Distributed Snort Network Intrusion Detection System with Load Balancing Approach

Size: px
Start display at page:

Download "Distributed Snort Network Intrusion Detection System with Load Balancing Approach"

Transcription

1 Distributed Snort Network Intrusion Detection System with Load Balancing Approach Wu Yuan, Jeff Tan, Phu Dung Le Faculty of Information Technology Monash University Melbourne, Australia {Tennyson.Yuan, Jeff.Tan, Abstract As we enjoy the conveniences that the Internet or computer networks have brought to us, the problems are getting larger, especially network security problems. A Network Intrusion Detection System (NIDS) is one of the critical components in a network nowadays. It can monitor and analyze activities of network users, and then uses knowledge of attack patterns to identify and prevent such attacks. It can minimize damages that will be caused by attacks. This paper uses Snort, which is one of the most commonly used NIDS in industry. The paper presents an approach of Distributed Snort NIDS, which can coordinate multiple sensors across the Local Area Network to optimize usage of computational resources. The approach implements a Balance Control System (BCS) for each subnet, which monitors CPU usage of a particular Snort NIDS and, when the Snort IDS s CPU usage is too high, delegates analysis work to lightly loaded IDS host. Keywords-Network Security; Network Intrusion Detection System; Snort; IDS; Distributed Snort NIDS; Load Balancing. I. INTRODUCTION According to FBI s Internet Crime Complaint Centre 2009 annual report that financial loss has doubled in 2009 compared with 2008 [5]. As importance of information security has increased significantly during recent years, the term of Intrusion Detection (ID) has become more and more important in current environment of computer and network systems. An Intrusion Detection System (IDS) is a piece of software program, which is able to monitor malicious activities or policy violations in a specific network or a computer system, and give particular reactions or alerts based on pre-set rules or knowledge database [18]. There are three major types of IDS: Network intrusion detection system (NIDS), Host-based intrusion detection system (HIDS) and Stack-based intrusion detection system (SIDS) [18]. In this paper, Network intrusion detection system is the one, which will be discussed. According to Ptacek and Newsham [17], the Network Intrusion Detection System is a particular type of IDS, which is used to monitor activities in network traffic and large numbers of hosts. Normally, the NIDS is connected to a network hub, switch or tap for gaining network access. The system also includes multiple sensors across the whole network to collect information. The sensors are often located in a Demilitarized Zone (DMZ) or at network borders. Snort is one good example of NIDS. According to Sourcefire [20], Snort is one of the most commonly used network intrusion detection system in industry, which is provided lots of advantages, such as, open source, lightweight and rule-based. Currently, main issue we are facing is the system needs to spend more time to analyze each traffic pattern, because a database of knowledge of attacks patterns is getting obviously larger. Therefore, attackers may gain more time to perform some unauthorized or illegal activities in some components of a network. The ideal of Distributed Intrusion Detection Systems (DIDS) has been mainly used to increase efficiency of the NIDS, which distributes the IDS into different network segments to analyze and monitor network traffics in that specific network segment, or distribute the analysis work to a number of IDSs to increase the speed of traffic analysis. In this paper, we proposed a distributed Snort NIDS with load balancing mechanism, which can improve the performance of Snort NIDS to reduce the risks that may be brought by packets dropping in large network traffic environment. The rest parts of this paper are organized as follow. Section 2 provides an overview of Snort NIDS technology. Then, an overview of existing distributed IDS approaches are discussed in Section 3. In Section 4, our proposed Distributed Snort NIDS (DSNIDS) model with load balancing mechanism is introduced. The evaluation and testing of our approach are presented in the following section (Section 5). II. AN OVERVIEW OF SNORT NIDS Snort NIDS is one of the most widely used and the most famous Network Intrusion Detection System (NIDS) [20][3]. It is an open-source application, which provides packet sniffing, packet logging, and intrusion detection, which search and scan each network packet s contents to match pre-set intrusion rules. Another advantage of Snort is that it is a lightweight NIDS, because it has a small footprint, and it has less system resources requirement compare with a normal NIDS. It uses rules to detect any anomalous behavior and malicious activities in a network. If any network packet breaches the intrusion rules, an alert will be triggered. The Snort NIDS is able to perform realtime packet logging and traffic analysis on Internet Protocol (IP) network by applying content searching and content matching. As mentioned above, the IDS can be configured

