Simplified Network Traffic Visualization for Real-Time Security Analysis
|
|
|
- Brianna Powell
- 10 years ago
- Views:
Transcription
1 Simplified Network Traffic Visualization for Real-Time Security Analysis Matthew Dean and Lucas Vespa Department of Computer Science University of Illinois Springfield Springfield, IL Abstract Although traditional methods of network security analysis used in investigating network traffic and log files are essential to mitigating malicious network activity, these methods alone cannot keep up with constant increases in malevolent network traffic. Many visualization tools have been created as a supplement to traditional analysis and intrusion detection systems. Even though these tools are useful, each tool tends to have a niche use. Also, many network administrators fill dual roles as administrators and security analysts and have little time to learn different complex visualization tools. We therefore observe a need for a simple out-of-the-box solution for general network security visualization. We hope to fill this need with our tool called VNR, which in addition to its simplicity embeds transport layer data within visualizations allowing for better intra-host analysis. VNR can also be used for real-time or auditing purposes by configuring the amount of data visualized within specific time frames. I. INTRODUCTION Malicious network traffic is increasing [1], including attacks on business networks, and also attacks originating from compromised hosts within networks. This increase in malicious behavior, along with other factors such as increasing network rates and increasing numbers of virtual and non-virtual hosts, makes a network security analyst s job very difficult. Traditional methods of network monitoring and log dissemination alone cannot keep up with demand for analysis. Alternative methods are required to aid in both real-time and log-based network security analysis. Visualization tools [2], [3], [4], [5], [6] are a promising solution to the need for simplified analysis techniques, allowing analysts more freedom and a different perspective than traditional analysis. Many of these tools allow for several levels of data abstraction, permitting the user to drill down to packet level data if desired, or view high level visual data. There is a great deal of overlap between many visualization tools; however, each tool usually has some niche functionality. As useful as network security visualization is to the analyst, there are some general problems that most visualization tools do not address. The following is a list of these problems, and possible solutions. P roblem: Many analysts are not full time analysts, but rather admin/analysts who cannot devote their full attention to learning visual analysis tools, or for that matter, complex analysis techniques in general. Solution: Create a basic, out-of-the-box visualization solution with functionality that is obvious to those with basic network knowledge. P roblem: Many visualization tools utilize heavy abstraction, wherein, visualizations display only IP layer data if any data at all. Although this is useful for some analysis, transport and application layer data helps in detecting irregular behavior within single hosts. Solution: Mix abstraction levels by embedding transport and/or application layer data across all visualized hosts, while still displaying IP layer host relationships. P roblem: Grouping hosts based on internal/external status may focus an analyst s attention on external attacks. However, a great deal of malicious traffic may actually come from compromised hosts within a network, and internal IP ranges can be spoofed. These can be of greater concern than external attacks. Solution: Treat all hosts equally in any graphbased visualization. Do not force groupings based on internal/external addresses. P roblem: Many visualization tools are either too complex to visualize in real-time, or the amount of data visualized cannot be adjusted, such that real-time capture will yield useful analysis. Solution: Simplify visualizations such that traffic can generally be process in real-time. Allow the user to adjust how many hosts will be displayed such that an accurate snapshot of current network traffic is visualized. In this work we implement each of the above solutions in a network security visualization tool called VNR (Visualization of Networks in Real-time), a screenshot of which is shown in Figure 1. The visualizations and functionality of VNR need little explanation to those with fundamental network knowledge. VNR has basic grid and graph views which display IP layer relationships and transport layer information. Internal and external hosts are not forced to any locations or groupings. The visualizations are simple and old hosts fade from view by default, creating potential for real-time analysis. VNR also implements many traditional features such as details on demand and summary statistics. The remainder of this paper is organized as follows. Section II presents related work in the area of network and security
