IDEA: A New Intrusion Detection Data Source
|
|
|
- Julia Lucas
- 10 years ago
- Views:
Transcription
1 IDEA: A New Intrusion Detection Data Source William Mahoney, William Sousan Peter Kiewit Institute, University of Nebraska at Omaha 6001 Dodge Street, Omaha, Nebraska {wmahoney,wsousan}@unomaha.edu Abstract In the context of computer systems, an intrusion is generally considered to be a harmful endeavor to prevent others from legitimate use of that system, to obtain data which is not normally available to the intruder, or to plant data or disrupt data already existent on the machines. Traditionally intrusion detection has relied on two data sources: various log files which record user s activity, and network traffic which contains potential threats. This research presents a system which we call IDEA; the Intrusion DEtection Automata system. We utilize a third source of data for intrusion detection in the form of an instrumented process. Open source software is recompiled using a modified compiler we have created, and the resulting executable program generates the data as it runs. An external monitoring facility then checks the behavior of the program against known good execution paths. These paths are specified either using a domain specific language and hand-written rules, or by running the software in a learning mode and capturing the normal behavior for later comparison. 1. Introduction Intrusion Detection (ID) is an area of computer security which deals with monitoring the events occurring within a computer system in an attempt to determine whether accesses to the system are legitimate or nefarious[13][2][4][15]. The events which are monitored are generally one of two types: system logs which are created by the operating system and applications, and network packets containing addressing and control information[3]. Our research in this area uses an additional source of ID data in the form of process monitoring. While this method has been used in the past, these existing systems base their detection on the system or function call level. Examples of this type of detection systems include work done by Hofmeyr[7], Maniatty[9], Peisert[14], and Locasto and Keromytis[8]. The methods frequently monitor a process by watching the system calls which that process makes, and comparing these to typical sequences of calls. Our work inserts intrusion detection monitoring into the source code automatically when the system is compiled. It is thus a finer granularity of monitoring and also can monitor a process whether it is currently executing operating system requests or not. Our project is called IDEA the Intrusion DEtection Automata system, and the research makes the following contributions: We have added an instrumentation insertion system to the popular GCC compiler suite. Programs compiled in this mode can have instrumentation enabled or disabled at function boundaries and export block by block data as the program runs. The location of our additions makes the tool applicable to any language supported by GCC. We have measured the slowdown due to instrumentation and determined that it is reasonable for the types of programs which are typically subject to intrusion attempts (e.g. web servers). 17
2 We have proven that our program instrumentation works in the general case by recompiling and testing several open source projects as well as the SPEC CPU2006 benchmarks[16]. We have created a domain specific language (DSL) in order to provide specifications for normal behavior of the program in question. We have created monitoring software which learns typical execution paths as the program is running. We have demonstrated both the DSL and the learned patterns using a common opensource browser called thttpd [17]. The principle difference between our ID system and other ID systems referenced above lies in the fact that we are monitoring an executing program in real-time at a block level, not at a system call or function call level. This paper presents the motivations in section two, and brief descriptions of the processes involved in adding instrumentation to open source code, in section three. Section four contains the specifics of how the monitoring facility is constructed from either a set of rules written in a new language, or by learning typical execution paths from the actual software. Our conclusions and notes concerning future work are in the last section, section five. 2. Motivation One critical aspect of computer security is the proliferation of open-source software. As an example, as of this writing the open Apache web server is running in the neighborhood of 51% of the web servers on the internet[11]. A vulnerability in Apache would have a profound impact on the e-commerce, and thus the economy, of many countries. Apache is but one example; others include open-source code for DHCP servers, NFS, open-source which is subsequently included in embedded platforms such as routers, SAMBA, FTP servers, etc. An attack against any one of these might be possible; if we concede this, than intrusion detection becomes a more critical concern. Thus the motivation for this research is the desire to leverage what might be considered a disadvantage (open-source) and instead use it as an advantage to assist in the detection of malicious users. Our system, IDEA, does this. At the same time, one can generate either synthetic normal paths by running a program in a laboratory environment and executing as many paths as possible through the source code, or alternatively one can operate the program in a real environment and thus capture real normal paths of