CSCI 6900. Computer Network Attacks and Defenses

Similar documents
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

JOOMLA REFLECTION DDOS-FOR-HIRE

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Lesson 5: Network perimeter security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Alert (TA14-212A) Backoff Point-of-Sale Malware

Networking for Caribbean Development

EZ Snort Rules Find the Truffles, Leave the Dirt. David J. Bianco Vorant Network Security, Inc. 2006, Vorant Network Security, Inc.

Attack Evaluation and Mitigation Framework

Seven for 7: Best practices for implementing Windows 7

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Secure Your Mobile Workplace

Critical Security Controls

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions

Malicious Network Traffic Analysis

BM482E Introduction to Computer Security

Firewalls & Intrusion Detection

Intrusion Detection Systems

Analysis of Network Packets. C DAC Bangalore Electronics City

Network security Exercise 10 Network monitoring

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Why The Security You Bought Yesterday, Won t Save You Today

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

End to End Security do Endpoint ao Datacenter

Locking down a Hitachi ID Suite server

10 Things Every Web Application Firewall Should Provide Share this ebook

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Inspection of Encrypted HTTPS Traffic

Analyzing HTTP/HTTPS Traffic Logs

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

IDS and Penetration Testing Lab III Snort Lab

Cisco IPS Tuning Overview

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Cisco RSA Announcement Update

Security Protocols/Standards

Network Access Security. Lesson 10

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

APPLICATION PROGRAMMING INTERFACE

Network Intrusion Detection Systems

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

From Network Security To Content Filtering

SECURITY ANALYSIS OF CLOUD COMPUTING

Introducing IBM s Advanced Threat Protection Platform

Chapter 11 Cloud Application Development

Eloqua Security & Privacy Security, Transparency, and Trust

Ovation Security Center Data Sheet

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Network Monitoring using MMT:

Intrusion Detection Systems

What is Web Security? Motivation

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Fighting Advanced Threats

Keystroke Encryption Technology Explained

Anti-exploit tools: The next wave of enterprise security

CSCI 4250/6250 Fall 2015 Computer and Networks Security

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Textual Manipulation for SQL Injection Attacks

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

A more detailed list of types of fingerprinting is included below. A similar definition is provided by [[RFC6973]].

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

NATIONAL CYBER SECURITY AWARENESS MONTH

PREDICT: A Data Repository for Cyber Security Research

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

INSTANT MESSAGING SECURITY

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Performance Evaluation of Intrusion Detection Systems

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Where every interaction matters.

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Transcription:

CSCI 6900 Computer Network Attacks and Defenses Lecture 2: Overview of research topics in computer and network security (part B) Instructor: Prof. Roberto Perdisci

Spam Detection SPAM = Unsolicited bulk messages email spam, blog spam, social network spam new email spam sent via Gmail/Hotmail... Detection strategies content analysis (headers, body, images...) network-level sender characteristics e.g., IP reputation, sender behavior...

Intrusion Detection Detect attempted and successful attacks Types of IDS host-based: monitor system events network-based: monitor network traffic signature-based (or misuse-based): rely on attack models anomaly-based: rely on a model of normal events hybrid approaches IDS vs. IPS

Intrusion Detection Example of signature-based network intrusion detection (www.snort.org) alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg: "MALWARE"; flow: to_server,established; content:"post"; depth: 4; content:"srng/reg.php HTTP"; within: 50; content:" 0d0a Host 3a "; content:"2020search.com"; within: 40; content:"ipaddr="; nocase; within: 100; classtype: trojan-activity; sid: 2000934; rev:5; ) Example of anomaly-based network intrusion detection system (PAYL) GET /en/html/foo.php HTTP/1.1 User-Agent: Mozilla/5.0 Firefox/1.5.0.11 Host: www.example.com Accept: text/xml,text/html; Accept-Language: A{~!b@#9#0)(@>? Accept-Encoding: gzip,deflate Connection: keep-alive Referrer: http://example.com

Vulnerability Discovery and Protection Automatically finding software bugs Automatic construction of vulnerability signatures from exploits Automatically building patches Patch-based exploit construction Improving OS Security (e.g., DEP, ASLR...) Sandboxing/Virtualization

Web 2.0 Security Browser architecture/sandboxing Browser security policies Secure mashups Javascript security static and dynamic analysis of code e.g., automatic gadget security analysis

Privacy and Anonymity Information leakage in online social networks De-anonymizing public datasets Netflix, Genomic Data,... Attacking the confidentiality of encrypted communications Inferring the language in VoIP conversations Inferring content from HTTPS communications Communication (de-)anonymization Mix networks Improving/Attacking onion routing (e.g., Tor) Traffic watermarking

Physical Security Other topics Identifying keystrokes from audio retrieving encryption keys from memory seeing what other people are watching using reflections Wireless/Cellular Network Security RFID Security VoIP Security Cryptography/Crypto-analysis Electronic Voting Systems... and many others...

How do we choose a good research topic?

Think! What topics inspire you? Read as much as you can about them Not only academic papers E.g.: interested in malware? Subscribe to malware/security blogs SANS Internet Storm Center Microsoft Malware Protection Center Panda Research Blog Krebs on Security etc. Stay up-to-date with real, current problems

Leverage you knowledge! Think about things you are very good at System programming (C/C++, Assembly)? System building? Theory? Algorithms? Machine Learning, AI? While reading previous work, think about how your skills could help you solve an open problem

Problems that will likely grow big! Nobody can predict the future Look at what other people are working on see what people at CMU, Berkeley, Stanford, GTISC, Wisconsin, UCSB, UIUC, etc., are doing if a number of people are working in a particular (sub-)area, it must be of interested try to see whether there is any emerging problem, with a not too big list of previous works is there still something we can say about the topic, can we explore the problem from a new angle? Depart from conventional thinking

Some topics are very hot! Malware Defense current solutions are failing detection is important defense is even more important! Web Security browsers are becoming a platform for applications they are the most common Internet application... and they expose plenty of vulnerabilities! Cloud computing: is this the future? security in the cloud data privacy

Logistics Classroom changes: GSRC 208 (M), HH 101 (TR) Reminder (if you have not yet done so...) Please send me an email with Name, PhD/MSc, year, advisor Email needed to send out last-minute announcements Choose 3 papers from the following list by 8/20 http://www.cs.uga.edu/~perdisci/csci6900-f10/paper_list.html Papers the have been already chosen are marked accordingly

Next Time Monday 8/23 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Read the paper (no review required)