2 Fig. 1. VNR Screenshot visualization. Section III summarizes VNR s design and basic functionality. Example uses of VNR for security and network analysis, and a further discussion of VNR are presented in Section IV. Conclusions are presented in Section V. II. R ELATED W ORK A great deal of work has been done in the areas of visualization for networks [7], [8], [9] and security [10], [11], [12], [13]. Many tools for visualization have been produced, amongst which there is a great deal of overlap, with each tool having niche functionality. Most tools concentrate on visualizing trace files for better analysis, although some are designed for real-time analysis as well. Specifically, in network visualization, TNV [4] displays a time-based matrix of host communications. TNV s matrix is detailed and gives the analyst many complex analysis tools. Several levels of granularity are displayed. Visual analysis of routing [5], [14] is another area of concern. BGPeep [5] is a visualization tool for BGP analysis. It presents a visual organization by IP space, using network address prefixes to categorize data. VisTracer [15] is a network tool to evaluate routing changes over time, and identify legitimate versus malicious route adjustments. Minarick and Dymacek [16] create a tool to use graphs to visualize netflow data. The graphs also include DNS name lookup and common port/service names for ease of understanding. Even more specifically, network security visualization has been proposed to aid in the timely mitigation of network threats. Fligg et al [17] present an overview of network security visualization, specifically, the psychology of visualization and specific rules for efficiently utilizing particular space. Many visualization tools allow multiple levels of visual data abstraction, from high-level overviews to low-level details. TVi [18] reflects this functionality, implemented as a visual querying tool for network traces. Teoh et al [19] demonstrate how to perform visual analysis of log files as an alternative to traditional automated log analysis processes. Because many visualization tools can help detect scans but not identify scan types, Muelder et al [20] create a methodology for further identifying scan characteristics, utilizing PortViz [3] and other tools. NFlowVis [21] uses a treemap visualization linked to attack alerts to analyze the validity of system alerts, as well as other analysis such as network service usage. Similar to NFlowVis, Garnet [6] uses a treemap to layout subnets, and then creates an attack graph which relates to the treemap. Musa et al [22] visualize Snort alerts in a 3D time-series graph. Netgrok [2] can visualize trace files by representing hosts in graph or treemap form. III. VNR OVERVIEW A. Overview To facilitate easy evaluation of VNR s visualizations, two simple views are utilized, a grid view and graph view. Hosts communicating on the network are represented by a single element within each view. In grid view, these elements are cells, and each host is represented by a single cell. In graph view, the elements are vertices and each host is represented by a single vertex. Figure 2(a) shows the grid view and Figure 2(b) shows the graph view. Each view s output is simple to interpret allowing out-of-the-box analysis. Each element in either view displays multi-layer information about a host, allowing for intra-host analysis. Communicating hosts are connected by edges in the graph view. Hosts are selectable and details for a selected host are displayed in the details pane, an example of which is shown
3 (a) Grid View (b) Graph View Fig. 2. (c) Details Pane VNR Views in Figure 2(c). Each view displays x currently communicating hosts, where x is configurable and has a default value of 100 hosts. The value of x can be adjusted depending on the level of real-time analysis desired. It should be noted that VNR is not strictly a real-time tool. By increasing x to a very large value, VNR can be used for auditing and trace file analysis with many hosts. Packet capture in VNR is achieved using PCAP.Net [23], a Dot Net wrapper for the popular WinPCAP libraries [24]. Microsoft C# [25] is therefore used for the application development. Graph visualization is performed using Microsoft Automated Graph Layout (MSAGL) [26], developed by Microsoft research. B. Views and Features a) Grid View: The grid view is a collection of cell elements, one for each of the x most recently communicating hosts. The host information includes network IP, packet counts, current embedded protocol and other configurable information. The simple layout and efficient use of space in the grid view allows maximum intra-host information to be displayed. This view is therefore especially useful for analyzing the behavior of individual hosts. Clicking a host in the grid view will update the details pane with information for the selected host. Older hosts slowly fade from the grid if no new traffic is received from them. b) Graph View: The graph view displays each host element (vertex), and also connects communicating hosts. The hosts present in the graph view are synced with the grid view. Clicking a host in the graph view displays details