A Survey on Honeypot Based Signature Generation Techniques in Computer Network Security
|
|
|
- Donna Greene
- 10 years ago
- Views:
Transcription
1 A Survey on Honeypot Based Signature Generation Techniques in Computer Network Security Geetika yadav 1, Ms.Prabhjot Kaur 2 1 M.Tech Student, Department of CSE, B.S.Anangpuria Institute of Technology and Management, Faridabad Haryana, India 2 Assistant Professor, Department of CSE, B.S.Anangpuria Institute of Technology and Management, Faridabad Haryana, India Abstract- Honeypot is a resource that is used in the area of network security, which is intended to be compromised. Honeypots reduces the number of false alerts as each traffic is considered as suspicious.internet worms are of major concern for information and network security. Worms are malicious codes which propagate themselves, after affecting a host will try to infect other hosts. This paper describes Anomaly based detection technique and signature based detection technique to detect the presence of worm and generate signature for the detected worm. Keywords:Cyber attack,honeypots, polymorphic worm,security. I. Introduction A honeypot is a resource whose value is being attacked or compromised. It traps attacks, records intrusion information about tools and activities of the hacking process and prevents attacks. Every traffic to and from a honeypot is considered as unauthorized activity. It utilizes network s unused IP s and analyze attackers behavior and decreases false positives. There are various types of honeypots available based on their aims and the level of interaction. If we look at the aims of the honeypots we can see that there are two types of honeypots which are research honeypots and production honeypot. A.Research honeypot Research honeypots are used by military,research and government organizations. Their aim is to discover new threats and learn more about the blackhat motives and techniques. The objective is how to protect the system better. They capture huge amount of information about the attack. Research honeypot is an excellent tool for capturing automated attacks such as auto-rooters or worms. Research honeypots contribute little to the direct security of an organization. B. Production honeypots Production honeypot is implemented inside the production network to help mitigate risk. They protect the target system by deceiving and detecting attacks, giving alert to administrator. They are capturing limited amount of information. We can categorize honeypots according to the level of interaction. Level of interaction means how much the hacker will be able to interact with the system. More level of interaction brings more risk into the network security. There are three categories of levels of interaction in honeypots these are low interaction honeypot, medium interaction honeypot and high interaction honeypot. A.Low Interaction honeypot Low interaction honeypots are used to detect the hackers and deceive them by emulating the operating system services and port services on the host operating system. The interaction with other hosts is limited which reduces the propogation of attacks. These can be used to identify new worms or viruses and analyzes the traffic that is going on through the network. It captures limited information which is mainly transactional data and very limited interaction ISSN: Page 276
2 therefore it is very easy to fingerprint. Examples of low interaction interaction honeypot are Honeyd,Spector, KFsensor and Dionaea. Honeyd Honeyd is developed by Niels Provos from university of Michiga. Honeyd is an open source solution and designed for UNIX systems. It is configurable so anyone can create their own services and decide which port to open and listen. Honeyd captures TCP traffic that hacker is generating. When the hacker establishes the connection with Honeyd, Honeyd generates fake messages and return them to the hacker to fool the hacker. It can capture the connection on any port and it is being able to change services. Nepenthes Nepenthes is developed with Mwcollect. According to Maggie F. and Zanero S. Nepenthes is working on five modules which are vulnerability, shellcode parsing, fetching, logging and submission modules. Vulnerability function allows us to create vulnerable services. Shellcode parsing takes the payload and examine on it and get information about the extracted data. If any important data is found to examine then fatch functionality gets the malware and submit to the center part. You can log the information that you have by logging function of Nepenthes.Nepenthes is used for mostly malicious software that are spreading over internet automatically. One of the strength of the Nepenthes is that it emulates FTP and TFTP servers so the attacker can upload the malicious software to the honeypot which allows the forensic party to analyze the threat. Fig.Honeyd structure from virtual honeypots:from Botnet tracking to Intrusion Detection B. Medium interaction honeypots Medium Interaction honeypots are most advanced than low interaction honeypots. Still operating system does not exists. More information and more complicated attacks from the hackers can be obtained. MWcollect, Honeytrap and Nepenthes are some of the medium interaction honeypot that are used today. Fig.Nepenthesis architecture from Maggi F. and Zanero S. C. High Interaction Honeypot High interaction honeypots are the most advanced honeypots.unlike Low interaction and Mediun interaction honeypots there is an operating system.more data can be captured from hackers activities. These are also known as GEN-II honeypots and stated development in 2002.They provide better ISSN: Page 277
