Investigating Study on Network Scanning Techniques

Size: px
Start display at page:

Download "Investigating Study on Network Scanning Techniques"

Transcription

1 Investigating Study on Network Scanning Techniques Mohammed Anbar 1, Ahmed Manasrah 2,Sureswaran Ramadass 3,Altyeb Altaher 4, Ashraf Aljmmal 5, Ammar Almomani National Advanced IPv6 Centre (NAv6), UniversitiSains Malaysia, USM, Penang, Malaysia, anbar@nav6.org, sures@nav6.usm.my, ammarali@nav6.org 2 Faculty of Information Technology and Computer Sciences, Yarmouk University, Irbid, Jordan, ahmad.a@yu.edu.jo 5 Computer Science and Applications, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology The Hashemite University, Zarqa Jordan ashrafj@hu.edu.jo Abstract Network scanning is considered to be the first step taken by attackers trying to gain access to a targeted network. Hence, it will be useful for system and network administrators to identify the targets scanned by network attackers as soon as possible. Resources and services can be further protected by patching or installing security measures, such as a firewall, an intrusion detection system (IDS), or some alternative computer system. This paper presents an investigative study on the network scanning techniques. This study will first identify the existing scanning methods. Furthermore, it will discuss how malicious code adopts scanning methods to find out the vulnerable hosts and services. In addition, this article explores the current approaches to detect the presence of scanning in the network 1. Introduction Keywords: Network scanning, Anomaly behavior and Worms A network attacker will always try to identify the active hosts, services, operating systems, and applications running on every computer system in a targeted network. Usually, network scanning is used for this purpose and it is considered to be the first step taken by attackers when gaining access to a targeted network [1]. However, it also incurs unwanted network traffic on a network. This is because the scanned host is busy receiving and replying to various unnecessary requests. Network scanning can generate traffic anomalies if scanners target the whole IP address range while searching for hosts and vulnerable services. This is because attackers are not aware of the services that might be available or are vulnerable in the targeted network, which can then be exploited for initiating attacks [2]. In other words, they will try to scan all available systems and programs in the target or host in their endeavor to detect a possible gateway. Many approaches for scanning detection have been proposed in the past to try to detect the presence of scanning in the network. Most research papers discuss efforts that are related to this proposed work, but none of these papers gives a comprehensive classification of the existing scanning approaches detection. This article contains an investigative study pertaining to existing scanning detection approaches based on detection techniques. Subsequently, the advantages and drawbacks for each approach will be identified and discussed. The rest of the paper is organized as follows. Section 2 presents the common terminology used in the paper. In section 3, this paper describes the network scanning methods. A employment of scanning by malicious code is presented in Section 4. Section 5 presents a review of network scanning and detection techniques found in the literature. Finally Section 5 concludes with a summary of this study and recommendations for future research. 2. Scanning Techniques Methods International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number9,May 2013 doi: /jdcta.vol7.issue

