An Approach against a Computer Worm Attack
|
|
|
- Trevor Nash
- 10 years ago
- Views:
Transcription
1 48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono; yoos}@eng.uah.edu Abstract: Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper, we reviewed the network defense systems from different perspectives for defining the level of immunity of different parts of the network and ascertaining the real impact of a worm attack on the network. The idea of immunity came from examining and comparing the immune system in the human body to the defense and security measures of computer networks. Then, we developed a novel, realistic model by splitting the network into the highly immune part of the network (I) and the partially immune part of the network (I) in order to measure the real impact of worm attack on computer network. ext, we evaluated the effectiveness of this model by implementing network defense measurements adopted from the human immune system. Computer simulations show that the infection waves of worms in I have minimal impacts compared to those in the I. Keywords: epidemic worm modeling, highly immune part of the network (I), human immune system, partially immune part of network (I), worm attack. 1. Introduction Worm attack [1, 2, 7, 9, 17, 18, 20, 21, 22] still poses an enormous threat to network security. A destructive, automated, and self replicated behavior of a worm causes bandwih consumption and corrupt network performance. The design of worm code could go beyond the intention to propagate through the network. A malicious code could be built to delete executable files on the attacked machine, create a backdoor listener, and cause a denial-of-service attack. Generally, a worm is categorized according to the way it propagates, installs or lunches. A worm could spread through s, instant messages, internet relay chat, and file sharing. Burckhar [4] proposed a virtual reality modeling of infectious diseases in the human population. The model took into consideration several important factors including; the level of contact between individuals and the duration of immunity in the graveyard stage, which considers the fact that individuals who lack immunity in the recovery state will move back to a stage of susceptibility. Burckhar s research suggested new ways to reduce widespread infection by using quarantine and treatment in the human population as a future study [3], [4]. Kim and Bentley explored the similarity between the human immune system, network intrusion detection systems and the possibilities of emulating the human immune system, to design a novel network-based intrusion detection system [5]. Castaneda et al. proposed a new method that generates an anti-worm after detecting and recognizing the payload of the malicious worm. The results showed the effects of implementing anti-worms with respective propagation schemes and the limitation of antiworms in practical implementations [6]. These worm models assume that all hosts in the network have the same probability to become infected by worms, and; therefore, the same level of vulnerability when it comes to worm attack. Consequently, the results will lead to an unrealistic prediction of the infection wave. This paper represents new approaches to modeling a worm attack on a computer network; the study took into consideration the pre-existing conditions in different parts of network topology. We reviewed the network from a network security prospective where different parts of the network have different levels of defense and immunity measures. The idea of immunity came from examining and comparing the immune system in the human body to the defense and security measures of computer networks [13], [14], [15], [16]. Then, we developed a novel realistic model by splitting the network into the highly immune part of the network (I) and the partially immune part of the network (I) in order to measure the real impact of a worm attack on a computer network. ext, we evaluated the effectiveness of this model by implementing network defense measurements adopted from the human immune system. Computer simulations show that the infection waves of worms in I have minimal impacts compared to I. This paper is organized as follows: section 2 contains a detailed description of the similarity between the human immune system and a computer network defense system. In this section, we defined the human immune system and we adopt the same concept to invent a new definition for computer network immunity. Section 3 summarizes existing epidemic modeling used as tools for modeling worm attacks on computer networks. In section 4, we present the theoretical and the mathematical approaches for our new realistic epidemic worm modeling epidemic model. The last section includes the conclusion and possibilities for future research. 2. Similarity between the uman Immune System and etwork Defense System In the human body, the immune system is a constellation of responses to outside attacks on the human body [6]. The general population represents a network of individuals that interact with each other. The medical measures taken by a community in general and locally by individuals represent the defense system of human beings against the spread of disease. There are three types of immunity in the human
