Darknet Traffic Analysis by Using Source Host Classification

Size: px
Start display at page:

Download "Darknet Traffic Analysis by Using Source Host Classification"

Transcription

1 Computer Security Sympium ober IP IP IP OS 4,96 IP 2 Darknet Traffic Analysis by Using Source Ht Classification Akira Saso Tatsuya Mori Shigeki Goto School of Fundamental Science and Engineering, Waseda University Okubo, Shinjuku-ku, Tokyo , JAPAN {saso,mori}@nsl.cs.waseda.ac.jp,goto@goto.info.waseda.ac.jp Abstract Since all the incoming unidirectional packets destined to Darknet do not consist of payload, information available from packet headers such as time stamp, source IP addresses, destination port numbers, and packet size are commonly used for Darknet traffic analysis. However, information obtained through IP address is limited. For instance, it is not an easy task to differenciate systematic port scans that arrive intermittently from the ones generated by new worm outbreaks. Based on the observation, this work aims to extend the information of source hts by using two techniques: traffic pattern extraction and OS finger printing. Throughe the analysis of Darknet traffic data that is collected from /2 size Darknet for two years, we report several case studies that sucessfully demonstrate the usefulness of our approach (darknet) [1, 2, 3, 4] IP

2 IP IP [1, 2] IP [1, 2] IP IP RIR Geo IP IP TCP ,96 IP 2 (nicter darknet 213 [5]) (1) (2) 3389/TCP 3389/TCP (3) 23/TCP 1 Linux (4) ios /2 ios Moore [1] 23 Slammer Network Telescope Network Telescope Slammer nicter [2]

3 1: ,667,825 2,64, ,575,737 1,288, ,189,234 54, ,173 5, ,796,95 18,69 8 6,562,386 6, ,95,674 56,38 113,1,88 7,564,19 2: IP ( ) Point visitor ( ) d(h) = 1, p(h) = 1 Single-shot (SS) d(h) = 1, p(h) 2 Multi-shot (MS) 2 d(h) 1 Low scanner (LS) 11 d(h) 485 Middle scanner (MS) 486 d(h) < 496 High scanner (HS) d(h) = 496 Full scanner (FS) [6] [3] IP IP Dainotti [4] IP 3: SS 3,764,871 3,764,871 MS 1,381, ,356 LS 9,428,829 2,267,45 MS 42,53, ,448 HS 8,335,668 1,737 FS 47,595,994 8,323 (Win32/Morto) Win32/Morto TCP 3 MWS 213 [7] nicter darknet dataset 213 [5] nicter darknet dataset nicter [2] pcap TCP SQL Remote Desktop Protocol (RDP) h IP d(h) p(h) d(h) p(h) IP FS SS FS.1

4 Nmap [8] IP SS 4 SS Internet Background Radiation (IBR) [9] IP SS 4.2 4: OS OS (TCP/IP stack) 24,688,827 2,989,658 Linux 2.4.x 9,5,473 2,159,861 Windows 7 or 8 2,96, ,1 Linux 2.6.x 6,993, ,625 UNKNOWN 58,946, ,2 Windows NT kernel 3,56, ,856 Linux 2.2.x-3.x 793, ,938 Linux 2.4.x-2.6.x 1,212,71 54,999 Nmap 2,485,664 45,332 Windows NT kernel 5.x 172,189 35,612 Linux 2.2.x-3.x (barebone) 94,342 33,439 Mac OS X 1.x 1,988 15,825 Linux 3.x 877,535 5,25 Linux 2.2.x-3.x (no timestamps) 212,287 2,965 ios iphone or ipad 99, Others 831,765 4,691 OS [1] OS TCP/IP OS TCP OS IDS OS pf [11] 3 2 OS Windows Linux 2.4.x UNKNOWN UNKNOWN pf pf OS TCP/IP UNKNOWN Mac OS X ios OS FS NS Morto SS SS LS

5 3e+5 3e+5 Number of packets 2e+5 1e+5 scan type full high low middle multi shot single shot Number of packets 2e+5 1e+5 Linux 2.4.x UNKNOWN Windows 7 or 8 e+ e+ 4 Number of unique hts 2 1 scan type full high low middle multi shot single shot Number of unique hts 3 2 Linux 2.4.x UNKNOWN Windows 7 or 8 1 1: ( ) ( ) 3: ( ) ( ) 75 Number of unique hts 5 25 Feb Mar May Jun Aug Sep Nov 2: SS Dec Morto 8 SS SS OS

