Traffic Monitoring and Application Classification: A Novel Approach
|
|
|
- Bertina Foster
- 10 years ago
- Views:
Transcription
1 Traffic Monitoring and Application Classification: A Novel Approach Michalis Faloutsos, UC Riverside QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. Thomas Karagiannis Marios Iliofotou 1
2 General Problem Definition We don t know what goes on in the network Measure and monitor: Who uses the network? For what? How much file-sharing is there? Can we observe any trends? Security questions: Have we been infected by a virus? Is someone scanning our network? Am I attacking others? M. Faloutsos UCR 2
3 Problem in More Detail Given network traffic in terms of flows Flow: tuple (source IP, port; dest IP, port; protocol) Flow statistics: packet sizes, interarrival etc Find which application generates each flow Or which flows are P2P Or detect viruses/worms Issues: Definition of flow hides subtleties Monitoring tools, netflow, provide this M. Faloutsos UCR 3
4 State of the Art Approaches Port-based: some apps use the same port Works well for legacy applications, but not for new apps Statistics-based methods: Measure packet and flow properties Packet size, packet interarrival time etc Number of packets per flow etc Create a profile and classify accordingly Weakness: Statistical properties can be manipulated Packet payload based: Match the signature of the application in payload Weakness Require capturing the packet load (expensive) Identifying the signature is not always easy IP blacklist/whitelist filtering M. Faloutsos UCR 4
5 Our Novelty, Oversimplified We capture the intrinsic behavior of a user Who talks to whom Benefits: Provides novel insight Is more difficult to fake Captures intuitively explainable patterns Claim: our approach can give rise to a new family of tools M. Faloutsos UCR 5
6 How our work differs from others Previous work Our work BLINC: Profile behavior of user (host level) TDGs: Profile behavior of the whole network (network level) M. Faloutsos UCR 6
7 Motivation: People Really Care We started by measuring P2P traffic which explicitly tries to hide Karagiannis (UCR) at CAIDA, summer 2003 How much P2P traffic is out there? RIAA claimed a drop in 2003 We found a slight increase "Is P2P dying or just hiding?" Globecom 2004 M. Faloutsos UCR 7
8 The Reactions RIAA did not like it Respectfully said that we don t know what we are doing The P2P community loved it Without careful scrutiny of our method M. Faloutsos UCR 8
9 More People Got Interested Wired: ``Song-Swap Networks Still Humming" on Karagiannis work. ACM news, PC Magazine, USA Today, Congressional Internet Caucus (J. Kerry!) In litigation docs as supporting evidence! M. Faloutsos UCR 9
10 Structure of the talk Part I: BLINC: A host-based approach for traffic classification Part II: Monitoring using the network-wide behavior: Traffic Dispersion Graphs, TDGs M. Faloutsos UCR 10
11 Part I: BLINC Traffic classification The goal: Classify Internet traffic flows according to the applications that generate them Not as easy as it sounds: Traffic profiling based on TCP/UDP ports Misleading Payload-based classification Practically infeasible (privacy, space) Can require specialized hardware Joint Work with: Thomas Karagiannis, UC Riverside/ Microsoft Konstantina Papagiannaki, Nina Taft, Intel M. Faloutsos UCR 11
12 The State of the Art Recent research approaches Statistical/machine-learning based classification Roughan et al., IMC 04 McGregor et al., PAM 05 Moore et al., SIGMETRICS 05 Signature based Varghese, Fingerhut, Bonomi, SIGCOMM 06 Bonomi, et al. SIGCOMM 06 IP blacklist/whitelist filtering to block bad traffic Soldo+, Markopoulou, ITA 08 UCR/CAIDA a systematic study in progress: What works, under which conditions, why? M. Faloutsos UCR 12
13 Our contribution: BLINC BLINd Classification ie without using payload We present a fundamentally different in the dark approach We shift the focus to the host We identify signature communication patterns Difficult to fake M. Faloutsos UCR 13