3 data capture and control mechanisms. These kind of honeypots are very time consuming and difficult to maintain. The number of honeypots in the network is limited. The risk associated with these honeypots is higher because they can be used easily as launch pads for attacks. Example of High interaction honeypot is Honeywall. Honeywall The Honeywall has three virtual network interfaces et0 is bridged to vmnet6,it is the attacker side.eth1 is bridged to vmnet5,it is the honeypot side. Finally eth2 is bridged to vmnet3,it is the management administration and it allows remote administration of Honeywall.Eth0 and eth1 are making a bridge thus none of these interfaces have a network address making these two interfaces invisible. Once managed to install and run all the virtual machines properly, we use the attacker machine in order to hack the honeypot. The first step is to detect any security flow that we could exploit. In order to do that we used two tools : Nmap and Nessus[5]. hosts can communicate. A worm program is selfreplicating: it remotely exploits a software vulnerability on a victim host, such that the victim becomes infected, and itself begins remotely infecting other victims. Researchers attention has turned to methods for containing the spread of a worm. Three chief strategies exist for containing worms by blocking their connections to potential victims: discovering ports on which worms appear to be spreading, and filtering all traffic destined for those ports and discovering source addresses of infected hosts and filtering all traffic from those source addresses; and discovering the payload content string that a worm uses in its infection attempts, and filtering all flows whose payloads contain that content string. Every worm has some invariant byte pattern which is used as signature for detecting a worm. Worm detection algorithms are categorized into two categories Anomaly based detection and Signature based detection. Anomaly based system observe the traffic statistics and host behavior to detect previously known worms to detect malicious traffic it requires to understand normal traffic behavior. this method is found to be effective in detecting unknown worms, it generates high false alarm. Signature based detection looks for specific byte sequence in each packet. If any match found it will be identified as malicious[12]. II. Signature Generation Techniques Attacker Vmnet6 IP: Mask: External interface Vmnet6 Eth0 Internal No IP interface Eth1 No IP Management Interface Vmnet3 Eth2 IP: Manage ment Vmnet3 IP: Mask: To generate signature for the detected worm so that they can be detected early and can not propogate our system. For this several techniques are available which are given below: A. Content based Signature generation techniques Honeypot IP: Mask: Internal Interface Eth1 No IP Fig.Honeywall Implementation Several algorithm have been proposed for anomaly based worm detection and signature based detection.but none can cover entire range of worms.one or the early work in this category is Honeycomb, proposed by Keibach and Crowcroft.Honeycomb combines honeypot technology with automated signature generation scheme to detect malicious network traffic Honeycomb generates signature consisting of a single contiguous substring of a worms payload to match all worms instances. Honeycomb has implemented Longest Common Substring(LCS) algorithm to spot the similarities in packet payloads. Problem with Honeycomb is that it generates single contiguous substrings of worm s payload to match all instances of polymorphic worms. Honeycomb often generate multiple alarms for same attack and unable to detect multiple instances of a polymorphic worms[12]. In recent years, a series of Internet worms has exploited the confluence of the relative lack of diversity in system and server software run by Internet-attached hosts, and the ease with which these Hyang-Ah Kim and Karp describes Autograph a distributed, automated worm signature generation scheme to detect polymorphic worms. Autograph takes input from across DMZ traffic that includes benign traffic and selects suspicious traffic ISSN: Page 278
4 using certain heuristic. Payloads partition is done into different content block using COPP algorithm. The content blocks are analyzed and Autograph selects most frequently occurring byte sequence across the flows in suspicious flow pool. Prevalence histogram is generated for each content block which acts as worm signature. Polymorphic worms may change their payloads in each injection. Autograph fails to address this problem[12]. James Newsome,Brad Karp and Dawn Song address these problems in Polygraph by generating multiple disjoint content substrings to match all instances of a polymorphic worm. They observed that multiple invariant substrings is often present in all variant payloads of a polymorphic worm. Such invariant substrings include protocol framing byte,return addresses and in some cases obfuscated code. Polygraph divides signatures into tokens-a contiguous byte sequence. The system extracts tokens automatically and represents each suspicious flow as a sequence of tokens.the system is noise tolerant the quality of signature depends on the performance of the flow classifier[13]. Zhichun et al., have proposed Hamsa-a network based signature generator scan be connected to routers via a span port or an optical splitter for monitoring the traffic. Hamsa follows the Polygraph token based approach, but replaced suffix tree method of token extraction with light weight suffix array method which increases the speedup of token extraction process 100 folds.hamsa signature quality is also dependent on the performance of the flow classifier chosen. Presence of too much noise will increase the complexity of signature generation algorithm and reduce the quality of signature generated[12]. LISABETH is an improved version of hamsa. All these techniques generate automated signatures for polymorphic worms based on multiple invariant substrings. But these signatures are based on single instances of multiple worms. Hence they can detect only the known worms. Yong Tang et.al has adopted double-honeynet technique which includes two honeypots, one honeypot for inbound traffic with high interaction and other for outbound traffic with low interaction. Since the outbound honeypot is low interactive- it is not able to collect all the worm instances hence it is not able to generate an efficient signature[16]. Mohssen et al., have proposed double honeynet with high interactive honeypot for outbound connections, hence can collect sufficient amount of worm instances. For signature generation different methods like protocol classifier, clustering based on destination port, substring extraction algorithm, an