6 7 1 Linux Morto Windows OS Linux UNKNOWN OS [12, 13] TCP/IP OS 6 Number of packets Number of unique hts Feb Mar May Jun Aug Sep Nov Dec no MSS Windows 7 or 8 no MSS Windows 7 or /TCP 3389/TCP Windows OS Morto Morto RDP 3389/TCP nicter Morto TCP SYN /TCP 8 Win32/Morto Windows OS SS Windows OS Morto IP Feb Mar May Jun Aug Sep Nov Dec 4: 3389/TCP ( ) ( ) ( ) [14] 3389/TCP Morto no MSS 3389/TCP FS Morto Windows no MSS pf SYN MSS OS MSS

7 Number of unique hts Feb Mar May Jun Aug Sep Nov Dec Linux 2.2.x 3.x Linux 2.4.x Linux 2.6.x UNKNOWN 5: 23/TCP SS MSS Nmap MSS MSS OS /TCP 3 Linux 23/TCP SS 5 SS 23/TCP Linux 23/TCP SANS [15] Linux IP Linux 23/TCP (telnet) 23/TCP 2 Linux OS Psybt [16] Honeypot OS 6.3 Apple Apple 6 Mac OS X ios Mac OS X ios ios 1 1 (4,96 /2 1 1 ) (1) ios (2) ios (3) ios ios ios 1 ios [17] ios

8 Number of packets Number of unique hts ios iphone or ipad Mac OS X 1.x ios iphone or ipad Mac OS X 1.x 6: Apple ( ) ( ) 7 4,96 2 [1] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, Inside the slammer worm, Security & Privacy, IEEE, vol. 1, no. 4, pp , 23. [2] D. Inoue, M. Eto, K. Yhioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, and K. Nakao, nicter: An incident analysis system toward binding network monitoring with malware analysis, in WOMBAT Workshop on Information Security Threats Data Collection and Sharing, pp , IEEE, 28. [3] A. Shimoda, T. Mori, and S. Goto, Extended darknet: Multi-dimensional internet threat monitoring system., IEICE Transactions, vol. 95-B, no. 6, pp ,. [4] A. Dainotti, R. Amman, E. Aben, and K. Claffy, Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the Internet, ACM SIGCOMM Computer Communication Review (CCR), vol. 42, pp ,. [5] nicter darknet /files/nicterdarknet_Dataset_213.pdf. [6] nicterweb. [7], MWS Datasets 213. MWS iwsec.org/mws/213/, 213. [8] G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 29. [9] E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston, Internet background radiation revisited, in Proceedings of the 1th ACM SIGCOMM conference on Internet measurement, IMC 1, (New York, NY, USA), pp , ACM, 21. [1] G. Taleck, Ambiguity Resolution via Passive OS Fingerprinting, in Recent Advances in Intrusion Detection, vol. 282, ch. 11, pp , 23. [11] pf. [12],,, and, TCP,, vol. 52, pp , jun. [13] T. Mori, H. Esquivel, A. Akella, A. Shimoda, and S. Goto, Understanding large-scale spamming botnets from internet edge sites, in Proc. of CEAS 21, 21. [14] G. Keizer, New Windows worm spreads by attacking weak passwords. s/article/ /new_windows_worm_spreads_by_ attacking_weak_passwords, Aug. [15] SANS Internet Storm Center, Port details: Port [16] Baume, Terry, Netcomm NB5 Botnet PSYBT 2.5L. info=exlink. [17] Zack Whittaker, WWDC 13: Apple keynote, by the numbers. wwdc-13-apple-keynote-by-the-numbers /

4-2 Rapid Analysis Technologies for Live Networks

4-2 Rapid Analysis Technologies for Live Networks 4 Cyber-Security Technologies: Live Network Monitoring and Analysis Technologies 4-2 Rapid Analysis Technologies for Live Networks Ichiro SHIMADA and Yu TSUDA In targeted cyberattacks, the attackers intrude

More information

Overview of nicter - R&D project against Cyber Attacks in Japan -

Overview of nicter - R&D project against Cyber Attacks in Japan - Overview of nicter - R&D project against Cyber Attacks in Japan - Daisuke INOUE Cybersecurity Laboratory Network Security Research Institute (NSRI) National Institute of Information and Communications

More information

3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks

3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks 3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks Mio SUZUKI, Koei SUZUKI, Yaichiro TAKAGI, and Ryoichi ISAWA In a regular organization, major approach

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information

An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets.