14 BLINC overview Characterize the host Insensitive to network dynamics (wire speed) Deployable: Operates on flow records Input from existing equipment Three levels of classification Social : Popularity Functional : Consumer/provider of services Application : Transport layer interactions M. Faloutsos UCR 14
15 Social Level Social: Popularity Bipartite cliques Gaming communities identified by using data mining: fully automated crossassociation Chakrabarti et al KDD 2004 (C. Faloutsos CMU) M. Faloutsos UCR 15
16 Functional level Functional: Infer role of node Server Client Collaborator One way: #source ports vs. # of flows M. Faloutsos UCR 16
17 Social level Characterization of the popularity of hosts Two ways to examine the behavior: Based on number of destination IPs Analyzing communities M. Faloutsos UCR 17
18 Social level: Identifying Communities Find bipartite cliques M. Faloutsos UCR 18
19 Social Level: What can we see Perfect bipartite cliques Attacks Partial bipartite cliques Collaborative applications (p2p, games) Partial bipartite cliques with same domain IPs Server farms (e.g., web, dns, mail) M. Faloutsos UCR 19
20 Social Level: Finding communities in practice Gaming communities identified by using data mining: fully automated cross-association Chakrabarti et al KDD 2004 (C. Faloutsos CMU) M. Faloutsos UCR 20
21 Functional level Characterization based on tuple (IP, Port) Three types of behavior Client Server Collaborative M. Faloutsos UCR 21
22 Functional level: Characterizing the host Y-axis: number of source ports X-axis: number of flows Collaborative applications: No distinction between servers and clients Clients Servers Obscure behavior due to multiple mail protocols and passive ftp M. Faloutsos UCR 22
23 Application level Interactions between network hosts display diverse patterns across application types. We capture patterns using graphlets: Most typical behavior Relationship between fields of the 5-tuple M. Faloutsos UCR 23
24 Application level: Graphlets sourceip destinationip sourceport destinationport Capture the behavior of a single host (IP address) Graphlets are graphs with four columns : src IP, dst IP, src port and dst port Each node is a distinct entry for each column E.g. destination port 445 Lines connect nodes that appear on the same flow M. Faloutsos UCR 24
25 Graphlet Generation (FTP) sourceip destinationip sourceport destinationport X ZY X Z Y X UZ X U Z X X Y Z U M. Faloutsos UCR 25
26 What can Graphlets do for us? Graphlets are a compact way to profile of a host capture the intrinsic behavior of a host Premise: Hosts that do the same, have similar graphlets Approach Create graphlet profiles Classify new hosts if they match existing graphlets M. Faloutsos UCR 26
27 Training Part: Create a Graphlet Library M. Faloutsos UCR 27
28 Additional Heuristics In comparing graphlets, we can use other info: the transport layer protocol (UDP or TCP). the relative cardinality of sets. the communities structure: If X and Y talk to the same hosts, X and Y may be similar Follow this recursively Other heuristics: Using the per-flow average packet size Recursive (mail/dns servers talk to mail/dns servers, etc.) Failed flows (malware, p2p) M. Faloutsos UCR 28
29 Evaluating BLINC We use real network traces Data provided by Intel: Residential (Web, p2p) Genome campus (ftp) Train BLINC on a small part of the trace Apply BLINC on the rest of the trace M. Faloutsos UCR 29
30 Compare with what? Develop a reference point Collect and analyze the whole packet Classification based on payload signatures Not perfect but nothing better than this M. Faloutsos UCR 30
31 Classification Results Metrics Completeness Percentage classified by BLINC relative to benchmark Do we classify most traffic? Accuracy Percentage classified by BLINC correctly When we classify something, is it correct? Exclude unknown and nonpayload flows M. Faloutsos UCR 31
32 Classification results : Totals 80%-90% completeness! >90% accuracy!! BLINC works well M. Faloutsos UCR 32