2 The scanning techniques are categorized into five categories as shown in Figure 1. SCANNING Rando Sequenti Hit list Topologic Passive 2.1 Random Scanning Figure1. Scanning Techniques Methods In this method, an attacker often blindly scans the network to find out the vulnerable hosts and services. However, he is not aware which IP is active or what services are running on each running host. On the other hand, targeting inactive hosts or services will frequently generate connection failures messages. Thus frequent connection failures generated by network scanning might indicate the existence of a network worm if it is being analyzed properly (de Vivo, et al., 1999; Northcutt & Novak, 2002). The connection failure may occur due to the following: (1) a network worm tries to scan some services but the port is closed; in this case the ICMP port is unreachable or TCP-Rest packet will be generated (2) a worm tries to scan an inactive host; in this case the ICMP host is also unreachable and a packet will be generated. 2.2 Sequential Scanning In this method, the attacker aims to scan a block /range of IP addresses sequentially. After the worm has randomly selected a starting IP (s), a scanner will continue to scan s+1 or s-1 [3]. Sequential scanning can be easily noticed by any traffic sniffing tool such as Wireshark. This is because the captured IP that is performing the sequential scanning is listed sequentially. 2.3 Hit List Scanning In this method, an attacker defines a list of vulnerable hosts and services to be scanned once the worm is released. This list may be generated by stealthily monitoring the network or from somewhere else. The accuracy of this method is high since the attacker has prior knowledge about the targets and services. Due to its high accuracy, the probabilities of anomaly behavior that may appear is very low, so it is difficult for anomaly detection systems to detect such kind of scanning. 2.4 Topological Scanning In this method, a worm based on the local information is saved into the hosts. Local information includes address in user contact list, host file (e.g., /etc/hosts) and URLs in the user s browsing history. Attackers will employ this information to identify its targets and infection path by using a second channel such as the services provided by Google or by querying a peer- to-peer network or an instant messaging server for vulnerable peers. Topological worms can spread very fast, especially on networks with highly connected applications (Weaver, Paxson, Staniford, & Cunningham, 2003). 2.5 Passive scanning In this method, the information about vulnerable hosts and services are obtained by monitoring the target network passively (Kato, Nitou, Ohta, Mansfield, &Nemoto, 1999). This form of scanning is 313

3 much slower than the previous techniques but can be harder to detect by intrusion detection systems (IDS) since it does not appear to show any anomalies behavior. 3. Employing Scanning By Malicious Code: Worm Case Study Network worms are malicious codes that can propagate through the network without any human intervention, and it is considered a challenging problem since it has highly destructive effects on the network resources, topologies, assets and services. The entry point for network worms are the vulnerable hosts and services on the network. In efforts to find out such vulnerable hosts and services, the network worms will launch the network scanning as the first phase of the network worm life cycle beside the transmission propagation and infection [4, 5].However, the existence of scanning that has been launched by such worms has their own symptoms. The common symptom is the connection failure. The connection failure messages come in the form of ICMP type 3 and TCP RST packets that produces a very strong footprint and provide evidence of network scanning. An ICMP type 3, code 1 (host unreachable) packet is generated when a TCP SYN or UDP request is sent to an unused IP address. An ICMP type 3, code 3 (port unreachable) packets are generated when a UDP request is sent to an existing address, but the port is closed. A TCP RST packet is generated when a TCP SYN packet is sent to an existing host and the port is closed, and when a TCP SYN carries a forged source IP address sent to an existing host and the destination host replies by sending an SYN ACK packet to the real host. In the latter case, a TCP RST will be sent from the real IP address to the destination IP. Figure 2 shows an example of ICMP type 3 and TCP RST packet generation. Table 1 shows different worms and their scanning method. Figure 2. Connection attempts: a) Successful TCP Connection b) TCP Destination Port Closed c) UDP Destination Port Closed; d) Destination IP Address Does not Exist. 314

4 Table 1.Worms and Their Scanning Methods Hit Scanning Random Sequential list Techniques Topological Passive Reference Morris worm [6] Gnumanworm [7] Blasterworm [8] Slammerworm [9] Codred v2worm [10] CRCleanworm [11] Sasser - [12] Witty - [13] Nimda - [14] As we can see from Table 1 the random scanning is commonly used by worms. According to (Li, et al., 2008), worms which are employing random scanning to find out the vulnerable host and services may be easier to implement and may spread faster, but are not very accurate. In addition, random scanning is a preferable and common method and has been most used by network worms. 4. RELATED WORKS Network scanning is a technique used to determine what ports (or similar protocol abstraction) of a host are listening for connections. These ports represent potential communication channels. By knowing their existence that aids the exchange of information with the host, the service ports are quite useful for anyone wishing to explore their networked environment and topology as well as its configuration, including hackers. As a result, many researches are trying to propose an early scanning detection method to be the first line of defense against the attackers. Network scanning techniques that appear in the literature are grouped into: aggregation based approaches, anomaly based approaches and statistical based approaches. 4.1 Aggregation-based Approaches The aggregation approach mainly depends on counting aggregated data. This network-scanning detection approach was first proposed by Roesch (1999), and it depends on calculating the number of destination IPs accessed by each distinct source IP on each destination port. If the source IP exceeds a predefined threshold, the IP is identified as a scanner. However, this approach cannot be used to identify a low-level scanner operating over a long period of time [15], because this method wastes system resources (CPU and memory) by generating voluminous network traffic. Furthermore, this approach produces a high false positive rate, because it does not consider connection failure to be a very strong indicator of network scanning activity. Therefore, Singh et al. (2003) proposed a further aggregation approach for detecting scanning activities based on the calculation of the number of connection failures generated by each source IP in a specific time window. If the source IP exceeds a predefined threshold, the source IP is identified as a scanner. However, the consideration of only one metric (i.e., connection failure) when detecting network scanning activity produces high numbers of false positives, because many legitimate activities can generate the same connection failure symptoms [16]. 315