An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets. An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets. Ignus van Zyl 1 Statement of problem Network telescopes

More information

Rob Sherwood Bobby Bhattacharjee Ryan Braud. University of Maryland. Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse p.

Rob Sherwood Bobby Bhattacharjee Ryan Braud. University of Maryland. Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse p. Rob Sherwood Bobby Bhattacharjee Ryan Braud University of Maryland UCSD Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse p.1 Sender Receiver Sender transmits packet 1:1461 Time Misbehaving

More information

Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet sustainability Article Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet Jungsuk Song 1, Younsu Lee 1, Jang-Won Choi 1, Joon-Min Gil 2, Jaekyung Han 3

More information

3-2 GHOST Sensor: Development of a Proactive Cyber-attack Observation Platform

3-2 GHOST Sensor: Development of a Proactive Cyber-attack Observation Platform 3 Cybersecurity Technologies : Darknet Monitoring and Analysis 3-2 GHOST Sensor: Development of a Proactive Cyber-attack Observation Platform Masashi ETO There have been several network monitoring projects

More information

Module 19 : Threats in Network What makes a Network Vulnerable?

Module 19 : Threats in Network What makes a Network Vulnerable? Module 19 : Threats in Network What makes a Network Vulnerable? Sharing Unknown path Many points of attack What makes a network vulnerable? Unknown perimeter Anonymity Complexity of system Categories of

More information

Security activities in Japan towards the future standardization. Cybersecurity

Security activities in Japan towards the future standardization. Cybersecurity Security activities in Japan towards the future standardization Side Event Cybersecurity Koji NAKAO KDDI, Japan Content Current threats - Internet User in Japan - However, observation of many scans (by

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling. SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling http://killexams.com/exam-detail/sec504 QUESTION: 315 Which of the following techniques can be used to map 'open' or 'pass through'

More information

Analysis of Country-wide Internet Outages Caused by Censorship

Analysis of Country-wide Internet Outages Caused by Censorship CAIDA Workshop on BGP and Traceroute data August 22nd, 211- San Diego (CA), USA Analysis of Country-wide Internet Outages Caused by Censorship Alberto Dainotti - alberto@unina.it University of Napoli Federico

More information

Flow Based Observations from NETIQhome and Honeynet Data

Flow Based Observations from NETIQhome and Honeynet Data Workshop on Infonnation Assurance and Security Flow Based Observations from NETIQhome and Honeynet Data Julian B. Grizzard, Charles R. Simpson, Jr., Sven Krasser, Henry L. Owen, George F. Riley {gizzard,

More information

A Robust Classifier for Passive TCP/IP Fingerprinting

A Robust Classifier for Passive TCP/IP Fingerprinting A Robust Classifier for Passive TCP/IP Fingerprinting Rob Beverly MIT CSAIL rbeverly@csail.mit.edu April 20, 2004 PAM 2004 Typeset by FoilTEX Outline A Robust Classifier for Passive TCP/IP Fingerprinting

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

8/19/2010. Computer Forensics Network forensics. Data sources. Monitoring

8/19/2010. Computer Forensics Network forensics. Data sources. Monitoring Computer Forensics Network forensics Thomas Mundt thm@informatik.uni-rostock.de Data sources Assessment Monitoring Monitoring Software Logs and Log Analysis Incident Analysis External Assessment Hackers

More information

VPN On Constructing the Environment of Secure Remote Office

VPN On Constructing the Environment of Secure Remote Office VPN On Constructing the Environment of Secure Remote Office Masakatu MORII Masami MOHRI 1. CINON CINON PERM (Privacy Enhanced information Reading and writing Management method) [6] Lamport CINON PERM Man

More information

Police Technical Approach to Cyber Threats

Police Technical Approach to Cyber Threats Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

Investigating the Dark Cyberspace: Profiling, Threat-Based Analysis and Correlation