2 49 body: active immunity, passive immunity, and hybrid immunity. 1) Active uman Immunity is acquired from previous viral infections. When an antigen infects the body, it triggers the immune system to develop antibodies from plasma cells found in the bone marrow. lasma cells will generate B-cells that synthesize antibody molecules. These antibody molecules bind to the antigens and destroy them. The body will keep a copy of all generated antibodies in the immunologic memory to defend against future identical viral infections. 2) assive uman Immunity is acquired from vaccination. The antibody will be transferred from an actively immunized individual to a susceptible individual and will work only for a specific type of virus. 3) ybrid uman Immunity is acquired from using Monoclonal antibody cells (ybridmas) produced in a medical laboratory used to treat more complex and serious illnesses. ybridmas are hybrid cells produced by fusing myeloma cells with the spleen cells from animals such as mice or rabbits that have been immunized from the desired antigen. The main purpose is to stimulate the patient's immune system to fight tumor cells and to prevent tumor growth by blocking specific cell receptors. By comparison, active immunity is longer-lasting and more effective than passive immunity due to the immunologic memory produced by the patient s own immune system. assive immunity is produced outside the body and then implanted inside the patient. ybrid immunity is a combination of both active and passive immunity. It is both a vaccine and a stimulus which combine the characteristics of both active and passive immune systems. etwork immunity consists of network security processes and defense measures that have been implemented to defend the network against inside or outside attacks. It is the software and the hardware security steps taken to secure network infrastructure [3]. Some key characters of human immunity are similar to network immunity. A computer network has similar active, passive, and hybrid defense systems. We will illustrate the three different types of immunity in computer networks and show the similarity and differences between network immunity and the human immune system. 1)-Active etwork Immunity is established by using an effective intrusion detection system (IDS) and safe ethical worms. The (IDS) monitors network traffic and blocks suspicious activities by detecting known malicious codes. In 2004, F. Castaneda et. al proposed an automated method to detect worm attack, analyze the worm s malicious code, and then generate an anti-worm. The generated anti-worm, or ethical worm, has the same self-replication behavior as the bad worm. The ethical worm will spread through the network and overcome the bad worm. Most network security experts still oppose the idea of using ethical worms due to the fact that they could unintentionally cause a denial-of-service attack by breaking applications or consuming network bandwih, or they could be used by hackers as a tool for a new vulnerability. Both active human immunity and active network immunity have a memory of invaders identities that will help identify an attacker, but the main difference is that active human immunity is dynamically capable of developing immunity for new antigens where (IDS), or safe ethical worms, are only capable of identifying previously known malicious codes. Building a complete active immune system that generates safe ethical worms against newly invented worms is still in ongoing research. 2)-assive etwork Immunity is established by installing antivirus software, downloading the required update patches, configuring a firewall system, and blocking arbitrary outbound connections [10]. In both passive human immunity and passive network immunity, the required immunity must be transferred to the target system. 3)-ybrid etwork Immunity is established by combining both passive and active immunity. Both hybrid human immunity and hybrid network immunity are capable of dealing with more complex and serious invaders. Like the hybrid human immunity, the combined immunity in a hybrid network is capable of defending against a wider range of network attacks. By analyzing network infrastructure from a security defense perspective, network immunity levels vary depending on the network security steps that have been taken in different sections of the network. The steps needed to achieve and maintain a secure network can be summarized as follows: 1) Assessment: a technical evaluation of network security and defense systems; includes an organization s policies, procedures, laws, regulations, budgeting, and other managerial duties [3]. 2) rotection: previously established defense countermeasures to prevent network attacks. 3) Detection: process for identifying intrusion. 4) Response: measures that will be taken to overcome new attacks. From the above-mentioned steps; we may split a network into two parts: a) ighly immune part of the network (I): here all network security defense measures have been implemented. b) artially immune part of the network (I): here, the network is either missing at least one security measure or at least one of the measures has not been fully implemented. To determine the true impact of a worm attack on network functionality, we took into consideration our network categories and used different values for our model parameters. Our aim is to develop a new realistic approach to worm modeling. The results gave us a close look at the widespread behavior of worms in different parts of the network and the future strategic measures that need to be taken to fight the impact of destructive worm attacks against networks. Our model was based on the epidemic model in which a host that lacks immunity may return to the susceptible stage, therefore remaining vulnerable to worm attack and possibly becoming re-infected. We built our assumptions on a factual network and defense measurements that are usually performed by information assurance engineers. In a real functional network, the model s parameters vary depending
