Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud

Size: px
Start display at page:

Download "Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud"

Transcription

1 Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud Berkah I. Santoso, M. Rien S. I, Irwan P. Hotel, Yogyakarta Monday, August 1st, 2016 Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

2 Table of Contents 1 Introduction 2 Literature Review Cloud Computing OpenStack 3 Research Method Performance Evaluation Scenarios Evaluation 4 Results and Discussion Performance Evaluation for NIDS Functionality Evaluation for NIDS computing resource Evaluation for NIDS Accuracy 5 Conclusion 6 References Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

3 Abstract Abstract Cloud computing has become a preferred solution for start-up businesses and corporations. Unfortunately, cloud computing user usually does not pay attention to security aspect of cloud services. Cloud computing security is a mandatory requirement that must be fulfilled by the cloud provider. One of the solution for improving the security aspect of cloud computing services is using Network-based Intrusion Detection System (NIDS). In this research, the authors designed, implemented and evaluated the performance of configured NIDS. The authors also perform analysis of the result and performance evaluation of NIDS on OpenStack private cloud. The aim of this research is to evaluate the NIDS performance and its accuracy in classifying attacks. The results reveal that the model is functioning securely and accurately. The real-time alert of NIDS is able to detect the classified attacks through network successfully. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

4 Introduction Introduction Cloud computing technology is driving a fundamental change in todays computing industry. The technology enables IT managers to treat infrastructure as a common substrate, on which they can provide services to users faster in a much more flexible and cost-effective way - without having to re-design or add the underlying infrastructure. The advantages of cloud computing are: 1) Customized services capacity based on user requirement and needs; 2) Save IT infrastructure investment according to the user budget; 3) Help the IT department transformation that focus on innovation versus maintenance and implementation; 4) Ease the related parties in accessing IT services [1]. Cloud provider can offer private cloud services for corporate and individual user through open source software platform such as Eucalyptus, OpenNebula and OpenStack [2]. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

5 Introduction When the cloud services are connected to the internet, its providers are vulnerable to some potential security risks such as Denial of Service (DoS) attack, traffic flooding, etc. Cloud provider could not rely on firewall and antivirus for mitigating those security attacks. Instead, they could deploy a network-based intrusion detection system (NIDS) on their cloud infrastructure for such purpose. In this paper, we discuss the design, implementation and evaluation of NIDS on private cloud and its characteristics. We also present a case study of private cloud infrastructure deployment using OpenStack which could be monitored using signature-based NIDS. This paper is organized as follows. In Section 3, we discuss the fundamental theory for our research. This is then followed by Section 4 on the design, implementation, and evaluation method for the proposed NIDS-monitored private cloud infrastructure. The results of our experiment and its analysis is given in Section 5, leading to a conclusion presented in Section 6. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

6 Literature Review Literature Review I According to National Institute of Standards and Technology (NIST), cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [3]. The private cloud deployment model is dedicated especially for specific user who accessed and managed their cloud infrastructure. They usually require the controlled-private cloud infrastructure for running their business applications [4]. OpenStack is an open source software platform that can be used to provide cloud infrastructure services. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

7 Literature Review Literature Review II This open source software is under Apache 2.0 license for personal and corporate usage. The private cloud administrator can manage his/her cloud computing resources through a web-based Graphical User Interface [5]. The OpenStack software consists of 3 (three) main components: Compute (Nova), Network (Neutron) and Storage (Swift). Nova manages various processes and Central Processing Unit (CPU) allocation. Neutron manages IP address allocation, traffic controller and devices interconnection. Last but not least, Swift manages the storage capacity [6]. These OpenStack components can be summarized in Figure 1. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

8 Literature Review Literature Review III Figure: The OpenStack main components [6] Intrusion Detection System (IDS) monitors network or systems for malicious activities, signs of anomalies or policy violations. The IDS also analyzes security incident symptoms for infrastructure threat and security policy violation [7, 8]. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

9 Literature Review Literature Review IV NIDS refer to security mechanisms which is placed in strategic point across network for monitoring purposes. An example of NIDS placement on the network is shown in Figure 2. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

10 Literature Review Literature Review V Figure: The NIDS placement across network [9] Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