Investigating the Dark Cyberspace: Profiling, Threat-Based Analysis and Correlation . 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) Investigating the Dark Cyberspace: Profiling, Threat-Based Analysis and Correlation Claude Fachkha, Elias Bou-Harb,

More information

ICSMap: An ICS Scanning Tool Based on Stateless Connections

ICSMap: An ICS Scanning Tool Based on Stateless Connections 217 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 217) ISBN: 978-1-6595-485-1 ICSMap: An ICS Scanning Tool Based on Stateless Connections ZHUO CHEN, HUA ZHANG

More information

Estimating Internet Address Space Usage through Passive Measurements

Estimating Internet Address Space Usage through Passive Measurements Estimating Internet Address Space Usage through Passive Measurements Alberto Dainotti, Michael Kallitsis Karyn Benson, Alistair King, Merit Network, Inc. kc claffy Ann Arbor, Michigan, USA CAIDA, UC San

More information

Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting

Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting Zain Shamsi,, Daren B.H. Cline, and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering

More information

A Fusion Framework of IDS Alerts and Darknet Traffic for Effective Incident Monitoring and Response

A Fusion Framework of IDS Alerts and Darknet Traffic for Effective Incident Monitoring and Response Appl. Math. Inf. Sci. 11, No. 2, 417-422 (2017) 417 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.18576/amis/110209 A Fusion Framework of IDS Alerts and Darknet

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ slide 1 D. Moore, G. Voelker, S. Savage Inferring Internet Denial-of-Service Activity (USENIX

More information

A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports

A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports Nitin Tiwari 1 1 Dept. of Information Technology, Swami Vivekananda University, Sagar,

More information

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA) Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA) Michael Rash CTO, Solirix Inc. michael.rash@solirix.com http://www.cipherdyne.org/ DEF CON 08/05/2006 Agenda

More information

Internet-wide Scanning Taxonomy and Framework

Internet-wide Scanning Taxonomy and Framework Internet-wide Scanning Taxonomy and Framework David Myers 1 Ernest Foo 2 Kenneth Radke 3 1 Email: d1.myers@connect.qut.edu.au 2 Email: e.foo@qut.edu.au 3 Email: k.radke@qut.edu.au Abstract Industrial control

More information

Malware models for network and service management

Malware models for network and service management Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.

More information

CE Advanced Network Security Honeypots

CE Advanced Network Security Honeypots CE 817 - Advanced Network Security Honeypots Lecture 12 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Get BitDefender Client Security 2 Years 30 PCs software suite ] Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 5 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Group project: 2 or 3 students

More information

Investigating Study on Network Scanning Techniques

Investigating Study on Network Scanning Techniques Investigating Study on Network Scanning Techniques Mohammed Anbar 1, Ahmed Manasrah 2,Sureswaran Ramadass 3,Altyeb Altaher 4, Ashraf Aljmmal 5, Ammar Almomani 6 1.3.4.6 National Advanced IPv6 Centre (NAv6),

More information

RFC1918 updates on servers near M and F roots C A I D A. Andre Broido, work in progress. CAIDA WIDE Workshop ISI, CAIDA / SDSC / UCSD

RFC1918 updates on servers near M and F roots C A I D A. Andre Broido, work in progress. CAIDA WIDE Workshop ISI, CAIDA / SDSC / UCSD RFC1918 updates on servers near M and F roots Andre Broido, work in progress C A I D A CAIDA / SDSC / UCSD http://www.caida.org CAIDA WIDE Workshop ISI, 2005-03-12 Previous projects IPv4 list (Young, Brad)

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Heuristics for Detecting Botnet Coordinated Attacks

Heuristics for Detecting Botnet Coordinated Attacks Heuristics for Detecting Botnet Coordinated Attacks Kazuya Kuwabara Hiroaki Kikuchi Graduate School of Science and Technology, Tokai University, 1117 Kitakaname, Hiratsuka, Kanagawa 259-1292, Japan mulberry@cs.dm.u-tokai.ac.jp

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Automated Port-scan Classification with Decision Tree and Distributed Sensors

Automated Port-scan Classification with Decision Tree and Distributed Sensors Journal of Information Processing Vol. 16 165 175 (Sep. 2008) Regular Paper Automated Port-scan Classification with Decision Tree and Distributed Sensors Hiroaki Kikuchi, 1 Naoya Fukuno, 1 Tomohiro Kobori,