5 SNORT version [17] uses two preprocessors to avoid a heavy processing load with high traffic volumes. The first preprocessor is packet-oriented. Tools such as NMAP [18] are focused on detecting malformed packets used during low-level scanning. The second is a connection-oriented preprocessor that checks whether a given source IP address has accessed more than one distinct destination port or distinct destination IP address during a specific time window. If the count of distinct destination ports or IP addresses exceeds a certain threshold, the source IP is identified as a scanner. These anomaly-based approaches began to evolve in network scanning detection when it was found that aggregation approaches exhibited poor detection accuracy and high false positive rates. 4.2 Anomaly-based Approaches Anomaly-based detection systems can detect and identify abnormal behavior in any network. Anomaly detection generally depends on profiling the normal behavior of a network. Any deviation from the generated profile is then considered abnormal. The general assumption of anomaly detection is that any intrusive activity generates anomalous or suspicious activity. For example, any attacker without knowledge of legitimate user activities who attacks a host in a network can be easily identified and detected using an anomaly-based detection system, such as TRW [19] or PHAD [20]. However, flagging all apparent intrusive activities, i.e., anomalies, produces a high proportion of false positives. Staniford et al. (2002) developed a Stealthy Port scan and Intrusion Correlation Engine (SPICE) to detect low rate port-scanning activities. The proposed technique is based on two components, i.e., a network-anomaly detector (SPADE: Statistical Packet Anomaly Detection Engine) and a correlation engine. Port-scanning activity is detected by assigning an anomaly score to incoming packets. SPADE estimates the probability distribution of the normal network traffic and assigns each packet with an anomaly score based on a corresponding entropy measure. This technique assigns a lower anomaly score to a frequently accessed port/ip address. The anomaly score is derived by taking the negative log of the likelihood of a packet being sent to a specific port/ip address combination. The correlation engine stores the alerts generated by SPADE, as events in the main memory. The events are then inserted into graphs where each node represents a packet and the links between the nodes represent connections. Links are assigned weights indicating the strength of the correlation between the nodes. The correlation engine tries to link events in a group into activities that might indicate scanning activities [21]. However, one of the challenges of this detection technique is how best to model the host access distribution over a long time-frame, with minimal memory consumption. Kato et al. (1999) developed a three-level tree structure for host access indexing. Host accessing is first indexed by the source address, then the destination address, and finally the destination port. Any source IP that accesses three or more ports on the same destination address is considered to be a port scanner. However, this approach can consume a lot of memory. Thus, a time-to-live parameter is defined for each access in the index tree, which reduces memory usage. Furthermore, they only test TCP packets where the ACK and RST flags are set [22]. The two main problems of anomaly-based detection techniques are defining the normal behavior of a network and defining an appropriate threshold that triggers an alert [22, 23]. These limitations have directed researchers toward statistical-based approaches for identifying network anomalies and detecting network-scanning activity. 4.3 Statistical-based Approaches In statistical approaches, the system monitors network traffic activity and creates a statistical profile to represent the general behavior of network traffic. The profile represents the statistical characteristics 316