11 Literature Review Literature Review VI Signature-based IDS recognizes intrusion by using pattern-matching mechanism for classified attack to the IDS database. If a packet contains some patterns that match one or several attack pattern registered in IDS database, the IDS would identify the packet as an attack. The signature-based mechanism is effective in detecting attack without causing fake alert [9]. Denial of Service (DoS) is an attack to the computer system and computer network which diminish and limit legitimate access to computer resources by users. Cloud computing infrastructure may potentially be disrupted by DoS attack because of their internet shared resources [10, 11]. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

12 Literature Review Literature Review VII Closer to this work are [8, 12, 9]. While [8] showed the application of a conceptual clustering technique for filtering alerts generated in a real large scale SaaS cloud system: authors performed analysis of result and performance evaluation of NIDS on OpenStack private cloud. The authors [12] proposed an artificial neural network-based intrusion detection system and [9] evaluated a robust intrusion detection scheme with the goal of developing stand-alone device that can be deployed in a plug-and-play manner to existing systems. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

13 Research Method Research Method I In the research, the Dev Stack community version for Open Stack private cloud is installed in Computer Network Laboratory: Intel R -based servers, the Cisco R Catalyst TM 2960 access switch, and one desktop PC for accessing the web-based GUI. There are three components which constructs the private cloud infrastructure using Open Stack. The components consist of : 1) The server for constructing the private cloud. We are using the Intel R i5 TM CPU GHz-based processor, 8 GB RAM, 1 TB RAID 10 local disk, single 1 Gbps Network Interface Card. 2) The Cisco R Catalyst TM Gbps 24 port, Layer 2 (L2) switch. 3) The client PC (HP R Compaq TM 5700) for accessing the web-based control manager. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

14 Research Method Research Method II The Dev Stack community version of Open Stack is included in the Ubuntu LTS kernel generic stable, which allow for implementation of a private cloud infrastructure. We added the signature-based NIDS Snort version for monitoring the communications. The logical design of OpenStack private cloud and signature-based NIDS can be summarized in Figure 3. Figure: The logical design of Open Stack private cloud and signature-based NIDS Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

15 Research Method Research Method III We needed the port mirroring mechanism in access switch for monitoring the traffic by NIDS. The access switch use Switched Port Analyzer (SPAN) for port mirroring configuration. We selected the switch source port for the server and switch destination port for the signature-based NIDS, so that the source port network traffic would be mirrored to destination port. SPAN configuration can be seen in Figure 4. Figure: The Port mirroring configuration Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

16 Research Method Research Method IV For our research purpose, we configured the NIDS modules in several different modes: sniffer mode, logger mode, and NIDS mode. The NIDS modules consist of the following supporting tools: 1 Snort Engine the module analyzes network traffic and examine incoming packet for Snort rules pattern matching; 2 Snort Rule the module consists of rules set which were predefined to detect the attack; We set the DoS rules for detecting the possible attacks such as UDP echo+chargen bomb attack, UDP Bay/Nortel Nautica Marlin attack, etc; 3 Pulledpork the module updates the Snort rules when latest attack is detected; 4 Alert or Unified Log the module logged the incoming attack in a log file; Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

17 Research Method Research Method V 5 Barnyard2 the module analyzes Snort binary log file and makes the database record; and 6 Snorby the module interprets the result of Snort log to web-based interface. The NIDS modules mechanism is summarized in Figure 5. Figure: The NIDS modules mechanism Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

18 Research Method Research Method VI The performance of OpenStack private cloud and the signature-based NIDS is expressed in terms of the following: Functionality. CPU usage. Memory usage. The performance is observed under three different settings: normal, NIDS-attached, and under attack. The functionality scenario is used to examine detection rate of NIDS whether the basic Unified Datagram Protocol (UDP) flooding in DoS attack host objects performed. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

19 Research Method Research Method VII The CPU usage scenario is used to examine changes of signature-based NIDS CPU usage before and during the attacks. Similary, we would also examine the changes in memory usage by NIDS. We used the GNU top and iptraf application tools for measuring the CPU and memory usage as well as network traffic in every condition. The evaluation of the installed NIDS was conducted to examine its accuracy. We used the confusion matrix [12] to examine the accuracy of signature-based NIDS performance in detecting any possible attacks. The confusion matrix is shown in Table 1. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