More information

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets. Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and

More information

Hardware Supports for Network Traffic Anomaly Detection

Hardware Supports for Network Traffic Anomaly Detection Hardware Sups for Network Traffic Anomaly Detection Dae-won Kim and Jin-tae Oh Electronics and Telecommunications Research Institute in Korea Abstract - Modern network systems are plagued with unknown

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

A Framework for Attack Patterns Discovery in Honeynet Data

A Framework for Attack Patterns Discovery in Honeynet Data DIGITAL FORENSIC RESEARCH CONFERENCE A Framework for Attack Patterns Discovery in Honeynet Data By Olivier Thonnard, Marc Dacier Presented At The Digital Forensic Research Conference DFRWS 2008 USA Baltimore,

More information

Computer Sciences Department

Computer Sciences Department Computer Sciences Department Understanding the World s Worst Spamming Botnet Tatsuya Mori Holly Esquivel Aditya Akella Akihiro Shimoda Shigeki Goto Technical Report #166 June 29 Understanding the World

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Jun Bi, Miao Zhang, and Lei Zhao Network Research Center Tsinghua University Beijing, P.R.China, 100084 junbi@tsinghua.edu.cn

More information

Network Function Property Algorithm. CounterACT Technical Note

Network Function Property Algorithm. CounterACT Technical Note Table of Contents About the Network Function Property... 3 Network Function Algorithm Criteria... 4 1. Manual Classification... 4 2. Managed CounterACT Appliance... 4 3. Managed Endpoint... 4 4. Switch

More information

Visualizing Network Data for Intrusion Detection. Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland June 16, 2005

Visualizing Network Data for Intrusion Detection. Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland June 16, 2005 Visualizing for Intrusion Detection Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland June 16, 2005 Motivation/Background traffic capacity is greater than systems can process. attacks have not

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Practical Training in. IT-Security. Information gathering. - Experiment manual - Tasks. B.Sc. BG 24 M.Sc. AI MN 1 M.Sc. EB 10

Practical Training in. IT-Security. Information gathering. - Experiment manual - Tasks. B.Sc. BG 24 M.Sc. AI MN 1 M.Sc. EB 10 IT-Security Practical Training in IT-Security - Experiment manual - Before an attacker can intrude into the system, he must obtain information about this system. He must know, which ports are open, which

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Learning Objective Explain the importance of network principles and architecture

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

TCP TCP/IP: TCP. TCP segment. TCP segment. TCP encapsulation. TCP encapsulation 1/25/2012. Network Security Lecture 6

TCP TCP/IP: TCP. TCP segment. TCP segment. TCP encapsulation. TCP encapsulation 1/25/2012. Network Security Lecture 6 TCP TCP/IP: TCP Network Security Lecture 6 Based on IP Provides connection-oriented, reliable stream delivery service (handles loss, duplication, transmission errors, reordering) Provides port abstraction

More information

Port Forwarding Technical Support Guide

Port Forwarding Technical Support Guide Port Forwarding Technical Support Guide Copyright Copyright 2015 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of this document

More information

FPGA based Network Traffic Analysis using Traffic Dispersion Graphs

FPGA based Network Traffic Analysis using Traffic Dispersion Graphs FPGA based Network Traffic Analysis using Traffic Dispersion Graphs 2 nd September, 2010 Faisal N. Khan, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Gray s Anatomy: Dissecting Scanning Activities Using IP Gray Space Analysis

Gray s Anatomy: Dissecting Scanning Activities Using IP Gray Space Analysis Gray s Anatomy: Dissecting Scanning Activities Using IP Gray Space Analysis Yu Jin, György Simon, Kuai Xu, Zhi-Li Zhang, Vipin Kumar Department of Computer Science, University of Minnesota {yjin,gsimon,kxu,zhzhang,kumar}@cs.umn.edu

More information

Leurré.com. a worldwide distributed platform to study Internet threats. Deployed and Managed by The Eurecom Institute

Leurré.com. a worldwide distributed platform to study Internet threats. Deployed and Managed by The Eurecom Institute Leurré.com com: a worldwide distributed platform to study Internet threats Deployed and Managed by The Eurecom Institute (teaching and research institute located on the French Riviera) Contact Point: dacier@eurecom.fr