3 50 on the level of immunity. In I, the probability of worm infection is higher than in I, which will lead to higher infection rate. The removal rate is smaller due to a higher number of recovered hosts in I compared to I. We also experienced that the number of hosts moved back to the susceptible stage in I is higher when compared to I. Based on these observations, we claim that in more realistic worm attack modeling, various model parameters must be used for different parts of the network that have disparate levels of defense, immunity, and monitoring. 3. Existing Epidemic Models In this section, we will summarize the basic epidemic models [4], [8], [11], [12], [19] that have been used to model a worm attack on computer networks. Table 1 shows a list of notation and symbols that have been used to develop the set of differential equations in this section for the basic epidemic models. 3.1 Kermack-McKendrick (KM) model The KM model [8] is an epidemiological model with three main elements: a) Susceptible hosts: hosts which are vulnerable to worm attack. b) Infectious hosts: hosts infected by worms. c) Removed hosts: hosts which have recovered from an attack and are immune to future infection. This model is considered an SIR (Susceptible, Infectious, and Removed) model. The hosts in this type of modeling could be in any one of the three states: Susceptible (S), Infectious (I), or Removal (R). The model builds on the assumption that the population size is fixed (no births or deaths) and the population is homogenously mixed. A set of nonlinear differential equations describes the change in the population for the different types of hosts. Equations (1-4) describe the KM epidemic model: By rearranging equation (2): ds( t) = β ( t) I ( t) S( t) (1) di ( t) = β ( t) I( t) S( t) γ I ( t) (2) dr( t) = γ I ( t) (3) S( t) + I ( t) + R( t) = (4) di( t) = I ( t)( β ( t) S( t) γ ) (5) From (5), we conclude that S0 > γ / β should be satisfied to cause epidemic growth. Where S0 is the initial number of susceptible hosts, ρ = γ / β represents the epidemic threshold and φ = γs0 / β represents the basic reproduction number of the infection, and φ > 1 will cause the infectious population to grow. Figure 1 shows a state transition of the KM model. Table 1. otations and initial values of the model used in Section 3 otation Susceptible Infectious Removal 3.2 SIRS model Explanation I(t) umber of infectious hosts at S(t) umber of susceptible hosts at R(T) umber of removed hosts at Size of total vulnerable population β Infection rate µ Re-susceptible rate on a removed host ρ γ φ Epidemic threshold Removal rate Reproduction number of infection Figure 1. Kermack-McKendrick epidemic model. In the SIRS model [4], there is a state in which the removed host could lose immunity and move back to the susceptible stage. The model is governed by the following set of nonlinear differential equations: ds( t) = β ( t) I ( t) S( t) + µ R( t) (6) di ( t) = β ( t) I( t) S( t) γ I ( t) (7) dr( t) = γ I ( t) µ R( t) (8) The SIRS model has the same initial conditions as the SIR model regarding a fixed number of hosts and the threshold value criteria. Figure 2 shows a block diagram of SIRS model. Susceptible Infectious Removal Figure 2. SIRS epidemic model 4. roposed Computer etwork Realistic Model The similarity in the behavior between the spread of infection in a human population and the self-replication of a worm in a network environment makes modeling worm attacks on computer networks similar to modeling the spread of viral infection in a human population. The level of immunity in a computer network determines the impact of a worm attack on the computer network. In realistic worm modeling, a network has various levels of immunity. The susceptible population is divided into two groups: the highly immune population and partially immune population. Disparate types of susceptible hosts will behave differently when confronted with a worm attack.
4 51 The level of immunity in the susceptible hosts will determine the infection rate, the recovery rate and the re-susceptibility rate of the epidemic model. We examined the value of these rates depending on the network immunity level by looking at the main factors that cause changes in these rates. In doing so, we made a detailed comparison between a human population and a computer network. Table 2 shows a list of notations and symbols that we used in this section. 1) Infection rate: In a human population, the infection rate involves major parameters which include the contact rate between humans (θ, human/time), the proportion of infection in the population (I / ), and the transmission infection probability (η). Since we are interested in the interaction Table 2. otations and initial values of the proposed model otation Explanation Initial value Ip(t) umber of infectious hosts in I at time Ip(0)=1 t I(t) umber of infectious hosts in I at time I(0)=1 t Sp(t) umber of susceptible hosts in I at Sp(0)=350,000 S(t) umber of susceptible hosts in I at S(0)=650,00 0 Rp(t) umber of removed hosts from I at Rp(t)=0 R(t) umber of removed hosts from I at R(0)=0 θ Contact rate of I 2 θ Contact rate of I 2 η Transmission infection probability for I 1 η Transmission infection probability for 0.25 I λ Recovery rate of infectious I 0.1 λ Recovery rate of infectious I 0.25 µ Re-susceptible rate of I 0.01 µ Re-susceptible rate of I 5 * 10-6 I(t) Total number of infectious hosts at I(0)=2 Total number of hosts 1,000,000 between susceptible hosts and the infectious hosts, we defined the force of infection as (θ η I / ). The change in the number of susceptible hosts is represented by the equation: ds( t) I = θ η S (9) By adopting the infection parameters in a human population to a network environment, we assumed that hosts in both (I) and (I) have the same contact rate, and any host in the network will contact the same number of infectious hosts. In (I), more hosts will move from the susceptible stage to the infectious stage due to a lack of immunity, leading to a higher rate of infection. 