execution. A tool such as gcov [6] might be useful for synthetic paths, and the user can capture the runtime data by providing a suitable set of tests against the program. But we consider capturing synthetic paths in this way to be a senseless idea. Consider that we require the open source code for the original program, and we have created a modified compiler. Capturing all possible execution paths is a relatively simple matter dump the control flow graph out of the compiler on a function-by-function basis. This captures all possible execution flows through the program. But what we wish to note in an ID system is not all paths through the code, but an unusual path through the code. There may be many of these unusual paths, all of which are permissible synthetic paths, but many of which are indicative of strange behavior on the part of the user. It is a considerably better approach to build an ID system based upon paths that are normally seen during the execution of the source code, and to then notify the user on instances where the process varies from this norm. 18
3 3. Adding instrumentation to open-source The IDEA system uses modifications which we have made to the popular GCC compilers. This tool chain was selected because the compiler suite itself is open-source and thus facilitates the necessary modifications. In addition, the alterations were made in such a way that they are source language independent; we have tested web browsers written in C, C++, and Java, as well as a few lingering Fortran programs. The implementation currently runs on Linux, due to the large proportion of open-source code which executes on this platform; the compiler and the remainder of the system could be easily moved to a different architecture. This section outlines the changes which we have made to the GCC collection to support IDEA GCC Modifications The GCC compiler suite maintains several internal representations for a program as it is compiled. The source language is first parsed and converted over to generic trees. These tree data structures are then processed into gimple trees (the name is a GNU modification of simple ) which are then converted into a representation called RTL. Lastly, the RTL is translated into assembly language which is then passed to a separate program. The IDEA system operates on the RTL rep-resentation of the program, in a block-by-block manner. Each (basic) block has additional code inserted which, when the RTL is translated to assembly language, creates a call to our instrumentation function. The function signature is: void cyg_block_enter( void *func, unsigned int line, unsigned int block); Thus, the instrumentation function has ready access to the address of the function currently being executed at run time, as well as the basic block number and the line number for that block. As the line number and block number are at least partially redundant we use only the block number in the IDEA monitoring software but retain the line numbers for debugging purposes Performance Impact The instrumentation naturally causes a slowdown in the program when it runs. This slowdown is dependent to a large extent on what the supplied instrumentation function actually does; we can set a lower bound on the performance impact by running code which includes the instrumentation calls to a function which does nothing. The slowdown in this case was measured using the CPU2006 integer tests [16] and is outlined in table 1: Table 1. Instrumentation slowdown Time (seconds) Benchmark Original Instrumentation Factor 401.bzip gcc mcf gobmk hmmer sjeng h264ref astar Average:
4 As the table shows, adding instrumentation calls to these benchmarks adds about 45% additional overhead to the process when the instrumentation function performs no activity. This is the lower bound for the slowdown on the benchmark programs. We also note that adding instrumentation to an optimized program causes a greater slowdown, although the optimization still generates a faster program, due to the necessity of saving and restoring registers which are live at the point of the added code Open-source demonstrations In addition to testing the CPU2006 benchmarks, as a means for verifying that the instrumentation does not modify the program behavior, we have recompiled several opensource projects. In particular we have tested the following web servers, which typify the point of attack for many ID systems: Apache Web Server[1], C source, Fizmez Web Server[2], Java source, Thttpd Web Server[17], C source, and Monkey Web Server[11], C Source. Because of the overall complexity of the Apache system, for the majority of our research in the IDEA system we have principally tested with the other three servers listed above. Note though that the original source code language is irrelevant as long as it is one of the languages supported by GCC. 4. The IDEA monitor The run time data generated by the executing process is monitored in real time by an external program. This program alerts the user when the expected run time behavior of the program does not match certain specifications. In order to create these specifications the user writes the rule set using a domain specific language (DSL) which is then converted into the automata used by the IDEA system. Each individual rule is saved as a deterministic finite automata (DFA), and there can be many DFAs used. Alternatively, the system can learn the automata by observing the execution paths of the executing process. In both cases, multiple DFAs are then used by the external process, which observes the original program and makes the intrusion detection determination. We first briefly describe the language based method for constructing the monitor, then describe how the rules are used to create the monitoring program and how the trace data is enabled and disabled at points within the process. We then describe the method for learning the DFAs from a live environment The domain specific language The grammar for the DSL, in extended BNF, is as follows: program -> program rule ε rule -> within INT max INT function function -> '(' IDENTIFIER not_empty ')' not_empty -> item { item } item -> elist identifier INT elist -> elist { expression } ε expression -> '(' not_empty ')' optmod optmod -> '+' '*' '?' ε 20