6 of normal network traffic behavior, where any deviation from the normal profile is considered to be a suspicious activity. Smaha (1998) proposed the earliest example of a statistical anomaly-based intrusion detection system (Haystack). This method incorporates user- and group-based anomaly-detection strategies, and models the system parameters as independent and Gaussian random variables. Haystack creates a normal profile, which includes all values considered to be normal for each feature. If a feature deviates from the normal range during a session, the score for the subject is increased. An alarm is triggered when the score is too high. Haystack also maintains a database of user groups and individual profiles. If a user is previously undetected, a new user profile with minimal capabilities is created with restrictions based on the user s group membership. This approach is designed to detect six types of intrusions, i.e., attempted break-ins by unauthorized users, masquerade attacks, penetration of the security control system, leakage, Denial of Service (DoS) attacks, and malicious use. The drawback of Haystack is that it was initially designed to work offline. This attempt to use statistical analysis in a real-time intrusion detection system is not satisfactory, because it requires high performance and high computational power. Haystack also requires profile maintenance, so a common problem for system administrators is the determination of suitable attributes that might serve as good indicators of intrusive activity [24]. Statistical Scan Anomaly Detection Engine (SCADE) [3] is a further statistical anomaly detection engine designed to detect inbound and outbound scanning. SCADE is considered to be one of the best tools for detecting scanning activities [25]. Inbound scan detection depends on the number of failed connection attempts prior to a successful connection. An inbound scanning alert is based on an anomaly score calculated using the following equation, s w 1 * Fh s w 2 * Fl s, w and 2 are effective weights for each port type and Where w 1 failed access attempts at high-severity ports and low-severity ports, respectively. s Fh and Fl s are the numbers of Outbound scan detection is based on a voting scheme using three anomaly-detection models, which tracks all the outbound connections for each internal host. The three models are as follows. Outbound scan rate s 1 : detects local hosts performing high-rate scans on many external addresses. Outbound connection failure rate s 2 : detects unusually high connection failure rates, with a h sensitivity to s s port usage. The anomaly score 2 is calculated using the following formula, Wherec is the total number of connection attempts. s 2 w * Fh w * Fl 1 s 2 s c Normalized entropy of the scan target distribution s 3 : calculates a Zipf[26] power law distribution for the outbound address connection patterns. A consistently distributed scan target model provides an indication of a possible outbound scan. A normalized entropy-based anomaly-scoring technique is used, which identifies candidates as follows. 317

7 s 3 H ln(m) H is the entropy of the scan target distribution, which is equal to, H m i1 P Ln( i P i ) Where m is the total number of scan targets and Pi is the proportion of target scans. However, there are difficulties when adjusting thresholds and balancing the three voting schema. These difficulties impact negatively on detection accuracy and increase the number of false positives. In addition, there are no standard rules for voting schema employed during outbound scanning detection. For example, Where is the threshold. if s 1 and s 2 or s 3 alert true if s 1 and s 2 alert true and s 3 This may increase the false positive rates, because diversity increases the number of possibilities. However, statistical approaches have the capacity to detect zero-day attacks, or the very latest attacks. They can also provide accurate notifications of malicious activity occurring over an extended time period. However, statistical anomaly approaches also have drawbacks, because a skilled attacker can train their activity to make abnormal statistical behavior appear normal. It can also be difficult to determine an appropriate threshold to balance the likelihood of false positives and the likelihood of false negatives, which affects overall detection accuracy and sensitivity. 5. Conclusion This paper has highlighted the severity of scanning and how the malicious codes are employing the scanning method to detect vulnerable service and host, and consequently it has identified and discussed the existing scanning methods. Then the existing approach for scanning detection is categorized into aggregation-based, anomaly-based and statistical-based and then the advantages and drawbacks for each approach are highlighted. Existing scanning techniques are unable to detect the presence of network scanning with high accuracy due to reasons such as (1) techniques that use heuristics to detect network scanning based on simple counting of specific type of packets (ICMP, TCP-RST) within a certain time window (2) techniques that do not consider all symptoms critical in detecting network scanning such as connection failure symptom. Meanwhile, even the approaches which consider the connection failure suffer from low accuracy since not all connection failure symptoms are considered (3) some techniques use different rules with different thresholds to detect a particular type of network scanning 318

