Flow-based detection of RDP brute-force attacks
|
|
|
- Joshua Knight
- 10 years ago
- Views:
Transcription
1 Flow-based detection of RDP brute-force attacks Martin Vizváry Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal Institute of Computer Science Masaryk University Brno, Czech Republic Abstract The Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a remote access to a computer over a network connection. Recently, we have seen an increase in attacks on Microsoft Windows remote desktop connection authentication. Current detection methods are based on event log analysis or the Account Lockout Policy used in Windows domain networks. However, the methods are applicable only in environment where the devices are under control of the network administrator. We propose attacks detection method based on the network-based approach which provides host independency and highly scalability. The network flow data provides sufficient information about communication of two nodes in network, even though the communication is encrypted. Currently we are able to determine whether a detected IP flow is ordinary remote desktop session or single authentication with a small ratio of false-positive detection. An analysis was based on the network flow data collected in the Masaryk University network and host-based data from logs of a server with opened Remote Desktop Connection. These data helped us to improve the flow detection using the information gathered from the server event log. Despite the fact that RDP is encrypted, flow data gives us a sufficient amount of information to determine whether the connection is an authentication or regular remote desktop session. We implemented the attacks detection as a plugin for the widely used NfSen collector. The plugin is involved in the active defense of the network of Masaryk University. In two months, the plugin detected nearly two million of authentication attempts and reported 3,430 RDP authentication attacks. Despite the fact that attackers was blocked for two days, many of them continued or repeated the attack after the block had been lifted. An analysis of the frequency with which the attackers returned, suggests the suitable duration of settings of blocking of attackers. Keywords: Remote Desktop Protocol, RDP, brute-force attack, intrusion detection, NetFlow, NfSen, bidirectional flow, dictionary attack. Introduction Both brute-force and dictionary attacks are aimed at a wide-spread knowledge-based authentication. In both cases, attackers suppose that users choose their passwords from a small subset of the full password space, e. g., short passwords, dictionary words, proper names, and lowercase strings [1]. The attackers attempt to login to user accounts by trying possible passwords until they find the correct one. If the attackers use a predefined list of common passwords, they conduct dictionary attack, otherwise they systematically search entire space of passwords using brute-force attack. In this paper, we use the term brute-force attack for both types of attacks since we cannot distinguish them at flow level because it does not provide any information about the packet payload. In our previous work [2], we focused on brute-force attacks on the popular SSH service but currently we have been observing an increase in attacks on the authentication of the Remote Desktop Protocol (RDP). It is a Microsoft proprietary protocol used for remote desktop connection for Windows operating systems. Since Windows XP, the systems provide not only client but also server (denoted as Remote Desktop Connection and Remote Desktop Services) that is often left unsecured by unskilled users. This causes a growing number of bruteforce attacks on remote desktops. For instance, Morto [3] represents a recent example of a worm that spreads by remote desktops secured by weak passwords.
2 Current detection and prevention of brute-force attacks on RDP is done at the host level. The detection is based on an event log analysis: if a number of unsuccessful login attempts exceeds a predefined threshold, the attack is reported and the attacker may be blocked by a host firewall. For attack prevention, Account Lockout Policy is often used in networks of devices under control of the network administrator. In this paper, we describe a design (Section 2) and evaluation (Section 3) of a network-based detection of bruteforce attacks on authentication of Microsoft Windows RDP. Similarly to [2], we analyze both legitimate and malicious RDP traffic. As a result, we derive flow-based signatures of traffic generated by RDP attacks. In contrast to [2], we benefit from the use of bidirectional flows (biflows) that provide a natural view of interactive client-server communication. We evaluate the detection in the 10 gigabit campus network of Masaryk University, Brno, Czech Republic including hundreds of RDP servers. Design of the flow-based signature of RDP authentication To derive the flow-based signature, we analyze RDP traffic both at host and network level. We use Microsoft Windows Server 2008 with RDP server that is backward compatible with lower versions of clients. To acquire authentication signatures of the most widely used clients for remote connection, we choose three desktop clients for Windows 7, Windows XP, Ubuntu and two mobile clients for Android 2.3, ios. Next, we analyze two tools used for brute-force attack and a worm called Morto [3]. These signatures are revisited in further analysis conducted in the entire campus network of Masaryk University. Finally, we thus derived the general flow-based signature of RDP authentication. 