Network Traffic Monitoring With Attacks and Intrusion Detection System

Similar documents
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Network Based Intrusion Detection Using Honey pot Deception

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Denial of Service Attacks, What They are and How to Combat Them

Volume 2, Issue 1, January 2012 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering

Hackers: Detection and Prevention

Computer Networks & Computer Security

Service Description DDoS Mitigation Service

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

A Layperson s Guide To DoS Attacks

Network Security and the Small Business

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Taxonomy of Intrusion Detection System

Name. Description. Rationale

Radware s Behavioral Server Cracking Protection

Network- vs. Host-based Intrusion Detection

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Intrusion Detection Systems

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

IDS : Intrusion Detection System the Survey of Information Security

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network/Internet Forensic and Intrusion Log Analysis

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls & Intrusion Detection

Certified Ethical Hacker Exam Version Comparison. Version Comparison

LoadMaster Application Delivery Controller Security Overview

Introduction of Intrusion Detection Systems

CS5008: Internet Computing

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Second-generation (GenII) honeypots

DoS: Attack and Defense

DDoS Overview and Incident Response Guide. July 2014

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Complete Protection against Evolving DDoS Threats

Network Security Demonstration - Snort based IDS Integration -

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

How To Protect Your Network From Attack From A Hacker On A University Server

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Advanced Honeypot System for Analysing Network Security

INTRUSION DETECTION SYSTEMS and Network Security

PROFESSIONAL SECURITY SYSTEMS

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

A Senior Design Project on Network Security

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Norton Personal Firewall for Macintosh

Survey on DDoS Attack Detection and Prevention in Cloud

A Review on Intrusion Detection System to Protect Cloud Data

Security Type of attacks Firewalls Protocols Packet filter

Network & Information Security Policy

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Security Issues In Cloud Computing and Countermeasures

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations

Top Ten Cyber Threats

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Survey on DDoS Attack in Cloud Environment

Flow-based detection of RDP brute-force attacks

Securing Cloud using Third Party Threaded IDS

IDS / IPS. James E. Thiel S.W.A.T.

Firewalls and Intrusion Detection

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Certified Ethical Hacker (CEH)

Overview. Packet filter

SECURING APACHE : DOS & DDOS ATTACKS - I

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Data Security Incident Response Plan. [Insert Organization Name]

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Science Park Research Journal

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Traffic Analyzer Based on Data Flow Patterns

How To Prevent Hacker Attacks With Network Behavior Analysis

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Network Security Policy

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Transcription:

International Journal of Education and Science Research Review E-ISSN 2348-6457 Volume-3, Issue-2 April- 2016 Network Traffic Monitoring With Attacks and Intrusion Detection System Vivek Kumar Pathak, Shabad Sawhney, Vyom Bhatia, Maitraiye Saxena Department of Information Technology SRM University ABSTRACT: Every organization, irrespective of its size depends on networking technologies. These networks hold the Working of entire organization and thus are very important part of the organization. Being the backbone Of the business, it is vulnerable to attacks from crackers and rival organizations to gain unauthorized Information or to cause harm to the business of the organization our aim is to protect the network Infrastructure of the organization by developing software to monitor the network and detect malicious Activities on it we also demonstrate the working of the software by developing different attacks to crack Into the network infrastructure an intrusion detection system (IDS) is a device or software application That monitors network or system activities for malicious activities or policy violations and produces Reports to the administrator, where as network traffic monitoring is the process of sniffing, reviewing, Analyzing and managing network traffic for any abnormality or process that can affect network Performance, availability and/ or security KEYWORDS: Network, Network Security, IDS (intrusion detection system), Network Traffic Monitoring, sniffing I.INTRODUCTION: A. STATEMENT OF PROBLEM: Security is a big issue for all networks in today s environment. Intruders can attack the system by any Means to get unauthorized data or affect the performance of the network. With networking technologies And services evolving rapidly, accurate network traffic monitoring is required to ensure the security and Optimize the efficiency of our networks. B. INTRUSION DETECTION SYSTEM: The purpose of the IDS is to detect certain well known intrusion attacks on the host system and display Warnings to the user and also store information regarding the IP address and allow the traffic based on That information [1] C. NETWORK TRAFFIC MONITORING: Network Traffic Monitor is a network analytic tool that examines network usage and provides a display Of its statistics The purpose of the application is monitoring the IP traffic within the network and report To the administrator in case of abnormality Network traffic monitoring and measurement is increasingly Regarded as an essential function for understanding and improving the performance and security of the Network infrastructure II.LITERATURE SURVEY: D. BASIC TERMINOLOGY: 1. Intrusion: An unauthorised entry into a network or a system, frequently synonymous with an information technology security incident. 2. Network Traffic: Incoming and outgoing packets generating traffic. 3. Attacks: Any method, process, or means used to maliciously attempt to compromise network security. Copyright@ijesrr.org Page 45