8 such as SCADE (explained in Section 4.3). This diversity in rules and thresholds will increase the number of false positive. 6. Reference [1] C. Leckie and R. Kotagiri, "A probabilistic approach to detecting network scans," 2002, pp [2] M. de Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, "A review of port scanning techniques," ACM SIGCOMM Computer Communication Review, vol. 29, pp , [3] G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: Detecting malware infection through ids-driven dialog correlation," 2007, pp [4] Q. Li and W. Han, "An Analysis for Stochastic Model of Worm Propagation," IJACT: International Journal of Advancements in Computing Technology, vol. 4, p. 156 ~ 164, [5] Y. Yao, W. Qin, W. Yang, F. Gao, and G. Yu, "Modeling the Diurnal Pattern of Worm Propagation: Initial Results," AISS, vol. 3, p. 392 ~ 400, [6] E. Spafford, "The Internet worm program: an analysis," ACM SIGCOMM Computer Communication Review, vol. 19, p. 57, [7] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security & Privacy, vol. 1, pp , [8] Symantec, "Symantec summary of W32.Blaster.Worm ", [9] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," Security & Privacy, IEEE, vol. 1, pp , [10] D. Moore and C. Shannon, "Code-Red: a case study on the spread and victims of an Internet worm," 2002, pp [11] C. Shannon and D. Moore, "The spread of the Witty worm," Security & Privacy, IEEE, vol. 2, pp , [12] Secunia, "Virus Information Sasser.G," [13] F-Secure, "Computer Virus Information Pages," [14] F-Secure, "F-Secure Virus Descriptions: Nimda," [15] M. Roesch, "Snort-lightweight intrusion detection for networks," 1999, pp [16] S. Singh, C. Estan, G. Varghese, and S. Savage, "The earlybird system for real-time detection of unknown worms," Citeseer [17] Snort, "A free lightweight network intrusion detection system for UNIX and Windows." [18] Nmap, "free security scanner for network exploration & security." [19] J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," 2004, pp [20] M. Mahoney and P. Chan, "PHAD: Packet header anomaly detection for identifying hostile network traffic,"

9 [21] S. Staniford, J. A. Hoagland, and J. M. McAlerney, "Practical automated detection of stealthy portscans," Journal of Computer Security, vol. 10, pp , [22] N. Kato, H. Nitou, K. Ohta, G. Mansfield, and Y. Nemoto, "A real-time intrusion detection system (IDS) for large scale networks and its evaluations," IEICE Transactions on Communications, vol. 82, pp , [23] P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," Communications Surveys & Tutorials, IEEE, vol. 10, pp , [24] S. E. Smaha, "Haystack: An intrusion detection system," [25] H. R. Zeidanloo, A. B. A. Manaf, R. B. Ahmad, M. Zamani, and S. S. Chaeikar, "A Proposed Framework for P2P Botnet Detection," IACSIT International Journal of Engineering and Technology, vol. 2, [26] W. Reed, "The Pareto, Zipf and other power laws," Economics Letters, vol. 74, pp ,

The Reconnaissance Phase

The Reconnaissance Phase The Reconnaissance Phase Detecting the Enemy Before the Attack Carrie Gates PhD Candidate, Dalhousie University Visiting Scientist, CERT, Carnegie Mellon University Outline! Indicate a gap in our defences!