2) Recovery rate: the recovery rate in a human population depends on the period of infection. The recovery rate for k days infection is proportional to 1/k. In a network environment, the recovery rate varies depending on the level of immunity. 3) Re-susceptibility rate: in a human population, the number of people who move from the recovery stage back to the susceptible stage varies depending on the level of immunity in the community. aving more people immunized against widespread viral infection forecasts a small resusceptibility rate and vice-versa. In a network environment, the same concept could be applied; Figure 3 shows a realistic SIRS modeling of a worm attack on computer network. The changes in the number of susceptible, infectious, and removed hosts for the (I) and (I) could be described by the following set of differential equations: Susceptible (I) FS(t) Infectious (I) λi(t) Recovery (I) µr(t)+µr(t) Susceptible (I) FS(t) Infectious (I) λi(t) Recovery (I) 1) The set of differential equations for I: dsp( t) I ( t) = θ p η p S( t) prp + µ ( t) (10) dip( t) I ( t) = θ p η p Sp( t) pip + λ ( t) (11) drp( t) = λ pip( t) µ prp( t) (12) I ( t) Fp = θ p η p (13) 0p θ p η p R = λ p+ µ (14) p ere, Fp represents the force of infection in the I population, R0 represents the basic reproductive rate for the I population, and it satisfies the condition R0 > 1 for the epidemic to grow. 2) The set of differential equations for I: S I R Figure 3. roposed worm attack model. ds( t) I ( t) = θ η S( t) R + µ ( t) (15) di( t) I ( t) = θ η S( t) I + λ ( t) (16)
5 52 dr( t) = λ I( t) µ R( t) (17) I ( t) F = θ η (18) 0 R θ η = λ + µ (19) ere, F represents the force of infection in I population, R0 represents the basic reproductive rate for the I population, and it satisfies the condition R0 > 1 for the epidemic to grow. ow, = Sp( t) + I( t) + Rp( t) + S( t) + I( t) + R( t) (20) 5. Simulation To identify the realistic effects of a worm attack on a computer network, we simulated our model by using realistic sets of parameters that emphasize the different level of immunity in the network. Then, we used fixed sets of parameters for the entire network. We also examined the relationship between mitigation technique factors, modeling parameters and the effects of changing these parameters on worm propagation. The results shows, as expected, that the number of infectious hosts in I is higher than I even though the number of I s population is bigger than the I s population due to better defense and security measurements in I. B - Comparison between Traditional and Realistic Worm Modeling: To identify the realistic effects of a worm attack on a computer network, we ran our model in three different scenarios. First, we simulated our proposed model, R-SIRS, by considering both I and I parameters. Then we simulated the SIRS model separately in I then in I parameters. The solid line represents the R-SIRS model. Tp-SIRS represents a traditional SIRS model in I parameters. Th-SIRS represents the traditional SIRS model in I parameters. Figure 5 shows a comparison of R-SIRS, Tp-SIRS, and Th-SIRS models. A Effects of a worm attack on I and I populations: Figure 4 shows a SIRS model simulation for both I and I. Figure 5. Comparison between R-SIRS, Tr-SIRS, Th-SIRS models Figure 4. SIRS model for I and I In the model, 35% of the susceptible population is partially immune and 65% is highly immune. The probability of infection and the recovery rate for both the I and I have been set as follows: a) For I, the infection probability is 1, all hosts will get infected, and the recovery rate is 0.1; b) For I, the probability of infection is 0.25, and the recovery rate is Both I and I hosts will experience the same interaction with infectious hosts throughout the simulation so they have the same contact rate. The results show that using unrealistic traditional worm modeling will yield an incorrect estimate of worm infection. From the figure, Tp-SIRS and Th-SIRS infectious populations are different from the R-SIRS model. The number of infectious hosts in the R-SIRS model stands between Tp-SIRS and Th-SIRS infectious populations. The R-SIRS model gives us the real impact of a worm attack on a computer network. C- The effect of changing the contact rate in the R-SIRS model: Quarantine of infected patients is one measure of preventing widespread disease in a human population by decreasing the level of contact between infected and healthy individuals, and thereby reducing the number of infectious individuals in the human population. We apply the same concept to a network environment by using quarantine as a defense technique to reduce the level of worm infection. We simulated the R-SIRS model for four different values of contact rate (2, 3, 4, and 5).