20 Research Method Research Method VIII Table: Confusion Matrix Prediction Attack Normal Attack TP FN Normal FP TN There are 4 (four) categories in classified detection: True Positive (TP): the detected package by NIDS. False Positive (FP): the iptraf package which detected by NIDS. True Negative (TN): the detected package by iptraf application tools. False Negative (FN): the detected package by iptraf application tools and they bypassed by NIDS. We used the following parameters to evaluate NIDS performance: Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

21 Research Method Research Method IX 1 Classification Rate (CR) the ratio of classified real event which consist of intrusion and normal traffic compared to total event: CR = TP + TN TP + TN + FP + FN (1) 2 Detection Rate (DR) the ratio of accurate detection compared to total event: TP DR = (2) TP + FN 3 False Positive Rate (FPR) the ratio of detected normal event compared to total event: FPR = FP FP + TN (3) Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

22 Research Method Research Method X 4 Precision Rate (PR) the ratio of true positive intrusion detected compared to total event: PR = TP TP + FP (4) Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

23 Results and Discussion Results and Discussion I The performance of signature-based NIDS was analysed with respect to functionality and computing resources usage (CPU and memory), as outlined by the scenario given in Sec. 1. We also investigated the accuracy of this signature-based NIDS by means of the parameters given in Sec. 2. The signature-based Snort NIDS testing in a private cloud environment involved three different scenarios: 1) normal condition, 2) condition with NIDS attached, and 3) under attack situation with NIDS implemented. In each scenario, we observed the network traffic, CPU usage and memory usage for OpenStack host, FedoraCore Linux based Virtual Machine (VM), and Ubuntu Linux based VM. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

24 Results and Discussion Results and Discussion II The attack was based on basic UDP flooding, and we took a minute-by-minute observation on NIDS functionality during one hour of simulation. The time range would represent sufficient evaluation for this research purpose and we evaluated the scenarios for 4 days. The memory and CPU usage were examined by GNU top application tool. The network traffic which consists of internet protocol (IP), transport control protocol (TCP), unified datagram protocol (UDP) and internet control message protocol (ICMP) were examined by iptraf application tool. We have the signature-based NIDS alert based on the above scenarios, which represent the classified DoS attack detection. We may conclude that there were DoS attack using the UDP flood by the intruder ( ip address). Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

25 Results and Discussion Results and Discussion III The NIDS alert records were saved using Barnyard2 database and the log files were located in /var/log/snort directory. The summary of alert records were then interpreted by Snorby via a web-based interface. The information related to Snorby web-based interface is shown in Figure 6. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

26 Results and Discussion Results and Discussion IV Figure: The Snorby web-based interface Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

27 Results and Discussion Results and Discussion V The observation on UDP traffic in our experiments on each of the OpenStack host, Fedora VM and Ubuntu VM are summarised in Figure 7 9. As expected, the UDP traffic was increased significantly when they were all under attack (Exp. 3 in these figures). The difference of the number packets between this particular scenario with the other two scenarios (Exp. 1 and Exp. 2) is inevitable from our observation. It is also worth noting that both Ubuntu and Fedora VMs were down not long after the attack started. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

28 Results and Discussion Results and Discussion VI Figure: OpenStack host UDP-flooded attack Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

29 Results and Discussion Results and Discussion VII Figure: Ubuntu VM UDP-flooded attack Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

30 Results and Discussion Results and Discussion VIII Figure: Fedora VM UDP-flooded attack Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

31 Results and Discussion Results and Discussion IX The UDP flooding attack simulation did not influence the computing resource such as CPU and memory because the classified UDP flooding attack were bandwidth depletion DoS. The bandwidth depletion DoS flooded the network using unwanted traffic [13]. NIDS average CPU usage is given in Figure 10. We observed that there were a slight increase in average CPU usage (from 0.93% to 2.55% ) following the UDP flooding attack. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

32 Results and Discussion Results and Discussion X Figure: The average of NIDS CPU usage in percentage A similar pattern is also shown by NIDS average memory usage in Figure 11 which shows that there were a slight increase in average memory usage (from 50% to 51%) following the attack. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

33 Results and Discussion Results and Discussion XI Figure: The average of NIDS memory usage in percentage The results of NIDS classification to the UDP flooding attack and its accuracy were summarised in Table 2 and Table 3, respectively. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