2 to run in three modes, namely, sniffer mode, packet logger mode, and network intrusion detection mode [3]. According to Baker and Esler [3], the Sniffer mode allows the IDS to capture packets in the network, and display them on the console, and the Packet logger mode allows the IDS to log the packets to the disk. The network intrusion detection mode allows the IDS to analyze the network traffic against user pre-defined rules, and to perform actions that has defined in the rules. In our research, we are trying to improve the performance when the Snort NIDS is running at network intrusion detection mode. A. Snort System architecture Snort NIDS s architecture contains four main components: Sniffer: The sniffer is used to eavesdrop network traffic, which can be used in Network analysis and troubleshooting, performance analysis and benchmarking, and eavesdropping [3]. Preprocessor: Pre-processor in the Snort NIDS applies raw network packets that are captured by the sniffer. Detection Engine: After the raw packets processed by all enabled pre-processors process packets, they will then be handled by detection engine. The detection engine analysis those packets against a set of rules, if any particular rule matches the payload or data of a packet, then the packet will be sent to alert processor [3]. Alerting and Logging Component: alerting and logging component can save the alerts from the detection engine to a log file, or be sent to SNMP traps. An SQL database can be linked also [3]. In the basic concept, the Snort NIDS is a packet sniffier, and it is designed to capture network packets, and a preprocessor will process them, and then these captured packets will be checked against a set of rules by a detection engine [3]. The figure above (Figure 2.1) shows a basic view of the Snort NIDS s architecture. III. Figure 2.1 Snort NIDS architecture [3] AN OVERVIEW OF DISTRIBUTED NIDS APPROACHES Due to large network traffic on a broadcast LAN segment, and longer time consuming on packet analyzing in non-distributed IDS model, the IDS may drops large numbers of network packets, which gives a big opportunities for the anomalous behavior to be launched. Therefore, the non-distributed or centralized IDS model cannot satisfy current network and security environments. Distributing a number of Intrusion Detection Systems across the network is a way to significantly increase the capability of the intrusion detection system. In this section, two main Distributed Intrusion Detection approaches are discussed. A. Early Prototype of DIDS The concept and architecture of a Distributed Intrusion Detection Systems was created in 1991 at University of California by Snapp et al. [19]. In his DIDS architecture, the system contains three main components, DIDS director, host monitor and LAN monitor. The distributed monitors collect information, and send them to a centralized DIDS director to analyze. The host monitor is a kind of program, which is installed in each host computer. The monitor will analyze audit data in the host computer, and decide whether to forward the audit data to an expert system or the DIDS director to do further evaluation and analysis or not. Normally, critical information about the host computer is always sent to the centralized expert system or the DIDS director to evaluate. The LAN monitor is another component of this DIDS architecture. It is in charge of analyzing network traffic in one specific LAN segment. It can monitor network users activities, network connection and the volume of the traffic. Same as host monitor, the LAN monitor also can identify and analyze some certain events, and all the security information are sent to the centralized expert system for further analysis. Finally, the last component of the DIDS architecture is the expert system, which is similar to an intrusion detection system like NSM, and SNORT. It is a rule-based system, and written in prolog. The expert system uses rules that are generated by Intrusion Detection Model (IDM), which describes the pattern of an intrusion from the audit data that are collected by the host monitors and the LAN monitors. There are six different levels in IDM, they are data level, event level, subject level, context level, threat level and security level, and each of those levels represents a performance of transformation from audit records. Snapp et al. [19] develops an early prototype of a Distributed Intrusion Detection Systems. As the DIDS architecture distributed the monitors across the entire network, it can collect network information from different sources, and all those information is processed in the centralized expert system to prevent doorknob attack. However, As nowadays the number of rules is getting much larger, the system needs to spend much more time to analyze each traffic packet, and the prototype only distributes monitors across the network, and only uses one centralized expert system to analyze all information; therefore the overloaded IDS will drop some analysis and detection regularly, due to insufficient memory resources. It gives more chance to an attack to performance some damage activities [25].