6 53 Figure 6. Effect of contact rate The result in Figure 6 shows that the infectious population decreases by decreasing the contact rate. D- The effect of changing the probability of infection in the R-SIRS model: In a human population, vaccination is used to decrease the rate of infection due to the reduction in the probability of infection. Similarly, adding security measures to network assets will enhance the defensive measures of the network against worm attack and decrease the probability of worm infection in a computer network. To examine the realistic impact of adding new mitigation to a network environment, we simulated the R-SIRS model using four different values of infection probability (0.25, 0.35, 0.5, and 1). Figure 7 shows the effect of reducing the probability of infection of worm attack by adding more security measures to the network. The result shows that the number of infectious populations declines when the probability of infection decreases. Figure 7. Effect of probability of infection 6. Conclusion This paper presents a new approach to modeling a worm attack on a computer network by using the R-SIRS model. We built our R-SIRS model by emulating the human immune system in a network environment. Building worm attack models by using the same capability of the human body to overcome virus infection is a major step in constructing the necessary network defense system against current and future worm attacks. Our simulation results show that worm infection has disparate impacts on different parts of the network based on different levels of immunity. By adding new mitigation techniques to enhance network security we are changing the model parameters to discover the real impact of a worm attack on network infrastructure. Using traditional modeling of a worm attack on a computer network without studying network immunization topology may lead to underestimation of the security measures needed to defend network security assets. In future research, we would benefit from the similarity between the human immune system and computer network defense measures. We are going to lunch more detailed comparisons toward building ultimate ways to defend the network against worm attacks and test the impact of worm attack on computer networks. References [1] Li, M. Salour, and X. Su, A Survey of Internet Worm Detection and Containment, IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp , 1 st quarter, [2] D. Moore, C. Shannon, and J. Brown, Code Red: a Case Study on the Spread and Victims of an Internet Worm, roc. 2 nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, ov [3] rotecting the Military Cyber Space: DARA Gears to Counter etwork Worms: website: [4] F. Burckhar, Modeling Infections Deceases in Virtual Realties. [5] J. Kim, S. Radhakrishnan, S. K. Dhall Measurement and Analysis of Worm ropagation on Internet etwork Topology, roc. IEEE 13 th Intl l Conf. on Computer Communications and etworks (ICCC 04), Chicago, 2004, pp [6] J. Kim,. Bentley The uman Immune System and etwork Intrusion Detection, roc. 7 th European Conf. on Intelligent Techniques and Soft Computing (EUFIT 99). [7] F. Castaneda, E.C. Sezer, and J. Xu, Worm vs. Worm: reliminary Study of an Active Counter-Attack Mechanism, roc ACM Workshop on Rapid Malcode (WORM 04), pp , Washington, DC, Oct [8] C.C. Zou, W. Gong, and D. Towsley, Code Red Worm ropagation Modeling and Analysis, 9 th ACM Symp. on Computer and Communication Security, pp , Washington DC, 2002 [9] D. Moore, V. axson, S. Savage, C. Shannon, S. Staniford,, and. Weaver, Inside the Slammer Worm, IEEE Magazine of Security and rivacy, vol. 1, no. 4, pp , [10] Ed. Skoudis, Malware, Fighting Malicious Code. Saddle River, J,earson, 2004.
