Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)
|
|
|
- Amberlynn Laurel Copeland
- 10 years ago
- Views:
Transcription
1 Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay Graduate Mentor: Jia Bai and Xiaowei Li Faculty Mentor: Prof. Yuan Xue Originally Submitted on: July 31, 2010 Updated on: February 21, 2013 TRUST Research Experiences for Undergraduates (TRUST-REU) in Cyber Security and Trustworthy Systems 2010 Institute for Software Integrated Systems Vanderbilt University
2 Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Abstract Internet and the computer networks have become crucial to efficient operation of institutions and the society. But, this makes it possible for a lone hacker to significantly impact these institutions and society through worm attacks. Such worm attacks are becoming common news leading to a feeling of insecurity. The intention of this research is to study the worm s propagation behavior. These worm spread studies are adapted from the work of several computer security experts and researchers. Contained and isolated yet a realistic environment is required to study the propagation behavior of worms. DETER and PAWS are simulation tools used in this research experiment to study the Slammer worm s propagation. 1) Introduction The ubiquitous growth of the Internet has been successful in changing many institutions and social interactions. The availability of high-speed local area network connections and other type of network access advancements in the world have significantly increase the adoption of an Internet life-style. Due to the realization that Internet activities are very convenient, fast, informative and cost-effective way of communication, the majority of the institutions have structured their business online. Thus, highly valuable information passes through the network pipeline. These transfers of data entice the attackers to steal or destroy valuable information and disrupt the normal network connection for fun, fame or an amount of cash. One of the attacker s tools to infiltrate such stealthy attack is through computer worms. A computer worm is a self-replicating program that propagates itself across the network. This self-replicating program uses an algorithm to find its target. Once it discovers the target, the worm sends out a probe to exploit the security flaw of that target machine and transfer a copy of itself. The worm s copy will activate a new cycle of propagation. By inspecting the history of computer worm attacks, since Morris worm rose in 1988 [1], Internet worms have been a vast threat in network security. Its fast spreading characteristic and considerable amount of damage is alarming. For example, the Slammer worm infected 90 percent of vulnerable hosts in ten minutes. It was the quickest worm outbreak in history. Slammer worm unleashed a single 404- byte user datagram packet (UDP) to port 1434 that runs Microsoft s SQL Server and Microsoft Server Desktop Engine (MSDE) last January 25, Exploiting this vulnerability, the worm 1
3 infected 75,000 hosts and caused network outages due to high-volume scans and bandwidth traffic. Even though Slammer worm has no malicious payload, it caused significant disruption to financial, transportation, and government institutions [3]. The objective of this research is to understand how certain Internet worms behave. A better understanding of worm s behavior can help to predict future worm s traffic, speed and threat. To obtain this, simulation alternatives are needed to study the propagation of Internet worms. In this paper, simulation alternatives such as mathematical model, testbed and realistic internet-wide experiment are described and were based from the contributions of well-respected computer security researchers [1][5]. To understand how worms spread, computer security researcher like Zou et al. studied the worm modeling propagation using mathematical techniques to study biological diseases [5]. DETER [6] is a testbed used for real machine testing that can run a selfreplicating program in an isolated and contained environment. For a realistic internet-wide simulation of worm spreads, PAWS is an excellent tool used in the experiment to replicate Slammer worm s propagation. 2) How worms spread? Many computer security researchers [1][2][5] used epidemiology models to analyze how worms spread. Zou et al. stated that computer viruses and worms are analogous in their selfreplicating and propagation behaviors. Thus, the mathematical techniques developed for the study of biological infectious diseases can be adapted to the study of computer viruses and worms propagation [1]. The simple epidemic model assumes that each host stays in one of the two states either susceptible or infectious. Susceptible hosts are hosts that are vulnerable to infection while infectious hosts are host that have been infected and can infect others. In this model, the number of contacts between infectious hosts and susceptible hosts is proportional to the product of S(t) = the number of susceptible hosts at time and I(t) = the number of infectious hosts at time [1]. 