2.1 Traffic analysis of RDP clients We analyze a flow signature of several clients used for connection to the remote desktop. Table 1 shows flow records of the client in Windows 7. The authentication process of the client works with very low bandwidth requirements. The whole authentication fits in several packets and every authentication attempt forms two separate flows. Every authentication attempt does fit in two flows. The actual remote desktop session is started after the successful authentication. The two flows lasting 0.8 seconds represent canceled connection right after the successful authentication. The last two long-lasting flows contain the actual session. There is also a large increase in number of packets and bytes transferred in contrast to the authentication. Duration A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 AP.SF B: 3389 A: APRS Table 1: Flows acquired during connection from a Windows 7 client TCP flags: A ACK; P PUSH; R RESET; S SYN; F FIN Table 2 shows flow records of the client running on Windows XP with Service pack 3 installed. In contrast to the client for Windows 7, the authentication process is a part of the remote session, i. e., the credentials are entered in the login prompt on the remote desktop. The first two flows in Table 2 are authentication attempts using incorrect passwords. All authentication attempts are in one network flow. There are more transferred packets in one flow so the authentication have the same flow signature as regular remote desktop connection. The last flow is flow signature of work on the remote desktop. To detect, whether the connection is brute-force attack or a short legitimate session of remote desktop, is not possible. The flow with duration of 3 seconds is canceled connection right after the successful authentication. The rdesktop client in Ubuntu and both mobile clients have similar flow signature as the client in Windows XP. The difference in signatures is only in the volume of the traffic. Neither the rdesktop client, nor mobile clients have as good traffic optimization as the client in windows.
3 Duration A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 AP.S B: 3389 A: APRS A: B: 3389 AP.SF B: 3389 A: APRS Table 2: Flows acquired during connection from a Windows XP SP3 client 2.2 Traffic analysis of tools for brute-force attacks We also analyzed other tools that can be used for brute-force attacks on RDP. We tested the xtscrack [4] tool for Windows platform and Ncrack [5] for Linux systems. The flow signature of the Ncrack is shown in Table 3. The signature of the xtscrack is very similar to the signature of the Ncrack. The only difference is the volume of traffic due to lower client optimization in Linux system. The first four lines in the table are two unsuccessful authentication attempts. One login and password combination per remote session forms a separate couple of flows. In contrast, the authentication from regular clients is a part of one flow, except the client in Windows 7. The last two flows describe the signature of successful authentication. The differences between successful and unsuccessful authentication are not compelling enough to be able to reliably determine whether the attack is successful or not. Duration A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 AP.SF B: 3389 A: APRS A: B: 3389 APRSF B: 3389 A: APRS Table 3: Flows acquired during connection from a Ncrack tool Table 4 shows flow records of the worm called Morto. We used a test bed with three virtual machines a victim, a host infected with the worm (i. e., attacker) and a NetFlow probe. There are three login attempts. First two flows are unsuccessful login attempts and the last flow is successful attempt with infection of the remote system. After successful connection the worm copies itself to the new system and continues spreading through the network. Duration A: 1727 B: 3389 AP.SF B: 3389 A: 1727 APRS A: 1728 B: 3389 AP.SF B: 3389 A: 1728 APRS A: 1729 B: 3389 AP.SF B: 3389 A: 1729 APRS Table 4: Flows acquired during attack from a worm Morto
4 2.3 Flow-based signature of authentication The results of the analysis give to us enough information to derive the NetFlow signature of the process of authentication. During the analysis we do not find any evidence that the client in Windows 7 or a tool with similar signature of flow are used for a brute-force attack. The use of other clients will not be very effective because the remote session is closed by server after several unsuccessful authentications. Attacking tools and the worm have very similar behavior. In contrast to proper clients, every authentication attempt is in separate flow therefore we are able to determine the number of attempts. The clients can be divided into two categories. The first category in which belongs only the client in Windows 7 uses optimized authentication and the remote desktop connection is opened only if the previous authentication was successful. The second category covers all other clients and the authentication process takes place on the remote desktop. From the given flow signatures and the differences in direction of the communication in flow, we decide to use bidirectional flows. The client requests and the server responses are linked in one biflow record. As opposed to using unidirectional flows, biflows enable us to distinguish more accurately between the legitimate and malicious traffic. The final signature is generalized over all clients and all tools that we analyzed. The flow-based signature of the RDP authentication attempt uses the following six features: in packets the number of the incoming packets <20, 100>, in bytes the volume of the incoming traffic in Bytes <2200, 8001>, out packets the number of the outgoing packets <30, 190>, out bytes the volume of the outgoing packets <3000, >, flags TCP flags ACK, PUSH, RESET, SYN, dst net the address of the local network. Since we deploy attack mitigation based on the detection using this signature in the production network, we use three additional conditions based on measurements presented in [6] to lower false positives: attacker used a TCP SYN scan technique 1 of network reconnaissance before the actual bruteforce attack, time factor of attack, i. e., the time distance of the attack and the network reconnaissance is lower than a predefined value, time. at least three authentication attempts per server and at least three attacked servers at the same If all these conditions hold, the source of the attacker is reported. Evaluation of the flow-based detection signature To evaluate the accuracy of