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 12

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 12 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 12 Announcements Project 2 is on the web. Due: March 15th Send groups to Jeff Vaughan (vaughan2@seas) by Thurs. Feb. 22nd. Plan for

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL Very Fast Containment of Scanning Worms Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL 1 Outline Worm Containment Scan Suppression Hardware Implementation Cooperation

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Worm Detection, Early Warning and Response Based on Local Victim Information

Worm Detection, Early Warning and Response Based on Local Victim Information Worm Detection, Early Warning and Response Based on Local Victim Information Guofei Gu, Monirul Sharif, Xinzhou Qin, David Dagon, Wenke Lee, and George Riley Georgia Institute of Technology ACSAC'04 1

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 12 This chapter describes how to create multiple security policies and apply them to individual virtual sensors. It contains the following sections: Understanding Policies, page 12-1 Anomaly Detection

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 Caution Anomaly detection assumes it gets traffic from both directions. If the sensor is configured to see only one direction of traffic, you should turn off anomaly detection. Otherwise, when

More information

Fast Detection of Scanning Worm Infections

Fast Detection of Scanning Worm Infections ast Detection of canning Worm Infections Jaeyeon Jung Arthur W. Berger MIT CAIL Harvard DEA This work is sponsored by the Department of Defense under the Air orce Contract 19628-00-C-0002. Opinions, interpretations,

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures not always up to date 0-days get through Someone brings in an infected

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 This chapter describes anomaly detection and its features and how to configure them. It contains the following topics: Understanding Security Policies, page 9-2 Understanding Anomaly Detection,

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Relative Entropy-based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets

Relative Entropy-based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets Relative Entropy-based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets Byungseung Kim and Saewoong Bahk School of Electrical Engineering and Computer Science Seoul National University,

More information

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows S. Farzaneh Tabatabaei 1, Mazleena Salleh 2, MohammadReza Abbasy 3 and MohammadReza NajafTorkaman 4 Faculty of Computer

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 5 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Group project: 2 or 3 students

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

Hitlist Worm Detection using Source IP Address History

Hitlist Worm Detection using Source IP Address History Hitlist Worm Detection using Source IP Address History Jeffrey Chan, Christopher Leckie, Tao Peng NICTA Victoria Research Laboratory, Department of Computer Science and Software Engineering The University

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

Impact of Sampling on Anomaly Detection

Impact of Sampling on Anomaly Detection Impact of Sampling on Anomaly Detection DIMACS/DyDan Workshop on Internet Tomography Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

OSSIM Fast Guide

OSSIM Fast Guide ----------------- OSSIM Fast Guide ----------------- February 8, 2004 Julio Casal http://www.ossim.net WHAT IS OSSIM? In three phrases: - VERIFICATION may be OSSIM s most valuable contribution

More information

Mapping Internet Sensors with Probe Response Attacks

Mapping Internet Sensors with Probe Response Attacks Mapping Internet Sensors with Probe Response Attacks John Bethencourt, Jason Franklin, and Mary Vernon {bethenco, jfrankli, vernon}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison

More information

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics: Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

4-2 Rapid Analysis Technologies for Live Networks

4-2 Rapid Analysis Technologies for Live Networks 4 Cyber-Security Technologies: Live Network Monitoring and Analysis Technologies 4-2 Rapid Analysis Technologies for Live Networks Ichiro SHIMADA and Yu TSUDA In targeted cyberattacks, the attackers intrude

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities Flashback.. Internet design goals Security Part One: Attacks and Countermeasures 15-441 With slides from: Debabrata Dash,Nick Feamster, Vyas Sekar 15-411: F08 security 1 1. Interconnection 2. Failure resilience

More information

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 Table of Contents 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 i 1 Intrusion Detection Statistics Overview Intrusion detection is an important network

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

A Review on ICMPv6 Vulnerabilities and its Mitigation Techniques: Classification and Art

A Review on ICMPv6 Vulnerabilities and its Mitigation Techniques: Classification and Art 2015 IEEE 2015 International Conference on Computer, Communication, and Control Technology (I4CT 2015), April 21-23 in Imperial Kuching Hotel, Kuching, Sarawak, Malaysia A Review on ICMPv6 Vulnerabilities