More information

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi INF5290 Ethical Hacking Lecture 3: Network reconnaissance, port scanning Universitetet i Oslo Laszlo Erdödi Lecture Overview Identifying hosts in a network Identifying services on a host What are the typical

More information

IPv6 Pollution Traffic Analysis

IPv6 Pollution Traffic Analysis IPv6 Pollution Traffic Analysis Manish Karir (DHS S&T Cyber Security Division) Jake Czyz, Kyle Lady, Sam Miller, Michael Kallitsis, Michael Bailey (University of Michigan) Internet Pollu+on Darknet sensors

More information

Moderated by: Moheeb Rajab Background singers: Jay and Fabian

Moderated by: Moheeb Rajab Background singers: Jay and Fabian Network Forensics and Next Generation Internet Attacks Moderated by: Moheeb Rajab Background singers: Jay and Fabian 1 Agenda Questions and Critique of Timezones paper Extensions Network Monitoring (recap)

More information

Computer and Network Security

Computer and Network Security Computer and Network Security c Copyright 2000 R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Network Security (Pfleeger

More information

Flows at Masaryk University Brno

Flows at Masaryk University Brno Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : August 03, 2017 Microsoft Certification ID : 2069071 JESSE WIMBERLEY 5421 33RD CT SE LACEY, Washington 98503 US jesse.wimberley@gmail.com ACTIVE MICROSOFT CERTIFICATIONS: Microsoft

More information

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:

More information

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori 1, Takeru Inoue 2, Akihiro Shimoda 3, Kazumichi Sato 3, Keisuke Ishibashi 3, and Shigeki Goto

More information

Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses

Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses International Journal of Informatics Society, VOL.10, NO.1 (2018) 41-50 41 Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses Shihori Kanazawa

More information

Port Mirroring in CounterACT. CounterACT Technical Note

Port Mirroring in CounterACT. CounterACT Technical Note Table of Contents About Port Mirroring and the Packet Engine... 3 Information Based on Specific Protocols... 4 ARP... 4 DHCP... 5 HTTP... 6 NetBIOS... 7 TCP/UDP... 7 Endpoint Lifecycle... 8 Active Endpoint

More information

A System for Characterising Internet Background Radiation Literature Review

A System for Characterising Internet Background Radiation Literature Review A System for Characterising Internet Background Radiation Literature Review David Yates May 30, 2014 1 Introduction This literature review introduces the reader to Internet Background Radiation (IBR),

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

The Industry of Social Network Manipulation: from Botnets to Hucksters

The Industry of Social Network Manipulation: from Botnets to Hucksters SESSION ID: SEM-M03C The Industry of Social Network Manipulation: from Botnets to Hucksters Masarah Paquet-Clouston Cybersecurity Researcher GoSecure CounterTack @masarahclouston Olivier Bilodeau Cybersecurity

More information

Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm

Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Scalability, Fidelity, and in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Collaborative Center

More information

A Robust Classifier for Passive TCP/IP Fingerprinting

A Robust Classifier for Passive TCP/IP Fingerprinting A Robust Classifier for Passive TCP/IP Fingerprinting Robert Beverly MIT Computer Science and Artificial Intelligence Laboratory rbeverly@csail.mit.edu Abstract. Using probabilistic learning, we develop

More information

Inferring TCP Congestion Control Algorithms by Correlating Congestion Window Sizes and their Differences

Inferring TCP Congestion Control Algorithms by Correlating Congestion Window Sizes and their Differences ICSNC 24 : The Ninth International Conference on Systems and Networks Communications Inferring TCP Congestion Control Algorithms by Correlating Congestion Window Sizes and their Differences Toshihiko Kato,

More information

Darknet Traffic Monitoring using Honeypot

Darknet Traffic Monitoring using Honeypot Darknet Traffic Monitoring using Honeypot 1 Hemal khorasia, 2 Mr. Girish Khilari 1 IT Systems & Network Security, 1 Gujarat Technological University, Ahmedabad, India Abstract - A "Darknet" is a portion

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments Objectives Define risk and risk management Describe the components of risk management List