the derived flow-based signature, we analyzed NetFlow data acquired in the large campus network of Masaryk University from October 1 to November 30, To automate the detection of the RDP attacks in the campus network, we implemented RdpMonitor [7], a publicly available NfSen plugin that uses the derived NetFlow signature. The plugin monitors the network traffic, collects attack data and reports detected incidents via . During the two months the plugin has detected 3,430 attacks originating from 2,057 unique es and has collected 1,845,740 login attempts. If we take into account the average size of the authentication attempt and the number of login attempts, we get 140 GB of this malicious traffic. Hence, we estimate that approximately 40 % of all RDP related traffic in the campus network is malicious. Next, we analyze user names collected in the event log of the server used as a simple honeypot. The most frequently used user names were: administrator; admin; user; test; user1 and user2. We found out that 60 % of attacks captured by the honeypot used the same sequence of user names which is used by the worm Morto. We assume that the attacks in the campus network share the same pattern. 1 TCP SYN scan attacker starts with TCP handshake and waits for response after which resets the connection
5 Furthermore, we analyzed the behavior of attackers which were detected and blocked on the edge of the campus network. To mitigate brute-force attacks and to protect the entire network, we block the of the attacker for two days. Due to the restrictions of the technology used for blocking we have not been able to block attackers for a longer time. In the two months, we blocked on average 56 source a day and observed that some of them return back after the block expired. Therefore, we assigned all attackers to three groups: those blocked 2 times, 3 times and more than 3 times. For each group of attackers, we computed the intervals between two blocking of an. Figure 1 depicts clusters of intervals between the time when attackers were unblocked and the time when they attacked our network again (one point corresponds to one interval). The more dense cluster is, the more attackers returned in the specific time interval. The most attackers returned in twenty days and the average time of their return was 10 days. If we had extended the period of blocking to 12 days, we would have prevented 1,100 attacks. Consequently, we would have prevented attackers to conduct malicious activities in the campus network and would have lowered the possibility of successful attack. Figure 1: Time between repetitive blocking of attackers on the edge of the campus network Last but not least, we compared the total number of detected brute-force attacks on RDP and SSH, respectively. In the two months, we detected 111 brute-force attacks on authentication of SSH in contrast to 3,430 attacks on RDP. Conclusions Currently, detection of online brute-force attacks on RDP authentication is done at host level. In spite of the fact that network-based detection offers advantages such as scalability or better capability of detecting distributed attacks, we were not aware of any network-based or even flow-based method of detection of RDP attacks. We analyzed network flows acquired during RDP authentication of various clients and proposed the general signature for detection of RDP brute force attacks. The proposed signature benefits from bidirectional flows since bruteforce attacks consist of interactive communication between two parties. In addition, we are able to detect the authentication attempts even though the protocol is encrypted. The detection based on this signature was evaluated in the 10 gigabit campus network of Masaryk University network connecting about 15,000 hosts. We dealt not only with the attack detection itself but also with eliminating of false positives since this is crucial for consecutive attack mitigation. Since a decision based on incorrect results of intrusion detection negatively affects benign users, a fundamental requirement for operational use of the detection is zero false positive rate even with the risk of false negatives. We therefore used three additional conditions for lowering false positives based on the study of attackers' behavior. The first condition requires that brute-force attacks are preceded by network reconnaissance probes. The second one assumes that the majority of attacks is non-targeted and thus it hits more than one server. Finally, the third condition takes into account a time factor of the whole attack. The signature-based detection of brute force attacks on RDP with the additional conditions of lowering false positives had been already deployed in routine operation by CSIRT-MU, Computer Security Incident Response Team of Masaryk University, in The detection method was successfully implemented as a publicly
6 available plugin for the NfSen collector [6]. Since the time, thousands of attacks with almost zero false positive rate have been mitigated and reported. In addition, this successful prototype was transferred to a university spinoff company and became a part of a successfully sold product. In future work, we would like to analyze the impact of various values of thresholds of additional conditions to false positive rate and the impact of changes in duration of blocking to attackers' behavior. References Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, and R. L. Rivest. Handbook of Applied Cryptography, chapter Identification and Entity Authentication. CRC Press, VYKOPAL, Jan, Tomáš PLESNÍK and Pavel MINAŘÍK. Network-based Dictionary Attack Detection. In Proceedings of International Conference on Future Networks (ICFN 2009). Los Alamitos, CA, USA: IEEE Computer Society, p , 5 pp. ISBN F-secure. Worm:W32/Morto.A analysis. URL a.shtml xtscrack web site. Ncrack High-speed network authentication cracker web site. URL VYKOPAL, Jan. A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. In Advances in Computing and Communications. Berlin: Springer Berlin Heidelberg, p , 10 pp. ISBN doi: / _69. RdpMonitor web site.