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Fast Portscan Detection Using Sequential Hypothesis Testing

Fast Portscan Detection Using Sequential Hypothesis Testing Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments Objectives Define risk and risk management Describe the components of risk management List

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

Mapping Internet Sensors with Probe Response Attacks

Mapping Internet Sensors with Probe Response Attacks Mapping Internet Sensors with Probe Response Attacks Computer Sciences Department University of Wisconsin, Madison Introduction Outline Background Example Attack Introduction to the Attack Basic Probe

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

ProCurve Network Immunity

ProCurve Network Immunity ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Outline. Intrusion Detection. Intrusion Detection History. Some Challenges. Network-based Host Compromises. Host-based Network Intrusion Detection

Outline. Intrusion Detection. Intrusion Detection History. Some Challenges. Network-based Host Compromises. Host-based Network Intrusion Detection Intrusion Detection CS 161/194-1 Anthony D. Joseph September 14, 2005 History Outline Network-based Host Compromise Host-based Network Intrusion Detection Signature-based Anomaly-based Distributed Network

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Security: Worms. Presenter: AJ Fink Nov. 4, 2004

Security: Worms. Presenter: AJ Fink Nov. 4, 2004 Security: Worms Presenter: AJ Fink Nov. 4, 2004 1 It s a War Out There 2 Analogy between Biological and Computational Mechanisms The spread of self-replicating program within computer systems is just like

More information

Security System and COntrol 1

Security System and COntrol 1 Security System and COntrol 1 Network Security Reading list Recommended: www.cert.org Security System and COntrol 3 Internet Connectivity Advantage: private networks able to reach and communicate with

More information

DNS-based Detection of Scanning Worms in an Enterprise Network

DNS-based Detection of Scanning Worms in an Enterprise Network DNS-based Detection of Scanning Worms in an Enterprise Network David Whyte Evangelos Kranakis P.C. van Oorschot August 24, 2004 Abstract Worms are arguably the most serious security threat facing the Internet.

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

ARAKIS An Early Warning and Attack Identification System

ARAKIS An Early Warning and Attack Identification System ARAKIS An Early Warning and Attack Identification System Piotr Kijewski Piotr.Kijewski@cert.pl 16th Annual FIRST Conference June 13-18, Budapest, Hungary Presentation outline Trends in large scale malicious

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets.

An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets. An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets. Ignus van Zyl 1 Statement of problem Network telescopes

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Active Flow Monitoring Version 9 Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

Forensic Analysis for Epidemic Attacks in Federated Networks

Forensic Analysis for Epidemic Attacks in Federated Networks Forensic Analysis for Epidemic Attacks in Federated Networks Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Zhang Carnegie Mellon University Presented by Gaurav Shah (Based on slides by Yinglian Xie

More information

Hardware Supports for Network Traffic Anomaly Detection

Hardware Supports for Network Traffic Anomaly Detection Hardware Sups for Network Traffic Anomaly Detection Dae-won Kim and Jin-tae Oh Electronics and Telecommunications Research Institute in Korea Abstract - Modern network systems are plagued with unknown

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 22

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 22 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 22 Nmap screen shot http://www.insecure.org/nmap http://www.insecure.org/nmap/nmap-fingerprinting-article.html 4/11/06 CIS/TCOM 551

More information

Configuring Flood Protection

Configuring Flood Protection Configuring Flood Protection NOTE: Control Plane flood protection is located on the Firewall Settings > Advanced Settings page. TIP: You must click Accept to activate any settings you select. The Firewall

More information

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam IDS / SNORT Matsuzaki maz Yoshinobu stole slides from Fakrul Alam 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not

More information

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader misfeasor clandestine user varying levels of competence