33 Characterizing the unknown: Non-payload flows BLINC is not limited by non-payload flows or unknown signatures Flows classified as attacks reveal known exploits M. Faloutsos UCR 33
34 BLINC issues and limitations How do we compare graphlets? Graph similarity is difficult to define Currently, based on heuristics and training What if a node runs two apps at the same time? Extensibility Creating and incorporating new graphlets Application sub-types e.g., BitTorrent vs. Kazaa Access vs. Backbone networks? Works better for access networks (e.g. campus) M. Faloutsos UCR 34
35 Developing a Useable Tool Java front-end by Dhiman Barman UCR M. Faloutsos UCR 35
36 Follow up work: Profiling the end user We examine the dynamics of profiling How much variability exists Per node over time Among nodes in a network How can I summarize a graphlet So that I can compare it with others? The answers in PAM 2007 M. Faloutsos UCR 36
37 Conclusions - I We shift the focus from flows to hosts Capture the intrinsic behavior of a host Multi-level analysis: each level provides more detail Good results in practice: BLINC classifies 80-90% of the traffic with greater than 90% accuracy M. Faloutsos UCR 37
38 Part II: Traffic Dispersion Graphs Monitoring traffic as a network-wide phenomenon Paper at Internet Measurement Conference (IMC) 2007 Joint work with: Marios Iliofotou UC Riverside, G. Varghese UCSD Prashanth Pappu, Sumeet Singh (Cisco) M. Mitzenmacher (Harvard) M. Faloutsos UCR 38
39 Traffic Dispersion Graphs Virus signature Traffic Dispersion Graphs: Who talks to whom Deceptively simple definition Provides powerful visualization and novel insight M. Faloutsos UCR 39
40 Defining TDGs A node is an IP address (host, user) A key issue: define an edge (Edge filter) Edge can represent different communications Simplest: edge = the exchange of any packet Edge Filter can be more involved: A number of pkts exchanged TCP with SYN flag set (initiating a TCP connection) sequence of packets (e.g., TCP 3-way handshake) Payload properties such as a content signature M. Faloutsos UCR 40
41 Generating a TDG Pick a monitoring point (router, backbone link) Select an edge filter Edge Filter = What constitutes an edge in the graph? E.g., TCP SYN Dst. Port 80 If a packet satisfies the edge filter, create the link srcip dstip Gather all the links and generate a graph within a time interval, e.g., 300 seconds (5 minutes) M. Faloutsos UCR 41
42 TDGs are a New Kind of Beast TDGs are Directed graphs Time evolving Possibly disconnected TDGs are not yet another scalefree graph TDGs are not a single family of graphs TDGs with different edge filters are different TDGs hide a wealth of information Make cool visualizations Can be mined to provide novel insight M. Faloutsos UCR 42
43 TDGs and Preliminary Results We focus on studying port-based TDGs Even that can give interesting information We study destination ports of known applications: UDP ports: we generate an edge based on the first packet between two hosts TCP we add an edge on a TCP SYN packet for the corresponding destination port number e.g., port 80 for HTTP, port 25 for SMTP etc. M. Faloutsos UCR 43
44 Data Used Real Data: typical duration = 1 hour OC48 from CAIDA (22 million flows, 3.5 million IPs) Abilene Backbone (23.5 million flows, 6 million IPs) WIDE Backbone (5 million flows, 1 million IPs) Access links traces (University of Auckland) + UCR traces were studied but not shown here (future work) M. Faloutsos UCR 44
45 TDGs as a Visualization Tool M. Faloutsos UCR 45
46 Identifying Hierarchies SMTP ( ) DNS Hierarchical structure with multiple levels of hierarchy M. Faloutsos UCR 46
47 Web Traffic Web: https Web: port 8080 M. Faloutsos UCR 47
48 TDG Visualizations (Peer-to-Peer) WinMX P2P App UDP Dst. Port sec Observations Many nodes with inand-out degree (InO) One large connected component Long chains InO degree Bidirectional Zoom M. Faloutsos UCR 48
49 Detecting Viruses and Unusual Activities Random IP range scanning activity? Slammer: port 1434 NetBIOS: port 137 M. Faloutsos UCR 49