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Automatic Network Protection Scenarios Using NetFlow
Automatic Network Protection Scenarios Using NetFlow Vojt ch Krmí ek, Jan Vykopal {krmicek vykopal}@ics.muni.cz FloCon 2012 January 9-12, Austin, Texas Part I Flow-based Network Protection Krmicek et al.
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Analysis of Network Beaconing Activity for Incident Response
Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia
Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Flow-based Worm Detection using Correlated Honeypot Logs
Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058
Network Security Monitoring and Behavior Analysis Best Practice Document
Network Security Monitoring and Behavior Analysis Best Practice Document Produced by CESNET led working group on network monitoring (CBPD133) Author: Pavel Čeleda September 2011 TERENA 2011. All rights
Lync SHIELD Product Suite
Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M
Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Selected Topics of IT Security (41.4456) Seminar description
Selected Topics of IT Security (41.4456) Seminar description Sebastian Abt, Frank Breitinger April 3, 2012 1 Introduction The lecture and accompanying seminar target at master-level students interested
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
Hypervisor Security - A Major Concern
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 533-538 International Research Publications House http://www. irphouse.com /ijict.htm Hypervisor
How To Monitor Attackers On A Network On A Computer Or Network On An Uniden Computer (For Free) (For A Limited Time) (Czechian) (Cybercrime) (Uk) (Cek) (Kolomot
Recent development of tools to monitor attackers Daniel Kouril, Jan Vykopal lastname @ics.muni.cz 43 rd TF-CSIRT meeting 18 September, 2014, Rome, Italy About C4e project Single point of contact in Czech
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)
SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
CMS Operational Policy for Firewall Administration
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Firewall Administration July 16, 2008 Document Number: CMS-CIO-POL-INF11-01
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
DeltaV System Health Monitoring Networking and Security
DeltaV Distributed Control System White Paper DeltaV System Health Monitoring Networking and Security Introduction Emerson Process Management s DeltaV System Health Monitoring service enables you to proactively
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
CS155: Computer and Network Security
CS155: Computer and Network Security Programming Project 3 Spring 2005 Shayan Guha [email protected] (with many slides borrowed from Matt Rubens) Project Overview 1) Use standard network monitoring
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network S. CHITPINITYON, S. SANGUANPONG, K. KOHT-ARSA, W. PITTAYAPITAK, S. ERJONGMANEE AND P. WATANAPONGSE Agenda Introduction Design And Implementation
Application DDoS Mitigation
Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...
Network Traffic Monitoring With Attacks and Intrusion Detection System
International Journal of Education and Science Research Review E-ISSN 2348-6457 Volume-3, Issue-2 April- 2016 Network Traffic Monitoring With Attacks and Intrusion Detection System Vivek Kumar Pathak,
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
The WebJob Framework: A Generic, Extensible, and Scalable Endpoint Security Solution
The WebJob Framework: A Generic, Extensible, and Scalable Endpoint Security Solution Andy Bair and Klayton Monroe KoreLogic Security June 2015 Abstract The WebJob framework is a next generation endpoint
VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.
What is VCL? VCL (Virtual Computer Lab) is a service running on servers in IIT s datacenter that enables users to schedule and connect to virtual desktops running specific academic software applications
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