5 where IDENTIFIER follows the same rules as function names within the source language, and INT is an integer. Informally the grammar denotes rules. Each rule first sets up a within time and defines a list of items starting at a function boundary. The optional modifiers are used as in regular expressions; + and * are positive and Kleene closure, and? indicates an optional component. The is used for alternation. Semantically, a rule contains a timing section followed by an execution path section. For example: within 30 max 5 (func (func2 (10 20))?) This example states that the function func1 must be called at least every 30 seconds, and when it is invoked, it must complete within five seconds. The function starts by executing blocks four, five, and six, and then it possibly calls func2, executing blocks 10 and 20. Execution of the code within func2 is optional due to the presence of the? following that portion of the rule. Similar operators *, and + behave as they do for regular expressions The monitoring facility To create the monitoring program requires several steps. First, the rules are compiled into the DFAs. These machines have all of the function names replaced with their addresses in the executable program; this is accomplished by examining the symbol table of the program after it is compiled. The DFAs are then used as the input for further processing. The unique strings, now addresses, in each machine are used to create code for a perfect hash function. The DFA and the hash function are then combined to create state tables which represent the legal transitions specified in the original rule set. The state tables are then sourced into the monitoring facility when it is built. Lastly the monitor process is run simultaneously with the original source program, and it alerts the user if the execution path of the program does not match the specified paths in the original rule set Specifying function traces The rule set specified in the DSL might conceivably require one to indicate all frequent execution paths through the software. However an ancillary program called joinpoint, named after another project dealing with aspect oriented software[9], is used to indicate the starting points and stopping points for the generation of trace data. In this way one can start off small, writing rules for only a few functions, and then enlarge the coverage over time. For an illustration, as the open source program is started, and using the previous rule as an example, one would indicate the start and stop point for the trace data via:./joinpoint./prog func1 trace./joinpoint./prog -func1 notrace The first of these lines turns on the trace at the entry point to func1 and the second disables trace data at the corresponding exit point. It is necessary to coordinate the rule set with the startup procedure so that the areas traced correspond to the rules used. We typically enable monitoring at main and then gather data looking for good candidates for join points. We then write rules based on these candidates and enable the trace facility only where it corresponds to our rules. 21
6 4.4. Automatically learning typical behavior The domain specific language used by the IDEA system was initially set up as a proof of concept method to verify our technique. However, writing the rules, by hand is cumbersome to say the least. It became apparent that the ID system would work, but that it was a labor intensive project to set up all of the rules. Thus a preferred method for setting up the monitoring program is to watch a live system and first build the DFA from the activities of the system, and then to use this machine in the same manner as before. The DFAs constructed from either the DSL or the learning methods are identical, so the monitoring program is similar regardless of which approach is used. Construction of a DFA by learning proceeds by first running the program with the monitoring data flowing to the learning system. Each executed block sends the function, line, and block number as data. The external process uses the unique combination of function address and block number from this data as the differentiating name of a unique state in the DFA. This new state is added to the machine if it did not already exist. Transitions are tracked from state to state, new states are added as needed, and the DFA is built over time as the program runs. As we noted above, these are not synthetic paths but real normal paths through the code which (assuming a normal workload for the program being monitored) are thus representative of the actual execution of the software being watched. After a time, the program is stopped. Sensing the end of the data, the monitoring process writes the DFA data and the machines are processed in the same manner as if they were constructed from the DSL. The timings for within and max are determined by tracking the number of starts of each state machine as well as the total execution time and the total of the duration of each DFA. Settings for within are factored up by a reasonable amount, and settings for max are not allowed to be less than a certain threshold. 