efficient algorithm that converts worm substrings into binary representations and using these binary representation for pattern matching [15], using principal component analysis technique have been used to reduce the dimension of worm payloads[12]. B. Anomaly Based signature generation technique Here a virtual system is set to analyze the behavior of worm and this analysis is used for the detection of the similar worms. A specific worm after attacking a system goes in search of a system with similar vulnerability so this behavior is detected by the virtual machine and is used as signature for worm detection. Pan Xiaohui et al., have designed a hybrid method based on worms propagation model. Authors proposed a hybrid method for detecting polymorphic worm accurately in the early stage. It combines port scan detection and emulation, port scan detects the suspicious packet and emulator first executes every instruction byte and detects is it a worm or not. Song Qing et al., proposes a Worm Terminator which detects and contains the fast spreading worm based on its characteristic a fast spreading worm will start to infect others as soon as it successfully infects one host. Worm Terminator also exploits by observation that a fast spreading worm keeps exploiting the same set of vulnerabilities when infecting new machines. III. Conclusion This paper summarizes some of the techniques to generate signature for detected worms. Among the techniques available Content based signature generation technique is easy to implement because it considers the payload of worm and treat them as strings of bytes which are used to generate signature and these signatures are stored in signature pool but anomaly based signature generation technique analyzes the behavior of the worm which requires efficient training which in real time is difficult to achieve. References [1]Mathew L.Bringer, Christopher A. Chelmecki, Hiroshi Fujinoki A Survey:Recent Advances and Future Trends in Honeypot Research I.J. Computer Network and Information Security,2012. [2]A. Chandra,K.Lalitha Honeypots:A New Mechanism for Network Security IJPaper Vol.04 special Issue [3]Srivastha S Rao,Vinay Hedge,Boruthalupula Maneesh,Jyoti Prasad N M,Suhas Suresh Web based Honeypots Network International Journal of Scientific and Research Publications,Volume3,Issue8,2013. [4]Gary Kelly,Diane Gan Analysis of Attacks Using a Honeypot Springer-Verlag Berlin Heidelberg,2011. ISSN: Page 279
5 [5]Deniz Akkaya-Fabien Thalgott Honeypots in network security-a Thesis Linnaeus University. [6] John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy. Martín Abadi Heat-seeking Honeypots: Design and Experience International World Wide Web Conference Committee,2011. [7]Feng zha g,shijie Zhou,Zinguang Qin,Jinde Liu Honeypot:A supplemented active defense system for network security IEEE [8] Spitzner, Lance. Honeypots: Definitions and Value of Honeypots, May 2003, accessed: November 2012, URL: [9] Robert Lemos, 5 Reasons Every Company Should Have A Honeypot, 1 st October 2013, Accessed 23 March 2014, [10] Almutairi, Abdulrazzaq Survey of High Interaction Honeypot Tools: Merits and Shortcomings, June 2012, Date Accessed: October Papers/ pdf. [11]Karthik S. Samudrala,B. And Yang, A.T. Design of network security Projects using honeypots Journal of computing sciences in colleges. [12]Sounak Paul,Bimal Kumar Mishra Honeypot Based Signature for Defense Against Polymorphic Worm Attack in Networks IEEE International Advance Computing Conference(IACC),2013. [13] Newsome J, Karp B, Song D. "Polygraph : Automatically GeneratingSignatures for Polymorphic Worms." IEEE Symposium on Securityand Privacy pp [14] Zhichun Li, Manan Sanghi, Yan Chen, Ming Yang Kao, Chavez B."Hamsa : Fast Signature Generation for Zero Day PolymorphicWorms with Provable Attach Resilience." IEEE Symposium onsecurity and Privacy pp [15]Bimal Kumar Mishra and Dinesh Kumar Saini, SEIRS epidemics model with delay for transmission of malicious objects in computer network,applied Mathematics and Computation,Elsevier,188(2007). [16]R.T. Goswami,Avijit Mondal,Bimal Kumar Mishra and N.C. Mahanti Defending Polymorphic Worms in Computer Network using Honeypot International Journal of Advanced Computer Science and Applications,Vol.3,No.10,2012. ISSN: Page 280
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Honeypots in Network Security
Degree Project Honeypots in Network Security Deniz Akkaya Fabien Thalgott 2010-06-29 Subject: Network Security Level: Bachelor Course code: 2DV00E Abstract Day by day, more and more people are using internet
Review Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
Securing the system using honeypot in cloud computing environment
Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College
Keywords Intrusion detection system, honeypots, attacker, security. 7 P a g e
HONEYPOTS IN NETWORK SECURITY Abhishek Sharma Research Scholar Department of Computer Science and Engineering Lovely Professional University (Punjab) - India Abstract Computer Network and Internet is growing
Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques
Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques Aaditya Jain, Dr. Bala Buksh M.tech (CS & E), Professor (CS & E) R. N. Modi Engineering College, Kota, Rajasthan,
The Second International Conference on Innovations in Information Technology (IIT 05)
HoneyAnalyzer Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot Urjita Thakar Reader, Department of Computer Engineering, Shri G.S. Institute of Technology and Science
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Network Monitoring and Forensics
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
Use of Honeypots to Increase Awareness regarding Network Security
Use of Honeypots to Increase Awareness regarding Network Security Bhumika, Vivek Sharma Abstract Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and
Honeypot as the Intruder Detection System
Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Honeypots and Honeynets Technologies
New Mexico State University Honeypots and Honeynets Technologies Hussein Al-Azzawi Final Paper CS 579 Special Topics / Computer Security Nov. 27, 2011 Supervised by Mr. Ivan Strnad Table of contents: 1.