3 Figure 3.1 EDL Signature Example [25] Figure 3.2 example of DIDS concept [25] B. DIDS with Multi Step Signatures The recent research by Vogel and Schmerl [25] has solved this problem, and significantly increased efficiency of a Distributed Intrusion Detection Systems by applying Multi Step Signatures, and arranging those signatures to different distributed IDSs. The approach uses Event Description Language (EDL) to define a multi-step signature. Figure 3.1 shows an example of an EDL signature; it consists of four places and three transitions. The place indicates the system states of an attack, there are four types of places: initial, interior, escape and exit. The transition represents changes of a state that are triggered by audit events. In this approach, a sensor or monitor logs audit events, and then separate them into different event types. The signature will also be separate into some small parts of signatures, and all those small parts are then assigned to different analysis unit, which is based on availability of analysis units. A filter is in charge of discarding those audit data that is not relevant to event types to minimize the communication, and transfers those relevant audit data to certain distributed analysis units. The Figure 3.2 shows an example of this concept. The research shows that this approach of Distributed Intrusion Detection Systems is 60 % faster than the centralized Intrusion Detection System. However, the research also indicates that analysis distribution is not well balanced. IV. THE PROPOSED DISTRIBUTED SNORT NIDS MODEL Snort is the most famous and widely used Network Intrusion Detection System; however, when it faces large network traffic, it may drops amount of network packets depend on hardware configuration that may increase false positive rate on attacking detection. The idea of the DSNIDS model is to coordinate all distributed Snort NIDS sensors together, and optimizes all available computation resources. In this section, we present the design of our DSIDS approach from the network architecture, the load balancing mechanism, and the internal communication methods. A. Network Architecture The Network architecture of our Distributed Snort NIDS approach is based on one of Baker s basic Snort NIDS network architectures, which installs one Snort NIDS for each component or subnet of the network. The details of Baker s Snort NIDS network architectures are discussed in the chapter three. We design two network architectures for our approach, one of them has two Snort NIDS sensors, one for each sub-network, and another one has one Snort NIDS sensor and one Balancing Control System (BCS) for each sub-network. The choice between these two network architectures depends on budget for hardware configuration.

4 Figure 4.1 Flow chat of Load Balancing mechanism B. Load Balancing Design The Figure 4.1 illustrates the program processing flow of the mechanism. The program runs on each Snort NIDS sensor, and each BCS. A detailed list of processes of our mechanism is provided below: 1) Each Snort NIDS runs a program, which checks CPU usage of the IDS, and save it to a file. 2) The CPU usage file is then sent to the controller. 3) The BCS captures network traffic into pcap file (the BCS only capture 10 seconds of network traffic), when the CPU usage of its home network IDS sensor is over 75%. 4) The BCS runs a program, which will get the both IDS sensors CPU usage files, and each BCS checks the CPU usage of its home network IDS sensor, if the usage is over 75%, and any of the IDS sensors in the network is below 50%. The BCS sends the pcap file to the idle Snort NIDS to analyze. 5) This process will restart every 10 seconds. C. Internal Communication methods From the Figure 4.2, we designed this private network to connect each Snort NIDS, each BCS, and a controller together, because exchanging CPU usage data and pcap files may use large amount of the network bandwidth, and it may affect performance of the packets capture. By using private network to connect these devices, data can be exchanged faster and more secure without too much security consideration. Figure 4.2 Load Balancing Design V. EVALUATION OF DSNIDS APPROACH This chapter presents the details of tests that we have done on the DSIDS approach. These tests illustrate performance improvement and benefits of our DSIDS approach with load balancing.

