the perpetrator. Tracing the crime back to the criminal is generally an extremely difficult task. Should a system or user behavioural anomaly be a launching site for criminal activities, it is apparent that as much information as possible should be gathered about the act. This is not only for issues concerning the current security of the system but also in case the need arises for evidence after the fact and even for future reference. Intrusion Detection Systems (IDS), have been explored for many years in an attempt to inject some artificial intelligence to the task of identifying any anomalies that may surface in a system. Many are based on extensive logging, and aim to collect as much knowledge/information as possible about system users. Despite the many forms of intrusions, they can be divided into two main classes or models often employed in IDSs [7]: 1
3 Misuse intrusions, where well defined attacks are aimed at known weak points of a system. They are often spotted by observing certain well documented actions being performed on certain objects. Due to the fact that these attacks have been experienced before and are therefore well defined/documented, very often a purely rule based detection system encapsulating the known information about the attack is applied. Anomaly intrusions. These are harder to quantify and are based on observations of normal system usage patterns, and detecting deviations from this norm. There are no fixed patterns that can be monitored and as a result a more fuzzy approach is often required. Intrusions are inherently difficult to detect due to the great number of varying methods that are often use to affect the task. Apart from being able to exploit known architectural or operating system weaknesses, intruders may also exploit flaws within the fixes to these known weaknesses. Furthermore, a fix to a flaw in a system may also expose other existing vulnerabilities that may have been initially overlooked. The important underlying point is that the vulnerability state of a system is in a continual state of flux [7]. Therefore when the first, often fallible, preventive line of system defence is breached, the role of the intrusion detection mechanism comes clearly into play. 2 Intrusion Detection Systems The proliferation of computers, resulting in an almost exponential growth of the amount of sensitive data being placed on them, has generated an increasing need to certify the level of trustworthiness of computer systems. However, it is important to note that although systems may have been certified to be secure, users may not. They can be cleared to use the system, but they can never be fully trusted. This situation is referred to as the insider threat problem. The user is often the weak link in an otherwise trusted system [3]. The electronic medium obscures physical recognition and, as such, a user on the system can hide the presence of hackers and impersonators or even give misbehaving legitimate users the ability to claim innocence. The effort to address these problems has given rise to research aimed at producing viable automated intruder/anomaly detection systems, where the goal is to identify threats to the system by anomalous user behaviour or anomalous system behaviour. The ideal intruder detection system not only has to run as close to real time as possible and encompass an expert system that will address definite system violations or misuse violations, but it also has to perform one of the most important tasks that a human systems programmer has to perform in order to address anomaly intrusions. It has to be able to acquire knowledge on the behavioural patterns characteristic of each individual user on the system in order to target possible intruder presence. The dynamic quality of user behavioural patterns is one of the greatest source of ambiguous rules in intruder detection. The challenge is to implement a system that adapts to the changing nature of user behaviour, which is the motivation for initially applying neural networks to this problem. Furthermore, there is also the inherent ability of neural networks to generalise about a user s behaviour should it have limited information to work with. The ultimate goal of Intrusion Detection is to identify, preferably in real-time, unauthorised use, misuse, and abuse of computer systems by both system insiders and external penetrators [6]. In the case of anomaly intrusions, intrusion detection is based on the idea that the anomalies that may surface in a system are symptoms indicating illegal, intrusive or criminal activity. The ultimate goal, with a view to a forensic application however, would be to obtain sufficient evidence to in order to trace the crime back to the criminal. Within a computer system the natural blanket of anonymity afforded the criminal encourages destructive behaviour while making it extremely difficult for law enforcers to prove the identity of the criminal. Therefore the ability to obtain a fingerprint of system users and their typical behaviour is imperative in order to acquire some hold on identifying the perpetrator. The study of available log files would always stand as a fundamental in evidence collection. However, often at a higher level it is necessary to possess a more in-depth ability to narrow the field or even establish a list of possible suspects. Computer crime is always the result of human activity on a system, be it system users or intruders. At this level, it is not only desirable to have some logging activity to provide evidential information, but also some artificially intelligent mechanism to collate and create profiles of system users. For example, it is useless to know that UserA has logged in at 8 p.m. by viewing the logs without knowing that UserA never logs in at 8 p.m. The knowledge that User A never logs in at 8 p.m. can only be obtained by knowing the typical behaviour of User A, or the behavioural profile of User A. To this end the use of an anomaly ID system would be invaluable. The system would not only encapsulate user behaviour for an insight into the characteristics of a perpetrator, it also shows promise in being able to distill key signatures that would identify that perpetrator, and provides a mechanism that would correlate the log information to any alarm or anomalous activities that may arise in the course of system operations. 2