5. Conclusions This paper has introduced the IDEA Intrusion Detection system. IDEA uses instrumented programs as a new source of data for ID, and we have created a proof-of-concept system using several open-source web applications. Modifications at the RTL level in the GCC compiler have enabled us to automatically add the instrumentation to the compiled program, and the modifications are language independent; we support whatever languages GCC supports. We have created patterns which match up to execution paths within the thttpd server, and have monitored the application. Furthermore, we have created simulated intrusions and verified that the data set from the process does in fact trigger the IDEA tool and indicates an alert. Slowdown was measured and is a possible factor in a compute-bound program, but the target of our intrusion detection effort are various web servers, which are typically I/O bound and not compute bound. Our research goal, determining whether this new data source is viable for intrusion detection, has been met. To test that the instrumentation is applicable to larger servers and programs, we have instrumented Apache and other open source projects and verified that they still function as before. Thus they are candidates for our next round of testing for the IDEA intrusion detection system. 22
7 Additionally we are in the process of setting up a dedicated server on the public internet which will further describe our project and also act as a live test. We anticipate receiving some true intrusion attempts at that time, which would trigger the IDEA system. 6. References [1] Apache, at [2] Bace, Rebecca Gurley: Intrusion Detection, Macmillan Technical Publishing, [3] DARPA Intrusion Detection Evaluation Data Sets, Lincoln Laboratory, Massachusetts Institute of Technology. [4] Endorf, Carl, Schultz, Dr. Eugene, Mellander, Jim: Intrusion Detection and Prevention, McGraw- Hill/Osborne, [5] Fizmez, at [6] Gcov, [7] Hoffmeyr, Stephen A., Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security, Vol. 6, Issue 3 (August 1998) [8] Locasto, Michael E., Keromytis, Angelos D.: Binary-level function profiling for intrusion detection and smart error virtualization. Columbia University Technical Report, [9] Mahoney, William and Sousan, William: Using Common Off-The-Shelf Tools To Implement Dynamic Aspects SIGPLAN Notices, vol 42 (2), February [10] Manniatty, William A., Adnan Baykul, Vikas Aggarwal, Joshua Brooks, Aleksandr Krymer, and Samuel Maura, A Linux kernel auditing tool for host-based intrusion detection, 21st Annual Computer Security Applications Conference, December 5-9, 2005, Tucson, Arizona. [11] Monkey, at [12] Netcraft, Web Server Survey, [13] Northcutt, Stephen, and Novak, Judy: Network Intrusion Detection, New Riders, 3 rd ed [14] Peisert, Sean, Matt Bishop, Sidney Karin, Keith Marzullo, Analysis of computer intrusions using sequences of function calls, IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, April-June [15] Proctor, Paul E.: The Practical Intrusion Detection Handbook (Prentice Hall, 2001) [16] Spec; [17] Thttpd, at 23
8 Authors William R. Mahoney received his B.A. and B.S. degrees from Southern Illinois University, and his M.A. and Ph.D. degrees from the University of Nebraska. He is a Research Fellow and Graduate Faculty at the University of Nebraska at Omaha Peter Kiewit Institute. His primary research interests include language compilers, hardware and instruction set design, and code generation and optimization. Prior to the Kiewit Institute Dr. Mahoney worked for 20+ years in the computer design industry, specifically in the areas of embedded computing and real-time operating systems. During this time he was also on the part time faculty of the University of Nebraska at Omaha. His outside interests include bicycling, photography, and more bicycling. William Sousan is a PhD student at the University of Nebraska at Omaha, where he also received his bachelors and masters degrees in Computer Science. His research interests include software engineering with dynamic aspects, agent based internet search technologies, and image and pattern processing, with emphasis on orientationindependent object recognition. He also has an extensive background in embedded systems and is a principal in a local embedded systems engineering firm. 24
Compiler-Assisted Binary Parsing
Compiler-Assisted Binary Parsing Tugrul Ince [email protected] PD Week 2012 26 27 March 2012 Parsing Binary Files Binary analysis is common for o Performance modeling o Computer security o Maintenance
A Linux Kernel Auditing Tool for Host-Based Intrusion Detection
A Linux Kernel Auditing Tool for Host-Based Intrusion Detection William A. Maniatty, Adnan Baykal, Vikas Aggarwal, Joshua Brooks, Aleksandr Krymer and Samuel Maura [email protected] CSI 424/524, William
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Firewalls and IDS. Sumitha Bhandarkar James Esslinger
Firewalls and IDS Sumitha Bhandarkar James Esslinger Outline Background What are firewalls and IDS? How are they different from each other? Firewalls Problems associated with conventional Firewalls Distributed
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Please consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
83-10-40 Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff
83-10-40 Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff Firewalls are an effective method of reducing the possibility of network intrusion by attackers. The key to successful