5 A. Traditional DSNIDS Figure 5.1 Traditional DSNIDS Figure 5.1 shows the testing network architecture of the traditional DSIDS. Testing scenario is when there is a large volume of network traffic in subnet, at same time client 2 uses FTP to transfer data to server 1 anonymously, which will cause IDS1 generates FTP anonymous user login attempt alert. Test Results: With large network traffic Test No. Test 1 Test 2 Test 3 Test 4 No. of attacks detected Test No. Without other network traffic Test 1 Test 2 Test3 Test4 No. of attacks detected Table 5.1 Traditional DSIDS We performed eight times tests; four of them are with large network traffic. The testing result is shown in Table 5.1, and from the result we can see that when the network with large number of traffic, the Snort NIDS drops large amount of packets. This is caused by the size of the packets queue is over the buffer size of the IDS. During the test, we also found out that the IDS1 s CPU usage reached 100% when the client 1 launched UDP flooding. However, the IDS2 still have plenty of resources are available. As we know, NIDS is hardware-sensitive, the testing results above is affected by limited resources, because we are running it as Figure 5.2 DSIDS Network Architecture with two BCS Test Details: Time: 5 mins. Total Number of FTP login attempted: 10 times Client 1 uses hping to generate large amoung of zero size UDP packets to keep IDS1 busy. numbers of virtual machines. B. The DSIDS Approach with Load Balancing Our DSIDS approach with load balancing mechanism makes sure computation recourses are coordinated together. To achieve that, we designed an assistant system, namely BCS, which is used to capture the network traffics in one particular subnet when the IDS is busy, and then the

6 network capture file sends to another free IDS to analyse. To test performance of our DSIDS approach, we create two testing environments. The first test uses our virtual network environment to test the performance of attacking detection in a small size LAN. The second test uses powerful cluster to run multiple snort sensors, and we give each of them a network capture file (each sensor gets different pcap file with different volume of network traffic) to analysis simultaneously. The test two is designed to show the performance of our approach, when there are multiple powerful snort sensors are available. 1) Test One Small size network The test one is applied on our virtual network environment to test the performance of attacking detection in a small size LAN (See Figure 5.2). However, due to limited computation resource, we only turned on one client machine for each subnet. The testing environment, and the IDS sensors hardware configuration are kept the same. Testing Scenario: the client in the subnet launches UDP flooding Denali of Service attack, which generates huge amount of empty UDP packets. At the same time, the client in the subnet uses FTP to send file to server 1 anonymously. Test Details: Time: 1 mins Total number of FTP logins: 6 times (Once per 10 seconds) Test Results: Testing for the DSIDS approach Test Test Total Number of UDP packets Total Number of UDP packets Test IDS 1 detected Total Number of UDP packets IDS 2 detected Total Number of FTP login IDS 1 detected Total Number of FTP login IDS 2 detected Table 5.2 the DSIDS approach From the Table 5.2, we can see that when IDS1 faces large amount of network packets, it drops large amount of network packets, as a result, the IDS 1 cannot detect any FTP anonymous login attempts. However, the BCS capture the network packets in the subnet for 1 min, and store them into a pcap file. The pcap file then send to IDS 2 to analyze. As a result, the IDS 2 can detect almost all attacks. 2) Test Two Multiple High Power Snort Sensor The second test uses six nodes (See Table 5.3) in a Campus HPC cluster to run multiple snort sensors, and we give each of them a network capture file (each sensor gets different pcap file with different volume of network traffic) to analyze simultaneously. In this approach, the computational hosts are not exactly sensors: they do not capture packets, but only analyze them. The HPC cluster is a Sun (Oracle) Grid Engine cluster, which has over 3,300 cores over 200 execute nodes, and over 2.5 TB RAM available. Test Two is designed to show the performance of our approach, when there are multiple powerful snort sensors available purely for analysis. Testing Nodes Details Hostname Architecture No. of Cores Total Memory gn116 lx24-amd G gn152 lx24-amd G gn60 lx24-amd G gn62 lx24-amd G gn63 lx24-amd G gn65 lx24-amd G Table 5.3 Testing Nodes Details Testing Scenario: Step one: We used the BCS to capture the network traffic ten times into ten pcap files, and the system listened for 5 mins each time. These pcap files contains different level of traffic volume, and different anomalous activities, such as UDP flooding, ICMP flooding, normal network traffic, large size of ICMP packets, FTP anonymous logins, etc. Then, these ten pcap files were arranged to the six nodes in the cluster, and run 10 Snort analysis jobs simultaneously. Step two: We double the numbers of pcap files to 20 by duplicating the pcap files from the step one, and then we assigned 20 Snort jobs to analysis these 20 pcap files simultaneously. Step three: We increase the numbers of pcap files to 100 by duplicating the pcap files from the step one, and then we assigned 100 Snort jobs to analysis these 100 pcap files simultaneously. Testing Results: Step One: Number of Done jobs 10 Number of failed jobs 0 Time Spent for all jobs 22 mins secs done Average job wall time 7 mins secs Maximum job wall time 20 mins secs Minimum job wall time secs Table 5.4 Step One Results