50 Visually detecting virus activity Virus signature Virus (slammer) creates more star configurations Directivity makes it clearer Center node -> nodes, for virus stars M. Faloutsos UCR 50
51 Quantitative Study of TDGs M. Faloutsos UCR 51
52 Using Graph Metrics We use new and commonly used metrics Degree distribution Giant Connected Component Largest connected subgraph Number of connected components In-Out nodes Node with in- and out- edges Joint Degree Distribution M. Faloutsos UCR 52
53 Degree Distribution P(X x) P(X x) P(X x) Degree Degree Degree The degree distributions of TDGs varies a lot. Only some distributions can be modeled by power-laws (HTTP, DNS). P2P communities (edonkey) have many medium degree nodes (4 to 30). HTTP and DNS have few nodes with very high degrees. NetBIOS: Scanning activity: 98% of nodes have degree of one, few nodes with very high degree scanners M. Faloutsos UCR 53
54 Joint Degree Distribution (JDD) JDD: P(k1,k2), the probability that a randomly selected edge connects nodes of degrees k1 and k2 Normalized by the total Number of links M. Faloutsos UCR 54
55 Joint Degree Distribution (JDD) HTTP (client-server) WinMX (peer-to-peer) DNS (c-s and p2p) Couture plots (log-log scale due to high variability) x-axis: Degree of the node on the one end of the link y-axis: Degree of the other node Observations: HTTP: low degree client to low to high degree servers WinMX: medium degree nodes are connected DNS: sings of both client server and peer-to-peer behavior Top degree nodes are not directly connected (top right corner) M. Faloutsos UCR 55
56 TDGs Can Distinguish Applications Monitor the top 10 ports number in number of flows. Scatter Plot: Size of GCC Vs number of connected components. Stable over Time! We can separate apps! OC48 Trace Soribada UDP port UDP port 7674 WinMX UDP port 6257 M. Faloutsos UCR 56 TCP port 1433 edonkey TCP port 4662 UDP port 4665 NetBIOS UDP port 137 MS-SQL-S
57 TDGs as a Monitoring/Security Tool Two modes of operation: Classification: based on previously observed thresholds. Security: calculate TDGs and trigger an alarm on large change How do we choose which TDGs to monitor? Manually, Automatically-adaptively, Using automatically extracted signatures of content (Earlybird) M. Faloutsos UCR 57
58 Final Conclusions The behavior of hosts hides a information Studying the transport-layer can provide insight We can do this at two levels Host level using using BLINC Network-wide level using TDGs Advantages: More difficult to fake More intuitive to interpret and deploy It can be used to monitor and secure M. Faloutsos UCR 58
59 My Areas of Research Measurements and models for the Internet Network Topology: models and patterns [ToN03, CSB06, NSDI07] Traffic monitoring: models and classification [sigcomm05] [PAM07] Routing Security Modeling and Securing BGP routing NEMECIS: [Infocom04, 07] Adhoc routing security: [ICNP 06][ICNP07] Quantifying and protecting against URL hijacking [miniinfocom08] Design and capacity of WLANs and hybrid nets [mobicom07, infocom08] DART: A radical network layer for ad hoc [Infocom04] [ToN06] Cooperative Diversity in ad hoc networks [JSAC06, Infocom06] M. Faloutsos UCR 59
60 Extras M. Faloutsos UCR 60
61 Main research areas Measurements Traffic, BGP routing and topology, ad hoc Routing scalable ad hoc, BGP instability Security DoS, BGP attacks, ad hoc DoS Designing the future network Rethinking the network architecture M. Faloutsos UCR 61
62 TDG Visualization (DNS) DNS TDG UDP Dst. Port 53 5 seconds In- and Outdegree nodes Very common in DNS, presence of few very high degree node One large Connected Component! (even in such small interval) M. Faloutsos UCR 62
63 TDG Visualization (HTTP)HTTP TDG TCP SYN Dst. Port seconds A busy web server? Observations There is not a large connected component as in DNS Clear roles very few nodes with inand-out degrees) Web caches? Web proxies? Many disconnected components M. Faloutsos UCR 63