4 To date, research in this area has concentrated on the classification of statistical information of users with more complex models of neural networks [4][5]. We show that it is possible to achieve effective results using a simple variation of the feed forward network with only directly available instantaneous information of the user s behaviour. As a result, many traditional hurdles inherent to the Intrusion Detection and to neural networks [7, 8] have been overcome [1]. The prototype ID system is currently running on a student machine in the Computer Science Department, at Melbourne University known as the Obsidian Project this neural networks based ID system is aimed at machines running the UNIX operating system. The implementation of the project was targeted for UNIX systems for the following reasons: it is the most popular multi-user environment within educational facilities where security measures are less stringent it supports multiple users, therefore increasing the risk of user impersonation it has powerful networking capabilities that provide it with the ability to link to the Internet 3 Detection of Anomalous User Behaviour The modelling of user behaviour on Unix machines were based on common system logs that were used as sources of information of the IDS These logs being /etc/utmp, /etc/wtmp, /usr/adm/pacct, and /usr/adm/sulog, provided the required user activity information from where we derived the following behavioural characteristics which typifies users on the system : User activity times - The time at which a user is normally active. User login hosts - The set of hosts from which a user normally logs in from. User foreign hosts - The set of hosts which a user normally accesses via commands on the system (eg. FTP hosts). Command set - The set of commands which a user normally uses. CPU usage - The typical CPU usage patterns of a user. Figure 1 illustrates how a complete system for the detection of user behavioural anomalies is structured. It basically consists of five separate networks for each user behaviour and a unifying correlation network. A coordination process is responsible for channelling system information into the neural networks. Each of the behavioural characteristics are modelled by a modified feed forward network, as well as checked by a limited static rule filter for easy breaches of security. The processing performed by these networks produce results for each user characteristic. The correlation network combines several different behavioural measures to provide a higher order model for a user s trends. It should be slow to raise alarm in order to allow a legitimate user to change. If repeated violations occur it needs to reach alarm levels fast enough to alert a systems administrator when necessary. These separate networks aid in the learning of a unifying correlation network as well as provide detailed information should an alarm be triggered. The desired response of the correlation network is a value close to for a user who is not deviating from their normal behaviour, and a value of for a user who is deviating in the most extreme sense. For the results presented in this paper we used an arbitrary threshold value of to determine when to raise an alarm for anomalous user activity. If the output of the correlation network is above this threshold then an alarm is raised. It is also important to note that our system will supply several levels of alarm, where the threshold values are adjustable by the system programmer in order to allow adaptation to the required sensitivity needed in the computer system. The lowest level of alarm could be used to trigger extensive auditing of the targeted account, while a higher level of alarm could be used to alert the system administrator immediately. 4 Results Results were obtained on the departmental student machine (mundil.cs.mu.oz.au) which is a Silicon Graphics 4D/340S server. This machine is a medium to large multi-user system with 128Mb of memory, 4 CPUs. It has 3