34 Results and Discussion Results and Discussion XII These tables show that NIDS has managed to detect the incoming packet as an intrusion. However, the NIDS also exhibit some false intrusions because it falsely recognised some applications on OpenStack host and both VMs as intrusions. Hence the false positive rate on each of the OpenStack host and both VMs. Table: The amount of packet for classified DoS attack Evaluation TP TN FP FN OpenStack host VM Ubuntu, 5 threads VM Fedora, 1 thread Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

35 Results and Discussion Results and Discussion XIII Table: NIDS accuracy Evaluation CR DR FPR PR OpenStack host 99.6 % 100 % 0.07 % 99.9 % VM Ubuntu, 5 threads 88.3 % 100 % 23.3 % 81.1 % VM Fedora, 1 thread 94.4 % 100 % 10.9 % 90 % Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

36 Conclusion Conclusion I In this present study, the signature-based NIDS deployment for OpenStack private cloud was implemented to detect the basic DoS attack. The main goal is to effectively monitor the possible-classified attack on private cloud computing resource. The real-time alert of signature-based NIDS is useful for the private cloud administrator to become aware of any possible classified attacks. The UDP flooding attack did not give significant impact on CPU and memory usage for all the OpenStack host and both VMs. The same kind of attack, however, gave significant impact for the network traffic, resulting in a communication failure between the host and VMs with legitimate clients. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

37 Conclusion Conclusion II Future work could include developing and enhancing features of intrusion prevention for private cloud infrastructure, especially for other security approach and high availability aspects that are suitable for predefined environment. Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

38 References References I A. Gajbhiye and K. M. P. Srivastva, Cloud computing: Need, enabling technology, architecture, advantages and challenges, in Proceedings of the 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence). Amity School of Engineering & Technology, Amity University, India, 2014, pp A. Pillai and L. Swasthimathi, A study on open source cloud computing platforms, EXCEL International Journal of Multidisciplinary Management Studies, vol. 2, no. 7, pp , P. Mell and T. Grance, The national institute of standards and technology (NIST) definition of cloud computing, NIST, NIST Recommendation, [Online]. Available: nistpubs/legacy/sp/nistspecialpublication pdf Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

39 References References II S. Singh and T. Jangwal, Cost breakdown of public cloud computing and private cloud computing and security issues, International Journal of Computer Science & Information Technology (IJCSIT), vol. 4, no. 2, pp , A. Sehgal, Introduction to OpenStack - running a cloud computing infrastructure with OpenStack, in Proceedings of the 6th International Conference on Autonomous Infrastructure, Management & Security. University of Luxembourg, 2012, pp OpenStack, About OpenStack, accessed Dec 15th, [Online]. Available: Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

40 References References III K. Scarfone and P. Mell, Guide to intrusion detection and prevention systems (IDPS), NIST, NIST Recommendation, [Online]. Available: S. S. A. Paudice and D. Cotroneo, An experiment with conceptual clustering for the analysis of security alerts, in Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). Federico II University of Naples, Italy, 2014, pp W. E. B. J. Sun-il Kim, N. Nwanze and P. Field, On network intrusion detection for deployment in the wild, in Proceedings of the IEEE Network Operations and Management Symposium (NOMS). Maui, Hawaii, USA, 2012, pp Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

41 References References IV P. T Gunasekhar, K.Thirupathi Rao and P. Lakshmi, A survey on denial of service attacks, International Journal of Computer Science & Information Technologies (IJCSIT), vol. 5, no. 2, pp , R. Vanathi and S. Gunasekaran, Comparison of network intrusion detection systems in cloud computing environment, in Proceedings of the International Conference on Computer Communication & Informatics (ICCCI). Coimbatore Institute of Engineering & Technology, Coimbatore, India, 2012, pp S. Kumar and A. Yadav, Increasing performance of intrusion detection system using neural network, in Proceedings of the IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). Syed Amal Engineering College, India, May 2014, pp Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

42 References References V S. M. Specht and R. B. Lee, Distributed denial of service: Taxonomies of attacks, tools, and countermeasures, in Proceedings of the 17th International Conference on Parallel & Distributed Computing Systems. Princeton University, 2004, pp Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

43 References Thank You Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan InAES 2016 Presentation Monday, August 1st, / 43