More information

Efficient Content-Based Detection of Zero-Day Worms

Efficient Content-Based Detection of Zero-Day Worms Efficient Content-Based Detection of Zero-Day Worms Institute of Computer Science Foundation for Research & Technology Hellas P.O. Box 135 Heraklio, GR-711-1 GREECE Email: {akritid,markatos}@ics.forth.gr

More information

Check Point DDoS Protector Simple and Easy Mitigation

Check Point DDoS Protector Simple and Easy Mitigation Check Point DDoS Protector Simple and Easy Mitigation Jani Ekman janie@checkpoint.com Sales Engineer DDoS Protector 1 (D)DoS Attacks 2 3 4 DDoS Protector Behavioral DoS Protection Summary 2 What is an

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

The evolution of malevolence

The evolution of malevolence Detection of spam hosts and spam bots using network traffic modeling Anestis Karasaridis Willa K. Ehrlich, Danielle Liu, David Hoeflin 4/27/2010. All rights reserved. AT&T and the AT&T logo are trademarks

More information

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Arturo Servin Computer Science, University of York aservin@cs.york.ac.uk Abstract. Protection of computer networks against security

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Stochastic Analysis of Horizontal IP Scanning

Stochastic Analysis of Horizontal IP Scanning Stochastic Analysis of Horizontal IP Scanning Derek Leonard, Zhongmei Yao,, Xiaoming Wang, and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

NEDAC: A WORM COUNTERMEASURE MECHANISM

NEDAC: A WORM COUNTERMEASURE MECHANISM Science World Journal Vol 11 ( 1) 2016 NEDAC: A WORM COUNTERMEASURE MECHANISM * 1 Muhammad Aminu Ahmad, 1 Abubakar S. Magaji and 1 Sani Dari 1 Department of Mathematical Sciences, Faculty of Science, Kaduna

More information

Module 19 : Threats in Network What makes a Network Vulnerable?

Module 19 : Threats in Network What makes a Network Vulnerable? Module 19 : Threats in Network What makes a Network Vulnerable? Sharing Unknown path Many points of attack What makes a network vulnerable? Unknown perimeter Anonymity Complexity of system Categories of

More information

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

Demystifying Service Discovery: Implementing an Internet-Wide Scanner Demystifying Service Discovery: Implementing an Internet-Wide Scanner Derek Leonard Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University,

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Exposure Maps: Removing Reliance on Attribution During Scan Detection

Exposure Maps: Removing Reliance on Attribution During Scan Detection Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte P.C. van Oorschot Evangelos Kranakis Abstract Current scanning detection algorithms are based on an underlying assumption

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods

More information

IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA

IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA M.Sai Sri Lakshmi Yellari 1, M.Manisha 2, J.Dhanesh 3,M.Srinivasa Rao 4,Dr.S.Suhasini 5 1Student, Dept. of Information Technology, Velagapudi Ramakrishna Siddhartha

More information

Introduction to Security. Computer Networks Term A15

Introduction to Security. Computer Networks Term A15 Introduction to Security Computer Networks Term A15 Intro to Security Outline Network Security Malware Spyware, viruses, worms and trojan horses, botnets Denial of Service and Distributed DOS Attacks Packet

More information

Real-time detection and containment of network attacks using QoS Regulation

Real-time detection and containment of network attacks using QoS Regulation Real-time detection and containment of network attacks using QoS Regulation Seong Soo Kim and A. L. Narasimha Reddy Department of Electrical Engineering Texas A&M University College Station, TX 77843-3128,

More information

A Flow Based Horizontal Scan Detection Using Genetic Algorithm Approach. These authors contributed to the same extend

A Flow Based Horizontal Scan Detection Using Genetic Algorithm Approach. These authors contributed to the same extend A Flow Based Horizontal Scan Detection Using Genetic Algorithm Approach BARATI, M. 1*,, HAKIMI, Z. 1*, JAVADI, A.H. 2 1 Department of Computer Engineering, Qazvin Branch, Islamic Azad University, Qazvin,

More information