for the selected host. c) Details Pane: Packet level and summary information are displayed for each host in the details pane. Some of the information displayed includes individual packets sent and received by the selected host and summary information such as the majority embedded protocol, the time the host first appeared, host name and size of communicated data. IV. D ISCUSSIONS Figure 3(a) shows what a simple NMAP network scan looks like in VNR. A quick appearance of a one-to-many host relationship demonstrates a scan of a subnet. Although, this is only one very obvious use of VNR, more subtle variations of this can help identify scans that might go undetected otherwise. Once a potential scan is visually detected, more information about individual hosts can be gathered from the grid view and details pane. Figure 3(b) shows what a scan of an individual host looks like in the grid view. Typically, in the grid view, the protocol, port and other fields tend to seemingly remain static due to communications of one type. However, during a scan, some fields will look as if they are flashing. This demonstrates a
4 (a) NMAP scan of a network. Fig. 3. (b) NMAP scan of a host VNR Visualizations rapid change in values which indicates a potential scan. The image in Figure 3(b) is created artificially from a base screen shot of the grid view. to demonstrate what this activity looks like. We had to create the image because it is impossible to take a screen shot while the screen is refreshing. A great deal of malicious activity shows up as rapidly changing fields in the grid view, and can be a starting point for detecting malicious activity. Other methods of detecting malicious behavior are also present in the grid view. The visualizations in VNR can be used to identify many other types of scans and general malicious activity. Any information that rapidly changes within the header fields of two communicating hosts will be detected by an analyst using VNR. In addition, all many-to-few communication relationships will be exposed to the analyst. In addition, traditional packet level and summary analysis can still be utilized due to the details on demand ability of VNR. VNR can also be used for auditing of large recorded network trace files for non realtime analysis. This allows for a more detailed investigation of network behavior. In the future, besides the ability to drill down to details, we will also include the ability to jump back to host level from the details level. For example, if an analyst clicks a host to view packet level details and subsequently notices a suspicious address in the recorded packets for that host, the analyst will simply be able to click on that suspicious address and the host associated with the address will become the selected host in the current grid or graph view. This will allow an analyst to easily follow audit trails in real-time or while analyzing trace files. V. C ONCLUSIONS In this work we have presented VNR, a network security visualization tool with easy to understand visualizations. VNR displays information from multiple network layers simultaneously and can be used for real-time or log analysis. We have demonstrated the functionality of VNR and shown its usefulness for detecting malicious network activity. We believe that tools like the one presented in this work are an essential step in mitigating future network threats, and that VNR is a positive augmentation toward generalized use of network security visualization tools. R EFERENCES [1] M. Kowtko, Securing our nation and protecting privacy, in Systems, Applications and Technology Conference (LISAT), 2011 IEEE Long Island, May 2011, pp [2] R. Blue, C. Dunne, A. Fuchs, K. King, and A. Schulman, Visualizing real-time network resource usage, in Proceedings of the 5th international workshop on Visualization for Computer Security, ser. VizSec 08, 2008, pp [3] J. McPherson, K.-L. Ma, P. Krystosk, T. Bartoletti, and M. Christensen, Portvis: a tool for port-based detection of security events, in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp [4] J. Goodall, W. Lutters, P. Rheingans, and A. Komlodi, Preserving the big picture: visual network traffic analysis with tnv, in Visualization for Computer Security, (VizSEC 05). IEEE Workshop on, October 2005, pp [5] J. Shearer, K.-L. Ma, and T. Kohlenberg, Bgpeep: An ip-space centered view for internet routing data, in Visualization for Computer Security, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008, pp [6] L. Williams, R. Lippmann, and K. Ingols, Garnet: A graphical attack graph and reachability network evaluation tool, in Proceedings of the 5th international workshop on Visualization for Computer Security, ser. VizSec 08, 2008, pp [7] C. Kintzel, J. Fuchs, and F. Mansmann, Monitoring large ip spaces with clockview, in Proceedings of the 8th International Symposium on Visualization for Cyber Security, ser. VizSec 11, 2011, pp. 2:1 2:10. [8] C. Horn and A. D Amico, Visual analysis of goal-directed network defense decisions, in VizSec 11: Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011, pp [9] S. S. Kim and A. L. N. Reddy, Netviewer: a network traffic visualization and analysis tool, in Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19, ser. LISA 05, 2005, pp [10] L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, Malware images: visualization and automatic classification, in Proceedings of the 8th International Symposium on Visualization for Cyber Security, ser. VizSec 11, 2011, pp. 4:1 4:7. [11] A. Singh, L. Bradel, A. Endert, R. Kincaid, C. Andrews, and C. North, Supporting the cyber analytic process using visual history on large displays, in Proceedings of the 8th International Symposium on Visualization for Cyber Security, ser. VizSec 11, 2011, pp. 3:1 3:8. [12] R. Veras, J. Thorpe, and C. Collins, Visualizing semantics in passwords: the role of dates, in Proceedings of the Ninth International Symposium on Visualization for Cyber Security, ser. VizSec 12, 2012, pp
5 [13] L. Harrison, R. Spahn, M. Iannacone, E. Downing, and J. R. Goodall, Nv: Nessus vulnerability visualization for the web, in Proceedings of the Ninth International Symposium on Visualization for Cyber Security, ser. VizSec 12, 2012, pp [14] S. T. Teoh, K.-L. Ma, and S. F. Wu, A visual exploration process for the analysis of internet routing data, in Proceedings of the 14th IEEE Visualization 2003 (VIS 03), ser. VIS 03, 2003, pp. 69. [15] F. Fischer, J. Fuchs, P.-A. Vervier, F. Mansmann, and O. Thonnard, Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes, in Proceedings of the Ninth International Symposium on Visualization for Cyber Security, ser. VizSec 12, 2012, pp [16] P. Minarik and T. Dymacek, Netflow data visualization based on graphs, in Proceedings of the 5th international workshop on Visualization for Computer Security, ser. VizSec 08, 2008, pp [17] K. Fligg and G. Max, Network security visualization, IEEE Network Special Issue on Recent Developments in Network Intrusion Detection, Apr [18] A. Boschetti, L. Salgarelli, C. Muelder, and K.-L. Ma, Tvi: a visual querying system for network monitoring and anomaly detection, in Proceedings of the 8th International Symposium on Visualization for Cyber Security, ser. VizSec 11, 2011, pp. 1:1 1:10. [19] S. T. Teoh, T. Jankun-Kelly, K.-L. Ma, and F. S. Wu, Visual data analysis for detecting flaws and intruders in computer network systems, IEEE Computer Graphics and Applications, special issue on Visual Analytics, [20] C. Muelder, K.-L. Ma, and T. Bartoletti, A visualization methodology for characterization of network scans, in Proceedings of the IEEE Workshops on Visualization for Computer Security, ser. VIZSEC 05, 2005, pp. 4. [21] F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel, Large-scale network monitoring for visual analysis of attacks, in Proceedings of the 5th international workshop on Visualization for Computer Security, ser. VizSec 08, 2008, pp [22] S. Musa and D. J. Parish, Using time series 3d alertgraph and false alert classification to analyse snort alerts, in Proceedings of the 5th international workshop on Visualization for Computer Security, ser. VizSec 08, 2008, pp [23] Pcap.net, 2013, [24] Winpcap, 2013, [25] Microsoft visual studio express for windows desktop, 2013, [26] Microsoft automatic graph layout, 2013,
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
An Adaptable Innovative Visualization For Multiple Levels of Users
World Applied Sciences Journal 15 (5): 722-727, 2011 ISSN 1818-4952 IDOSI Publications, 2011 An Adaptable Innovative Visualization For Multiple Levels of Users Doris Hooi-Ten Wong and Sureswaran Ramadass
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Literature Review in Visual Analytics for Malware Pattern Analysis
Literature Review in Visual Analytics for Malware Pattern Analysis M. Wagner, W. Aigner, A. Haberson, A. Rind St. Poelten University of Applied Sciences, Matthias Corvinus-Strasse 15, 3100 St. Poelten,
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansmann, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansman, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks Florian Mansmann, Fabian Fischer, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel [email protected] Abstract: While
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Course Title: Penetration Testing: Network & Perimeter Testing
Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
The Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
Flamingo: Visualizing Internet Traffic
Flamingo: Visualizing Internet Traffic Jon Oberheide, Michael Goff, Manish Karir Networking Research and Development Merit Network Inc. Ann Arbor, MI 48104 USA {jonojono,goffm,mkarir}@merit.edu Abstract
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
D. Grzetich 6/26/2013. The Problem We Face Today
Ideas on Using Asset Criticality Inference (ACI) Through Gathering and Processing of Asset Contextual Utilizing Analytical Models and Processing Rules D. Grzetich 6/26/2013 The Problem We Face Today Security
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Teryl Taylor, Stephen Brooks and John McHugh Abstract NetBytes Host Viewer is an interactive visualization
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