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Performance Characterization of SPEC CPU2006 Integer Benchmarks on x86-64 64 Architecture
Performance Characterization of SPEC CPU2006 Integer Benchmarks on x86-64 64 Architecture Dong Ye David Kaeli Northeastern University Joydeep Ray Christophe Harle AMD Inc. IISWC 2006 1 Outline Motivation
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
An Eclipse Plug-In for Visualizing Java Code Dependencies on Relational Databases
An Eclipse Plug-In for Visualizing Java Code Dependencies on Relational Databases Paul L. Bergstein, Priyanka Gariba, Vaibhavi Pisolkar, and Sheetal Subbanwad Dept. of Computer and Information Science,
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com [email protected] detecting the unknown Integrity
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
How to Sandbox IIS Automatically without 0 False Positive and Negative
How to Sandbox IIS Automatically without 0 False Positive and Negative Professor Tzi-cker Chiueh Computer Science Department Stony Brook University [email protected] 2/8/06 Blackhat Federal 2006 1 Big
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Database Application Developer Tools Using Static Analysis and Dynamic Profiling
Database Application Developer Tools Using Static Analysis and Dynamic Profiling Surajit Chaudhuri, Vivek Narasayya, Manoj Syamala Microsoft Research {surajitc,viveknar,manojsy}@microsoft.com Abstract
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
CSCI 3136 Principles of Programming Languages
CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University Winter 2013 CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
IBM RATIONAL PERFORMANCE TESTER
IBM RATIONAL PERFORMANCE TESTER Today, a major portion of newly developed enterprise applications is based on Internet connectivity of a geographically distributed work force that all need on-line access
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary
Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary For the first week I was given two papers to study. The first one was Web Service Testing Tools: A Comparative
Traffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
Integrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South
Comparison of Firewall and Intrusion Detection System
Comparison of Firewall and Intrusion Detection System Archana D wankhade 1 Dr P.N.Chatur 2 1 Assistant Professor,Information Technology Department, GCOE, Amravati, India. 2 Head and Professor in Computer
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Network & Agent Based Intrusion Detection Systems
Network & Agent Based Intrusion Detection Systems Hakan Albag TU Munich, Dep. of Computer Science Exchange Student Istanbul Tech. Uni., Dep. Of Comp. Engineering Abstract. The following document is focused
Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
Overview - Snort Intrusion Detection System in Cloud Environment
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview
WebSphere Business Monitor
WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page
Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009
Automating Attack Analysis Using Audit Data Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009 2 Introduction Audit logs are cumbersome and traditionally used after the fact for forensics analysis.
Glossary of Object Oriented Terms
Appendix E Glossary of Object Oriented Terms abstract class: A class primarily intended to define an instance, but can not be instantiated without additional methods. abstract data type: An abstraction
Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z
Network Security EDA491 2011/2012 Laboratory assignment 4 Revision A/576, 2012-05-04 06:13:02Z Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar
Network-Based and Host- Based Intrusion Detection Graduate Seminar 1 Goal This presentation is an in-depth overview of intrusion detection. As such, the purpose of the presentation is for reference. 2
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Computer Architecture
Computer Architecture Slide Sets WS 2013/2014 Prof. Dr. Uwe Brinkschulte M.Sc. Benjamin Betting Part 6 Fundamentals in Performance Evaluation Computer Architecture Part 6 page 1 of 22 Prof. Dr. Uwe Brinkschulte,
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Matt Department of Computer Science and Engineering University of Minnesota [email protected] Abstract We present
Satisfying business needs while maintaining the
Component-Based Development With MQSeries Workflow By Michael S. Pallos Client Application Satisfying business needs while maintaining the flexibility to incorporate new requirements in a timely fashion
A Practical Method to Diagnose Memory Leaks in Java Application Alan Yu
A Practical Method to Diagnose Memory Leaks in Java Application Alan Yu 1. Introduction The Java virtual machine s heap stores all objects created by a running Java application. Objects are created by
Paul Brebner, Senior Researcher, NICTA, [email protected]
Is your Cloud Elastic Enough? Part 2 Paul Brebner, Senior Researcher, NICTA, [email protected] Paul Brebner is a senior researcher in the e-government project at National ICT Australia (NICTA,
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Scanner. tokens scanner parser IR. source code. errors
Scanner source code tokens scanner parser IR errors maps characters into tokens the basic unit of syntax x = x + y; becomes = + ; character string value for a token is a lexeme
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