More information

Network Analysis of Point of Sale System Compromises

Network Analysis of Point of Sale System Compromises Network Analysis of Point of Sale System Compromises Operation Terminal Guidance Chicago Electronic & Financial Crimes Task Force U.S. Secret Service Outline Background Hypothesis Deployment Methodology

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

JPCERT/CC Incident Handling Report [January 1, March 31, 2018] JPCERT-IR-2018-01 Issued: 2018-04-12 JPCERT/CC Incident Handling Report [January 1, 2018 - March 31, 2018] 1. About the Incident Handling Report JPCERT Coordination Center (herein, JPCERT/CC) receives

More information

Online Accumulation: Reconstruction of Worm Propagation Path

Online Accumulation: Reconstruction of Worm Propagation Path Online Accumulation: Reconstruction of Worm Propagation Path Yang Xiang, Qiang Li, and Dong Guo College of Computer Science and Technology, JiLin University ChangChun, JiLin 32, China sharang@yahoo.cn,

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

CIH

CIH mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer

More information

Fast and Evasive Attacks: Highlighting the Challenges Ahead

Fast and Evasive Attacks: Highlighting the Challenges Ahead Fast and Evasive Attacks: Highlighting the Challenges Ahead Moheeb Rajab, Fabian Monrose, and Andreas Terzis Computer Science Department Johns Hopkins University Outline Background Related Work Sampling

More information

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized

More information

Internet Threat Detection System Using Bayesian Estimation

Internet Threat Detection System Using Bayesian Estimation Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using

More information

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter Computer Network Lab 2017 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter 1 Security Security means, protect information (during

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June-2013 53 Dynamic Honeypot Construction Amanjot Kaur Assistant Professor S.D.S.P.M. College for Women, (Rayya), Amritsar,

More information

The 2010 Personal Firewall Robustness Evaluation

The 2010 Personal Firewall Robustness Evaluation Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2010 The 2010 Personal Robustness Evaluation Satnam Singh Bhamra Edith Cowan University

More information

Introduction TELE 301. Routers. Firewalls. Gateways. Sample Large Network

Introduction TELE 301. Routers. Firewalls. Gateways. Sample Large Network Introduction TELE 301 Lecture 21: s David Eyers (dme@cs.otago.ac.nz) Telecommunications Programme University of Otago Discernment of Routers, s, Gateways Placement of such devices Elementary firewalls

More information

vol.15 August 1, 2017 JSOC Analysis Team

vol.15 August 1, 2017 JSOC Analysis Team vol.15 August 1, 2017 JSOC Analysis Team JSOC INSIGHT vol.15 1 Preface...2 2 Executive Summary...3 3 Trends in Severe Incidents at the JSOC...4 3.1 Trends in severe incidents... 4 3.2 Analysis of severe

More information

TECHNICAL NOTE CLEARPASS PROFILING QUICK START GUIDE

TECHNICAL NOTE CLEARPASS PROFILING QUICK START GUIDE TECHNICAL NOTE CLEARPASS PROFILING QUICK START GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas Aug 2016 Version 1 initial release 1344 CROSSMAN AVE SUNNYVALE, CA 94089 1.866.55.ARUBA T: 1.408.227.4500

More information

Understanding IPv6 Internet Background Radia6on

Understanding IPv6 Internet Background Radia6on Understanding IPv6 Internet Background Radia6on Jakub Czyz*, Kyle Lady*, Sam Miller*, Michael Kallitsis, Manish Karir, Michael Bailey* *University of Michigan Merit Network Dept. of Homeland Security S&T

More information

ARAKIS An Early Warning and Attack Identification System

ARAKIS An Early Warning and Attack Identification System ARAKIS An Early Warning and Attack Identification System Piotr Kijewski Piotr.Kijewski@cert.pl 16th Annual FIRST Conference June 13-18, Budapest, Hungary Presentation outline Trends in large scale malicious

More information

Botnets Behavioral Patterns in the Network

Botnets Behavioral Patterns in the Network Botnets Behavioral Patterns in the Network Garcia Sebastian @eldracote Hack.Lu 2014 CTU University, Czech Republic. UNICEN University, Argentina. October 23, 2014 How are we detecting malware and botnets?

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 13

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 13 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 13 Announcements Project 2 is on the web. Due: March 15th Send groups to Jeff Vaughan (vaughan2@seas) today. Plan for today: Automatic

More information