3) DETER Testbed The cyber-defense Technology Experimental Research (DETER) testbed provides publicly available infrastructure for conducting computer security experiments such as denial-of- service, worms, viruses and other malicious program. DETER testbed is designed for isolation to prevent the experiments from colliding with each other. It also assures containment to prevent exfiltration of packets from the testbed [7]. DETER is easy and very convenient to use due to the following aspects: 3.1 Web-based interface: Allow users to fill a form to begin an experiment and upload an ns script file or use the user-friendly JAVA GUI to create a network topology. The JAVA GUI version allows the 2
4 experimenter to configure the nodes with its corresponding operating system and the LAN s bandwidth size, link loss and others. 3.2 Remotely Access: Each interconnected nodes created in the experiment are real machine that can be configured and re-imaged through Secure Shell (SSH) connection. 4) PAWS: The Internet-scale worm spread simulator Songjie Wei and Dr. Jelena Mircovic developed a single, configurable, customizable, realistic and versatile Internet-wide simulator tool called PAWS [5] for worm propagation studies. It is designed for a high-fidelity simulation of a worm that can faithfully simulate each worm replication s behavior and interaction with the Internet environment. Described below is PAWS s simulation design: 4.1 The Internet Model: The worm spread simulator tool replicates a realistic Internet topology the Internet at the Autonomous System (AS) level. PAWS obtains its global connectivity data from Route Views project [4]. The Route Views data supplies the actual copy of Border Gateway Protocol (BGP) routing table of participating AS-routers. The information of the routing table can be used to derive the peering relationship between the inter-as connectivity that satisfies the need of Internet level fidelity. In order to achieve realistic scanning results, PAWS designs the Internet routing by distributing the routing information, where each node stores only the routing table of AS it simulates. When a worm scan is generated, the simulation nodes determine the destination ASes. The nodes look on its routing table to calculate the shortest path to the destination AS and bandwidth consumption on their path [6]. 4.2 The Worm Model: PAW is designed to simulate different worm spread events in common PCs. It is customizable and configurable, depending on what particular Internet worm propagation an experimenter wishes to study. The PAWS s program builds a worm description file that defines the worm s features and network environment where users can specify the worm s: (1) scanning rate, in scans per second, (2) scanning strategy (e.g., random, uniform or subnet), (3) worm s transport protocol (TCP or UDP), (4) vulnerable population size and distribution (uniform or lognormal), (5) size of a worm scan, in bytes, (6) infection delay, and (7) lifecycle of worm [5]. 3
5 4.3 The Worm s Distributed and Discrete Simulation Model: Each node establishes a stream socket and connects to all other simulation nodes [6]. The simulation tasks are shared by multiple physical machines, which exchange their local results over a network. Each node simulates a portion of the whole Internet and divides the processing and communication loads which balances the CPU cost among the nodes. Thus, PAWS s authors described this as distributed simulation [5]. PAWS worm-scan behavior is a time-discrete procedure. Every time unit, each infected host produces a list of target Internet Protocol (IP) addresses to scan. PAWS accumulates the worm scans in one destination machine. The simulation nodes cross-traffic uses stream sockets to exchange data at the end of each simulation interval (one second). The scanned non-vulnerable hosts or non-routable IP addresses are dropped or processed at the sender-side machine, thus the inter-node communication is lessened [5]. 5) PAWS Experiment The DETER testbed and PAWS worm spread simulator, were the two simulation alternatives that are sufficient enough to implement a real world experiment in studying Internet worm propagation. In this experiment, PAWS program is configured to simulate the worm spread of Slammer worm. Table 1 shows the worm s feature and the values are based from the Slammer worm modeling study of D. Moore et al. and Zou et al. [3][1]. To setup the experiment on DETER testbed, five machines namely node0, node1, node2, node3 and node4 are connected to a switch (LAN). The attacker is set to the master node0. The client machines are set to nodes 1 through 4, also known as simulation nodes. Using SSH, paws.tgz file was extracted at node0. Two executable files are run on node0 as well. The paws server file starts the master node and slammer.sh will start the four slave or client nodes. Default Internet Model IPv4 address space Scanning_rate 4000 per second Vulnerable_ population 75,000 Function Determine_vulnerable_host Randomly mark 10 vulnerable hosts as infected Simulation Interval 0.05 per second Scanning strategy random Transport Protocol UDP Life cycle 10 minutes Table 1. Slammer worm s features 4