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Taxonomy of Hybrid Honeypots
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006
CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS *
DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * Karthik Sadasivam, Banuprasad Samudrala, T. Andrew Yang University of Houston Clear Lake 2700 Bay Area Blvd., Houston, TX 77058 (281) 283-3835, [email protected]
DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954
DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET By NUR ATIQAH BT. HASAN 2003470954 In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons.) IN DATA COMMUNICATION AND NETWORKING
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Dynamic Honeypot Construction
Dynamic Honeypot Construction 2nd Annual Alaska Information Assurance Workshop Christopher Hecker U. of Alaska, Fairbanks 9-5-2006 Presentation l Brief Introduction l Project Overview l Future Work l References
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Zero-Day Attack Signatures Detection Using Honeypot
Zero-Day Attack Signatures Detection Using Honeypot Reshma R. Patel Information Technology Department, L. D. College of Engineering, Ahmedabad, India Chirag S. Thaker Information Technology Department,
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
[Kapse*, 4.(10): October, 2015] ISSN: 2277-9655 (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IDENTIFICATION OF ATTACKERS BY USING SECURITY SERVICES OF HONEYPOT Dinesh S. Kapse*, Prof. Vijay Bagdi * WCC DEPT. A.G.P.C.O.E,
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack
Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack Shantanu Shukla 1, Sonal Sinha 2 1 Pranveer Singh Institute of Technology, Kanpur, Uttar Pradesh, India 2 Assistant Professor, Pranveer
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Research Project 2: Metasploit-able Honeypots
Project 2: [email protected] University of Amsterdam July 4th 2013 How feasible is an automated method to detect specific exploits on a honeypot by monitoring network traffic of exploits? What setup is
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Εmerging Ways to Protect your Network
Εmerging Ways to Protect your Network From Vulnerability Scanning to Real-time Monitoring and Detection of Cyber-attacks Konstantinos Xinidis Software Engineer [email protected] Development Dept.,
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Framework for generating IDS benchmarking Data sets. Stian Skjølsvik
Framework for generating IDS benchmarking Data sets Stian Skjølsvik Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
CONFIGURING TCP/IP ADDRESSING AND SECURITY
1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security
Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network
Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network Reshma R. Patel Information Technology Department, L.D.College of Engineering, Ahmedabad, India. Chirag S. Thaker Information
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
EU FP6 LOBSTER. personal view on the future of ero-day Worm Containment. European Infrastructure for accurate network monitoring
EU FP6 LOBSTER European Infrastructure for accurate network monitoring personal view on the future of ero-day Worm Containment Herbert Bos Vrije Universiteit Amsterdam herbertb _AT_ cs.vu.nl 1 What is
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES Saad Alsunbul 1,2, Phu Dung Le 1 and Jefferson Tan 1 1 Caulfield School of Information Technology, Monash University, Melbourne,Australia
PUBLICATIONS OF PROBLEMS & APPLICATION IN ENGINEERING RESEARCH - PAPER http://ijpaper.com/ CSEA2012 ISSN: 2230-8547; e-issn: 2230-8555
211 HONEY POTS: A NEW MECHANISM FOR NETWORK SECURITY A. CHANDRA #, K. LALITHA * # Department of Computer Science and Systems Engineering, Sree Vidyanikethan Engineering College A. Rangampet, Tirupati #
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