5 INFORMATION FROM SYSTEM LOGS CO-ORDINATION PROCESS PER-USER NETWORKS PER-USER NETWORKS ACTIVE TIMES COMMANDS DB LOGIN HOST ACCESS FOREIGN ACCESS HOST CPU USAGE STATIC RULE REPORT PER-USER CORRELATIONAL NETWORK NETWORK REPORT ALARM Figure 1: Structure Of An Automated User Behaviour Anomaly Detection System approximately 35 users on the system on average and approximately 157 users maximum. There is also an average of about 200 logins per day, peaking at over In order to test the effectiveness of this system, it was allowed to run for a period of two weeks. Then the entire neural network detection system was tested by introducing a sample of anomalous behaviour profiles obtained from various system administrators. The goal of this exercise is to determine if the correlation network s output indicated anomalous activity in these accounts The response of the correlation network for each user was recorded and graphed. A summary of the resulting graphs are displayed in Figure 2. They illustrate the response of the network when processing a normal user with non-varying behaviour, a normal user with changing behaviour, and and account under attack. In addition, we tested the response of the network should a user use a another users account and vice versa. The following is a table that illustrates the percentage of CPU, memory and I/O load our system placed on the tested student system to maintain the neural networks. These results are of particular importance considering that one of the major reasons why expert systems versions of these detection systems are not viable is the heavy demands that they place on system resources. For practical viability, the detection system must use between 1 to 2 percent of the available system resources. System Load % Of Total CPU % Of Total Memory % Of Total Disk Resources Required Resources Required IO Resources Required Average 0.84% 0.4% 2% Maximum 3.5% 1.7% 0.1% Table 1 : Summary of the Percentage of System Resources Required by the Neural Network Detection System Our tested system under maximum load had 157 active users at once, while on average it had 35 users. Under maximum load the memory requirements are approximately 2.3Mb. Under normal load this comes down to approximately Mb. The total disk space requirements of our proposed system for a student machine with 1000 accounts would be 14.6Mb. On the machine we tested this would account for 1.4% of the machine s disk space. I/O resources are consumed during the reading and writing back of the state of each user s neural network. The state of each active network in memory is written out to disk every 1/2 an hour to prevent loss of information. 4
6 5 Conclusion The introduction of the computer has brought about, what is popularly termed, the Information Revolution. Never before has such a wealth of data, both public and private, been so accessible and obtainable. With this revolution has come certain undesirable elements, being the underworld of computer fraud and crackers, who quite often achieve their aims by breaking into computer systems and impersonating legitimate system users. Many methods preventing intrusion into computer systems have been implemented, but these will always be imperfect. When preventive measures fail, many sites rely on the local expertise of their systems administrators to apprehend the intruders. This task is both time consuming and error prone, requiring a human to sift through copious quantities of data looking for deviations in user behaviour. An automated system for detecting anomalous user behaviour will help alleviate a, sometimes unrealistic, burden on systems administrators. However, these automated systems are not only useful during a violation but can be an invaluable forensic tool after the fact. References [1] K.Tan, An Application Of Neural Networks To UNIX System Securi ty, IEEE International Conference On Neural Networks, November [2] H.S. Vaccaro and G.E. Liepins, Detection of Anomalous Computer Session Activity, 1989 IEEE Computer Society Symposium on Security and Privacy, May 1989, pp [3] J.R. Winkler and W.J. Page, Intrusion and Anomaly Detection in Trusted Systems, Fifth Annual Computer Security Applications Conference, Dec 1989, pp [4] H. Debar and B. Dorizzi, An Application of a Recurrent Network to an Intrusion Detection System, IJCNN Intl Joint Conference in Neural Networks, June [5] H. Debbar, M. Becker and D. Siboni A Neural Network Component for an Intrusion Detection System, Proceed ings of the Symposium on Research in Security and Privacy, May [6] B. Mukherjee, L. T. Herberlein and K. N. Levitt, Network Intru sion Detection, IEEE Network, May/June 1994, volume 8. [7] M. Crosbie and G. Spafford, COAST Group, Active Defens e of a Computer System Using Autonomous Agents, Technical Report No , February 1995, [8] S. Kumar and G. Spafford, An Application of Pattern Matching i n Intrusion Detection, Technical Report CSD-TR , June
7 Anomaly Measure - Test Login Session - Normal Input - User 1 ALARM THRESHOLD Anomaly Measure - Test Login Session - Attack - User 2 ALARM THRESHOLD Anomaly Measure - Test Login Session - Changing Behavior - User 3 ALARM THRESHHOLD Anomaly Measure - Test Login Session - Switching Two Users ALARM THRESHHOLD Figure 2: Summary Graphs of Correlation Network for Three Accounts Under Testing 6
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Self-Defending Approach of a Network
Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar
Network-Based and Host- Based Intrusion Detection Graduate Seminar 1 Goal This presentation is an in-depth overview of intrusion detection. As such, the purpose of the presentation is for reference. 2
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1 Hartmut Pohl All computers are at risk from security vulnerabilities that are generally unknown to the user and
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com [email protected] detecting the unknown Integrity
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
Firewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
PATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
A Human Factor Interface for SIEM
A Human Factor Interface for SIEM SESSION ID: ANF R04A Information Security Communications Consultant Senior Information Security Consultant Trustwave Germany GmbH Security Information and Event Management
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