6 5.1 Vulnerable Hosts Scan Result After running the executable commands, there will be an inter-node communication during the initialization process between each simulation node. During this stage, the function determine vulnerable host() is executed to create vulnerable hosts by scanning the IPv4 address space which is 4,294,967,296 IPs. The distribution of vulnerable hosts on each node is roughly the same. Fig.1 shows the total vulnerable hosts scanned at node3. Totally, there are 80,143 vulnerable IPs. Figure 1. Total number of Vulnerable Hosts 5.2 Infected Hosts Scan Result After the worm scan, log files are created for each simulation nodes. Fig. 2 displays the number of infected hosts in every second I(t) graph of the Slammer worm scan results. The y- axis displays the number of infected host and the x-axis indicates the time in seconds. The total infected hostsof the four simulation nodes is 79,376 in 600 seconds among the 80,143 vulnerable hosts. 5
7 Figure 2. Infected host at time t I(t) 5.3 Observations At early stage, the worm s growth incredibly multiply and infected almost 66,000 vulnerable hosts or IPs in two minutes. Slammer worm s propagation undoubtedly quick due to its characteristics. It randomly scans the target IPv4 address space and drops non-vulnerable IPs. It uses UDP as its transport protocol to send the copy of worm, thus a non-connection-oriented protocol does not bother to resend the dropped packets. Also this experiment is homogeneous. Thus, no patching strategy is involved. However, the number of infected hosts slowly increases at the latter stage of the worm propagation. As the number of infected hosts grows, the number of worm scans increases and creates scan traffic. Therefore, the Slammer worm created network congestion, with limited bandwith, causing the connected hosts to crash that led to denial-of-service attack. 6) Conclusions This worm modeling experiment was meant for students who took Network Security class with worm modeling and dynamic quarantine studies. Without such background, learning Internet worm modeling methodology is a challenge. Through this research experiment, the following observations can be made: (1) Studying the trend and traffic of worm propagation will give the defender a sense of strategies if such worm s traffic can be blocked or slowed through slow human intervention. (2) PAWS is capable for a realistic Internet-scale worm spread 6
8 simulation that can mimic different types of Internet worms, due to its configurable and customizable feature. (3) Further research focuses to on how other Internet worms propagate, how software can be developed to generate potential worms and how to develop effective countermeasures is necessary. Acknowledgements My sincere gratitude goes to: (1) Prof. Mooi Choo Chuah for her patience and guidance in helping me perform the experiment, (2) TRUST-REU program for this excellent research opportunity, (3) Vanderbilt University research mentors, namely Prof. Y. Xue, J. Bai, X. Li, and (4) Dr. Sathya Narayanan at CSUMB for all the help. References [1] W. G. C. C. Zou and D. Towsley. Worm propagation modeling and analysis under dynamic quarantine defense. In ACM CCS Workshop on Rapid Malcode. [2] G. M. V. D. Moore, C. Shannon and S. Savage. Internet quarantine: Requirements for containing self-propagating code. [3] S. S. C. S. S. S. D. Moore, V. Paxson and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):3339, July/August [4] U. of Oregon. Route views project. [5] J. M. A. H. S. Wei, C Ko. Tools for worm experimentation on the deter testbed. mirkovic/publications/trident09.pdf. [6] M. S. S. Wei, J. Mirkovic. Distributed worm simulation with a realistic internet model. [7] D.T. Benzel. Deployment, and use of the deter testbed. 7
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Distributed Worm Simulation with a Realistic Internet Model
Distributed Worm Simulation with a Realistic Internet Model Songjie Wei, Jelena Mirkovic, Martin Swany Computer & Information Sciences University of Delaware Newark, DE 19716 (weis, sunshine, [email protected])
A Realistic Simulation of Internet-Scale Events
A Realistic Simulation of Internet-Scale Events Songjie Wei and Jelena Mirkovic Department of Computer and Information Sciences University of Delaware Newark, DE 19716 (weis, sunshine)@cis.udel.edu ABSTRACT
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?