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC

Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC presented by : Berkah I. Santoso Informatics, Bakrie University International Conference on Computer Science

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT

More information

Vulnerability Assessment Of Personal Cloud Server

Vulnerability Assessment Of Personal Cloud Server Vulnerability Assessment Of Personal Cloud Server Dhiraj Kumar 1,Er. Kamal Ranga 2 1 Student,Department of Computer Engineering,Ganga Institute of Technology and Management Maharshi Dayanand University,Rohtak,Haryana,

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Intrusion Detection and Prevention in Internet of Things

Intrusion Detection and Prevention in Internet of Things IJSRD National Conference on Advances in Computer Science Engineering & Technology May 2017 ISSN: 2321-0613 Intrusion Detection and Prevention in Internet of Things Mr. Maulik Bhensdadia 1 Mr. Aditya Kumar

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

A senior design project on network security

A senior design project on network security Michigan Technological University Digital Commons @ Michigan Tech School of Business and Economics Publications School of Business and Economics Fall 2007 A senior design project on network security Yu

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

Implementation of Signature-based Detection System using Snort in Windows

Implementation of Signature-based Detection System using Snort in Windows Implementation of Signature-based Detection System using Snort in Windows Prerika Agarwal Sangita Satapathy Ajay Kumar Garg Engineering College, Ghaziabad Abstract: Threats of attacks are increasing day

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

McAfee Virtual Network Security Platform 8.4 Revision A

McAfee Virtual Network Security Platform 8.4 Revision A 8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

CIH

CIH mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer

More information

Cross Layer Detection of Wormhole In MANET Using FIS

Cross Layer Detection of Wormhole In MANET Using FIS Cross Layer Detection of Wormhole In MANET Using FIS P. Revathi, M. M. Sahana & Vydeki Dharmar Department of ECE, Easwari Engineering College, Chennai, India. E-mail : revathipancha@yahoo.com, sahanapandian@yahoo.com

More information

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(4): 43-47 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) A Novel Approach

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Darknet Traffic Monitoring using Honeypot

Darknet Traffic Monitoring using Honeypot Darknet Traffic Monitoring using Honeypot 1 Hemal khorasia, 2 Mr. Girish Khilari 1 IT Systems & Network Security, 1 Gujarat Technological University, Ahmedabad, India Abstract - A "Darknet" is a portion

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Internet Traffic Classification using Machine Learning

Internet Traffic Classification using Machine Learning Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville

More information

Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions

Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Studying the Security in VoIP Networks

Studying the Security in VoIP Networks Abstract Studying the Security in VoIP Networks A.Alseqyani, I.Mkwawa and L.Sun Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK e-mail: info@cscan.org Voice

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1

Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1 Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1 Overview Denial of Service (DoS) and Distributed Denial of Service (DDoS) types of attack are attempts to disrupt network

More information

Intrusion Detection System with FGA and MLP Algorithm

Intrusion Detection System with FGA and MLP Algorithm Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,

More information

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman, StudentMember, IEEE Kawser Wazed Nafi Syed Akther Hossain, Member, IEEE & ACM Abstract Cloud

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

Virtualized Testbed Development using Openstack

Virtualized Testbed Development using Openstack , pp.742-746 http://dx.doi.org/10.14257/astl.2015.120.147 Virtualized Testbed Development using Openstack Byeongok Kwak 1, Heeyoung Jung 1, 1 Electronics and Telecommunications Research Institute (ETRI),

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

The Future of Threat Prevention

The Future of Threat Prevention The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 644-651 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION Lochan.B 1, Divyashree B A 2 1

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Distributed intrusion detection system using sensor based mobile agent technology

Distributed intrusion detection system using sensor based mobile agent technology Distributed intrusion detection system using sensor based mobile agent technology Vineet Kumar Chaudhary Department of Computer Science & Engineering Galgotia,Uttar Pradesh, India Santosh Kumar Upadhyay

More information

Machine Learning Opportunities in Cloud Computing Datacenter Management for 5G Services

Machine Learning Opportunities in Cloud Computing Datacenter Management for 5G Services Machine Learning Opportunities in Cloud Computing Datacenter Management for 5G Services Benjamín Barán National University of the East, Ciudad del Este, Paraguay bbaran@pol.una.py Introduction and Motivation