E. NEED: Any network is vulnerable to attacks from crackers and rival organizations to gain unauthorized information or to cause harm to the business of the organization. Here arises a need to protect the network from such attacks and create a safe environment where the data and all the internal working of the organisation are safeguarded. F. NIDS: Network based Intrusion Detection System (NIDS) is a system which monitors network intrusion. Intrusion may be detected by techniques like anomaly detection, signature pattern matching etc.[2] G. NETWORK TRAFFIC MONITORING: Network Traffic Monitoring Network Traffic Monitor is a network analytic tool that examines a network Usage and provides a display of its statistics.[3] The main purpose of the application is monitoring the IP Traffic between your local area network and Internet Network Monitor is a network diagnostic tool that Monitors local area networks and provides a graphical display of network statistics. Network Administrators can use these statistics to perform routine trouble- shooting tasks, such as locating a Server that is down, or that is receiving a disproportionate number of work requests The process by Which Network Monitor collects this information is called capturing. III. DESCRIPTION OF MODULES: A. ATTACK MODULE: Attacks are developed in the project for the purpose of demonstration of NIDS. Attacks disturb the Security infrastructure of the network Following attacks have been incorporated: 1. DoS: A denial of service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. 2. DDoS: Distributed Denial of Service is a type of DoS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. 3. SYN Flood:A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.[4] 4. Brute Force Attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data 5. Slowloris: Slowloris is a type of denial of service attack invented by Robert "RSnake" Hansen which allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports. B. NETWORK TRAFFIC MONITORING MODULE: Network traffic monitoring is the process of reviewing, analysing and managing network traffic for any Abnormality or process that can affect network performance, availability and/or security It is a network Management process that uses various tools and techniques to study computer network-based Communication/data/packet traffic The key objective behind network traffic monitoring is to ensure, Availability and smooth operations on a computer network monitoring incorporates network Sniffing and packet capturing techniques in monitoring a network traffic monitoring generally Requires reviewing each incoming and outgoing packet C. INTRUSION DETECTION MODULE: Intrusion detection is a process that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. Copyright@ijesrr.org Page 46

D. INTEGRATION AND USER INTERFACE: Graphical user interface is used to combine various tools used for attacking and managing the network under a single roof, using tkinter. IV. PLATFORM USED: A. PYTHON 2.7: Python interpreters are available for installation on many operating systems, allowing Python code execution on a wide variety of systems. B. VIRTUAL ENVIRONMENT: Virtual Environment is required to run multiple Operating Systems simultaneously to create a network infrastructure. VMWare is popular software used for creating a virtual environment. V. IMPLEMENTATION: To implement our network monitoring system, we run the agent in the windows machine and monitor the agent through a program running in Ubuntu. The agent will keep reporting to the monitoring program through socket connection. Fig. 1 Windows running on virtual environment Specification- RAM: 512 MB, HD space: 6GB Fig. 2 Ubuntu running on virtual environment Windowsand Ubuntu run simultaneously Specification- RAM 1512 MB, HD space: 20GB Copyright@ijesrr.org Page 47

Fig. 3 Windows running agent program message.py Fig. 4 Linux running monitoring system Fig. 5 Interface sna Fig. 6 Interface snap: Live Traffic monitoring Copyright@ijesrr.org Page 48

VI. CONCLUSION: Intrusion Detection System on any network is capable of detecting malicious activities. In such a case the administrator of a network would be able to track the source system which is trying to attack. Network monitoring devices also notify the administrator in case of an attack. The administrator is also notified about the active users and their activities on the network infrastructure. Organisations may employ some white hat or ethical hackers to conduct some methods in order to breach the security of the organization but in mind they are not always driven by the same motivation, no matter the end goal. So we provide a network security environment to deal with the hazardous scenarios for the network infrastructure of the organization. REFERENCES: 1. Amit Kumar, Harish Chandra Maurya, Rahul Misra(April 2013). "A Research Paper on Hybrid Intrusion Detection System". International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958 2. Brajesh Patel, Amrita Anand (August 2012). An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols. International Journal of Advanced Research in Computer Science and Software Engineering. ISSN: 2277 1285 3. Radha S. Shirbhate, Pallavi A. Patil (January 2012). Network Traffic Monitoring Using Intrusion Detection System. International Journal of Advanced Research in Computer Science and Software Engineering. ISSN: 2277 1284 4. Python Programming Training, 2012. Author: Mike McMillan Copyright@ijesrr.org Page 49