First Worm Ever Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in November 9 Worm was
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
The Effect of Infection Time on Internet Worm Propagation
The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1 Background Worms are self propagating programs that spread over a network,
How To Attack A Server With A Ddos Attack On A Zombie Army Of Your Computer (For A Free Download)
Outline Early DoS and Worms Ben Wilde 7 February, 2005 Comp 290 Network Intrusion Detection Introduction to worms Potential damage that *could* be caused (theoretical) Examples of recent worms and DoS
A Firewall Network System for Worm Defense in Enterprise Networks
1 A Firewall Network System for Worm Defense in Enterprise Networks Cliff C. Zou, Don Towsley, Weibo Gong {czou,gong}@ecs.umass.edu, [email protected] Univ. Massachusetts, Amherst Technical Report:
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
IPv4 Routing Worm - A Fast, Selective Attack
1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Department of Electrical & Computer Engineering Department of Computer Science
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Effect of DDOS attacks on simple plantcontroller
Effect of DDOS attacks on simple plantcontroller networks Ricardo Estrada Computer Science CSU Monterey Bay [email protected] Graduate Mentors: Blaine Nelson Saurabh Amin Suzanna Schmeelk July 30, 2010
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Optimal worm-scanning method using vulnerable-host distributions
Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
A Senior Design Project on Network Security
A Senior Design Project on Network Security by Yu Cai and Howard Qi Michigan Technological University 1400 Townsend Dr. Houghton, Michigan 49931 [email protected] Abstract Distributed denial-of-service (DDoS)
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
Cyber Security Where Do I Begin?
ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Source Code Analysis of Worms
Source Code Analysis of Worms Puja Bajaj, Arjun Guha Roy Department of Computer Science St. Cloud State University, St. Cloud MN 56301 [email protected], [email protected] Abstract New
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Review Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Lecture 13 - Network Security
Lecture 13 - Network Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Exploiting the network... The Internet is extremely
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
On the Development of an Internetwork-centric Defense for Scanning Worms
On the Development of an Internetwork-centric Defense for Scanning Worms Scott E. Coull Department of Computer Science University of North Carolina 01 South Columbia Street Chapel Hill, NC 7599, USA [email protected]
OF-RHM: Transparent Moving Target Defense using Software Defined Networking
OF-RHM: Transparent Moving Target Defense using Software Defined Networking Haadi Jafarian, Qi Duan and Ehab Al-Shaer ACM SIGCOMM HotSDN Workshop August 2012 Helsinki, Finland Why IP Mutation Static assignment
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
The Spread of the Sapphire/Slammer Worm
The Spread of the Sapphire/Slammer Worm By (in alphabetical order) David Moore Vern Paxson Stefan Savage Colleen Shannon Stuart Staniford Nicholas Weaver CAIDA & UCSD CSE ICIR & LBNL UCSD CSE CAIDA Silicon
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
MODELING AND DEFENDING AGAINST INTERNET WORM ATTACKS
MODELING AND DEFENDING AGAINST INTERNET WORM ATTACKS A Thesis Presented to The Academic Faculty by Zesheng Chen In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School
Impact of BGP Dynamics on Router CPU Utilization
Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected]
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Traffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Macroscopic Network Virus Statistics
NetSec2005 1 Macroscopic Network Virus Statistics Xinguang,Xiao 1 ; Bing,Wu 2 ; Yongliang,Qiu 3 ;Xiaobing,Zhang 4 (1 2 3: Antiy Labs Harbin P.O.Box 898 150001; 4: Harbin Institute of Technology Harbin
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
SECURITY FLAWS IN INTERNET VOTING SYSTEM
SECURITY FLAWS IN INTERNET VOTING SYSTEM Sandeep Mudana Computer Science Department University of Auckland Email: [email protected] Abstract With the rapid growth in computer networks and internet,
Traffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Denial of Service. Tom Chen SMU [email protected]
Denial of Service Tom Chen SMU [email protected] Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