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

MidoNet Scalability Report

MidoNet Scalability Report MidoNet Scalability Report MidoNet Scalability Report: Virtual Performance Equivalent to Bare Metal 1 MidoNet Scalability Report MidoNet: For virtual performance equivalent to bare metal Abstract: This

More information

Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia

Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, ON, Canada Motivation: IoT

More information

MITIGATING DDOS ATTACK IN CLOUD ENVIRONMENT WITH PACKET FILTERING USING IPTABLES

MITIGATING DDOS ATTACK IN CLOUD ENVIRONMENT WITH PACKET FILTERING USING IPTABLES International Journal of Computer Engineering and Applications, Volume VII, Issue II, August 14 www.ijcea.com ISSN 2321-3469 MITIGATING DDOS ATTACK IN CLOUD ENVIRONMENT WITH PACKET FILTERING USING IPTABLES

More information

PROTECTING INFORMATION ASSETS NETWORK SECURITY

PROTECTING INFORMATION ASSETS NETWORK SECURITY PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security

More information

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu)

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu) SeoulTech UCS Lab Chapter 7 Network Intrusion Detection and Analysis 2015. 11. 3 (Daming Wu) Email: wdm1517@gmail.com Copyright c 2015 by USC Lab All Rights Reserved. Table of Contents 7.1 Why Investigate

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

A New Platform NIDS Based On WEMA

A New Platform NIDS Based On WEMA I.J. Information Technology and Computer Science, 2015, 06, 52-58 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.06.07 A New Platform NIDS Based On WEMA Adnan A.

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

A Firewall Architecture to Enhance Performance of Enterprise Network

A Firewall Architecture to Enhance Performance of Enterprise Network A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

The Design Of Private Cloud Platform For Colleges And Universities Education Resources Based On Openstack. Guoxia Zou

The Design Of Private Cloud Platform For Colleges And Universities Education Resources Based On Openstack. Guoxia Zou 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) The Design Of Private Cloud Platform For Colleges And Universities Education Resources Based On Openstack Guoxia

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

ITRI Cloud OS: An End-to-End OpenStack Solution

ITRI Cloud OS: An End-to-End OpenStack Solution ITRI Cloud OS: An End-to-End OpenStack Solution Tzi-cker Chiueh 闕志克 Cloud Computing Research Center for Mobile Applications (CCMA) 雲端運算行動應用研究中心 1 Cloud Service Models Software as a Service (SaaS) Turn-key

More information

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes Abdul Fadlil Department of Electrical Engineering Ahmad Dahlan University Yogyakarta, Indonesia Imam Riadi Department of Information

More information

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018 Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018 Cybersecurity Opportunities Cybercrime Costs Security Spending Cybersecurity Ventures: Cybersecurity Market

More information

system to cover their tracks, the HIDS can provide an independent audit trail of the attack.

system to cover their tracks, the HIDS can provide an independent audit trail of the attack. A host-based IDS (HIDS) works differently from a network-based version of IDS. While a network-based IDS resides on a network segment and monitors activities across that segment, a host-based IDS resides

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Enhanced Malware Monitor in SDN using Kinetic Controller

Enhanced Malware Monitor in SDN using Kinetic Controller IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 46-52 www.iosrjournals.org Enhanced Malware Monitor in SDN using Kinetic Controller Jiphi T S, Simi Krishna K R Department

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

Collaborative Security Attack Detection in Software-Defined Vehicular Networks

Collaborative Security Attack Detection in Software-Defined Vehicular Networks Collaborative Security Attack Detection in Software-Defined Vehicular Networks APNOMS 2017 Myeongsu Kim, Insun Jang, Sukjin Choo, Jungwoo Koo, and Sangheon Pack Korea University 2017. 9. 27. Contents Introduction

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,

More information

High Performance Computing Cloud - a PaaS Perspective

High Performance Computing Cloud - a PaaS Perspective a PaaS Perspective Supercomputer Education and Research Center Indian Institute of Science, Bangalore November 2, 2015 Overview Cloud computing is emerging as a latest compute technology Properties of

More information

Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics

Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 2, June 2017, pp. 140~148, DOI: 10.11591/eei.v6i2.605 140 Review of Detection DDOS Attack Detection Using Naive Bayes Classifier

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information