64 TDG Visualization (Slammer Worm) Slammer Worm UDP Dst. port seconds About: Jan 25, MS-SQL- Server 2000 exploit. Trace: April 24th Observations (Scanning Activity) Many high out-degree nodes Many disconnected components The majority of nodes have only in-degree (nodes being scanned) M. Faloutsos UCR 64
Network Monitoring Using Traffic Dispersion Graphs (TDGs)
Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George
Network Monitoring using Traffic Dispersion Graphs (TDGs)
Network Monitoring using Traffic Dispersion Graphs (TDGs) Marios Iliofotou UC Riverside [email protected] Michael Mitzenmacher Harvard University [email protected] Prashanth Pappu Rinera Networks [email protected]
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
Analysis of Communication Patterns in Network Flows to Discover Application Intent
Analysis of Communication Patterns in Network Flows to Discover Application Intent Presented by: William H. Turkett, Jr. Department of Computer Science FloCon 2013 January 9, 2013 Port- and payload signature-based
How is SUNET really used?
MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
Lightweight Detection of DoS Attacks
Lightweight Detection of DoS Attacks Sirikarn Pukkawanna *, Vasaka Visoottiviseth *, Panita Pongpaibool * Department of Computer Science, Mahidol University, Rama 6 Rd., Bangkok 10400, THAILAND E-mail:
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
The Internet Is Like A Jellyfish
The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Security Type of attacks Firewalls Protocols Packet filter
Overview Security Type of attacks Firewalls Protocols Packet filter Computer Net Lab/Praktikum Datenverarbeitung 2 1 Security Security means, protect information (during and after processing) against impairment
CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls
CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services
Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
Internet2 NetFlow Weekly Reports
Internet2 NetFlow Weekly Reports Stanislav Shalunov Internet2 Fall Member Meeting, Indianapolis, 2003-10-13 What is NetFlow? Originally a Cisco proprietary technology Now supported by other vendors and
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Firewalls. Network Security. Firewalls Defined. Firewalls
Network Security Firewalls Firewalls Types of Firewalls Screening router firewalls Computer-based firewalls Firewall appliances Host firewalls (firewalls on clients and servers) Inspection Methods Firewall
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Firewall. User Manual
Firewall User Manual 1 IX. Firewall This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security. 9.1 General Policy The firewall is enabled by default.
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Overview. Packet filter
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Server Iron Hands-on Training
Server Iron Hands-on Training Training Session Agenda Server Iron L4 Solutions Server Iron L7 Solutions Server Iron Security Solutions High Availability Server Iron Designs 2 Four Key Reasons for Server
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino. http://staff.polito.it/mario.
Multi-layer switch hardware commutation across various layers Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Based on chapter 10 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill,
Firewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Layered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
Appmon: An Application for Accurate per Application Network Traffic Characterization
Appmon: An Application for Accurate per Application Network Traffic Characterization Demetres Antoniades 1, Michalis Polychronakis 1, Spiros Antonatos 1, Evangelos P. Markatos 1, Sven Ubik 2, Arne Øslebø
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Analyzing Network Traffic to Detect E-Mail Spamming Machines
Analyzing Network Traffic to Detect E-Mail Spamming Machines Prasanna Desikan and Jaideep Srivastava Department of Computer Science University of Minnesota, Minneapolis, MN-55455 {desikan,srivasta}@cs.umn.edu
Computer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