7 54 [11] D. J. Daley and J. Gani, Epidemic Modeling: An Introduction, Cambridge, Studies in Mathematical Biology, [12] J. Kim, S. Radhakrishnan, and S.K. Dhall, Measurement and Analysis of Worm ropagation on Internet etwork Topology, roc. Int l Conf. on Computer Communications and etworks (ICCC 04), pp , Chicago, Oct [13] J. Li and. Knickerbocker, Functional Similarities between Computer Worms and Biological athogens, Computers & Security, 26 (2007), pp [14] Y. Yang, S. Zhu, and G. Cao, Improving Sensor etwork Immunity under Worm Attacks: a Software Diversity Approach, ACM Int l Symp. on Mobile Ad oc etworking and Computing (Mobioc 08), ong Kong, pp , May [15] U.S. Department of ealth and uman Services ational Institutes of ealth Understanding the Immune System ow It Works, I ublication o Sep [16] S. eng, Y. Li, and B. Zheng, States and Critical Behavior of Epidemic Spreading on Complex etworks, 7 th World Congress on Intelligent Control and Automation, Chongqing, China, pp , June [17] J. Kim, S. Radhakrishana, and J. Jang, Cost Optimization in SIS Model of Worm Infection, ETRI Journal, vol. 28, no. 5, pp , Oct [18] X. Yan, and Y. Zou, Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model, ETRI Journal, vol. 30, no. 1, pp , Feb [19] Z. Jin and M. aque, The SIS Epidemic Model with Impulsive Effects, 8th ACIS Int l Conf. on Software Engineering, Artificial Intelligence, etworking, and arallel/distributed Computing (SD 2007), Qingdao, China, vol. 3, pp , July [20]. Zhou, Y. Wen, and. Zhao, assive Worm ropagation Modeling and Analysis, roc. IEEE Int l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar [21]. Zhou, Y. Wen, and. Zhao, Modeling and Analysis of Active Benign Worms and ybrid Benign Worms Containing the Spread of Worms, roc. IEEE Int l Conf. on etworking (IC'07), [22] O. Toutonji and S. M. Yoo, assive Benign Worm ropagation Modeling with Dynamic Quarantine Defense, KSII Transactions on Internet and information System vol. 3, no. 1, pp , Feb
The Effect of Infection Time on Internet Worm Propagation
The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1 Background Worms are self propagating programs that spread over a network,
Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)
Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay [email protected]
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
The Body s Defenses CHAPTER 24
CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,
What are Viruses, Trojans, Worms & Spyware:
What are Viruses, Trojans, Worms & Spyware: There are many different types of computer viruses circulating in the cyber world, including regular Computer Viruses, Worms, Trojans, and Spyware. Each is different
Review Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Self-Defending Approach of a Network
Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Stability analysis of a novel VEISV propagation model of computer worm attacks
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 3, pp. 163-174 Stability analysis of a novel VEISV propagation model of computer worm attacks M. Javidi 1, N. Nyamorady
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins
Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes
Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420. Bhopal, M.P.
Prevention of Buffer overflow Attack Blocker Using IDS 1 Pankaj B. Pawar, 2 Malti Nagle, 3 Pankaj K. Kawadkar Abstract 1 PIES Bhopal, RGPV University, 2 PIES Bhopal, RGPV University, 3 PIES Bhopal, RGPV
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks Jae-Hyun Jun School of Computer Science and Engineering Kyungpook National University [email protected] Cheol-Woong Ahn
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Optimal worm-scanning method using vulnerable-host distributions
Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Supplemental Material CBE Life Sciences Education. Su et al.
Supplemental Material CBE Life Sciences Education Su et al. APPENDIX Human Body's Immune System Test This test consists of 31 questions, with only 1 answer to be selected for each question. Please select
WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:
HALMSTAD UNIVERSITY Network Design and Computer Management Course Title: Network Security Project Title: WORMS Project members: - Tchape Philippe 841122-T099 - Jose Enrique Charpentier 830112-9154 Lecturer:
Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University
Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Ontario Pandemic Influenza Plan for Continuity of Electricity Operations
Planning Guideline GDE-162 Ontario Pandemic Influenza Plan for Continuity of Electricity Operations Planning Guideline Issue 4.0 October 13, 2015 Emergency Preparedness Task Force This planning guide provides
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem
Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online
Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?
First Worm Ever Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in November 9 Worm was
Candy Antigens and Antibodies
LAB ACTIVITY: Candy Antigens and Antibodies TEACHER S EDITION Curricular Links: Biology 20, Science 30 Class Time: 1 period Suggested Answers: Question 1: What is the main function of red blood cells?
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Immunity Unit Test Z
Immunity Unit Test Z Name MB Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the pathogens in Figure 31.1 cause disease by taking over healthy
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment
The Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense
The Immune System 2 Types of Defense Mechanisms Immune System the system that fights infection by producing cells to inactivate foreign substances to avoid infection and disease. Immunity the body s ability
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
The Immune System and Disease
Chapter 40 The Immune System and Disease Section 40 1 Infectious Disease (pages 1029 1033) This section describes the causes of disease and explains how infectious diseases are transmitted Introduction
Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. Authors: Mohssen Mohammed and Al-Sakib Khan Pathan
Automatic Defense against Zero-day Polymorphic Worms in Communication Networks Authors: Mohssen Mohammed and Al-Sakib Khan Pathan Dedicated to To my father Mohammed Zain Elabdeen Mohammed; my sister Maali
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