7 Step Two: Number of Done jobs 20 Number of failed jobs 0 Time Spent for all jobs 23 mins secs done Average job wall time 6 mins secs Maximum job wall time 20 mins secs Minimum job wall time secs Table 5.5 Step Two Results Step Three: Number of Done jobs 100 Number of failed jobs 0 Time Spent for all jobs 45 mins 4.54 secs done Average job wall time 5 mins secs Maximum job wall time 13 mins secs Minimum job wall time secs Table 5.6 Step Three Results From the testing results above, we can see, the total time spent for six multi-core nodes to run 20 Snort jobs is almost similar to when the six nodes run 10 jobs, and we also can see that the average time spent on each job is shorter than when they run 10 jobs. This is because the jobs are allocated to free cores that can therefore execute the analyses at the same time. Therefore, if the network has multiple Snort machines with powerful multi-core hardware, and assuming they are idle, the BCS in our approach can assign more than one analysis jobs to each machine at same time, and each Snort machine can run these jobs simultaneously to achieve higher performance. From Test three we can see that 100 snort jobs did not run simultaneously, because the total time spent is much larger than maximum job wall time. This is due to insufficient computational resources. However, the Maximum job wall time and minimum job wall time are significantly less than previous tests. VI. CONCLUSION Our research presents an approach of Distributed Snort NIDS, which can coordinate multiple sensors across the Local Area Network to optimize usage of computation resources. However the approach is unable to drop abnormal network packets, and it can only give alerts to the system administrators. Due to the approach uses BCS to duplicate network traffic when a particular IDS s CPU usage is high, which causes some amount of network traffic may be analyzed more than once by multiple Snort NIDS sensors. To extend the research, a filter should be designed and developed to solve some network packets may be analyzed more than once by different Snort NIDS sensors, and improving the performance when facing large amount of traffic flow. REFERENCES [1]. Abramson, D., Bethwaite, B., Enticott, C., Garic, S., Peachey, T., Michailova, A., et al. (2009). Robust Workflows for Science and Engineering. 2nd Workshop on Many-Task Computing on Grids and Supercomputers(MTAGS 2009). Portland. [2]. Andrzej, G. (1991). Distributed operating systems: the logical design. London: Longman Group. [3]. Baker, A. R., & Esler, J. (2007). Snort IDS and IPS Toolkit. Burlington: Syngress Publishing, Inc. [4]. Chakrabarti, S., Chakraborty, M., & Mukhopadhyay, I. (2010). Campus Network Security Study of Snort-based IDS. International Conference and Workshop on Emerging Trends in Technology. [5]. CyberInsecure.com. (2010, 03 16). Cybercrime Related Losses Doubled In 2009, Financial Losses Totaled Million. Retrieved 06 1, 2012 from losses-doubled-in-2009-financial-lossestotaled million/ [6]. Denning, D. (1987). An intrusion-detection model. leee Trans. on Soft- ware Engg., SE (13), [7]. Dineley, D., & Mobley, H. (2009). The Greatest Open Source Software of All Time. Retrieved 06 03, 2012 from InfoWorld, Inc.: [8]. Dowell, C., & Ramstedt.P. (1990). The COMPUTERWATCH data reduction tool. 13th National Computer Security Conference, (pp ). Washington, DC. [9]. Heberlein, L., Dias, G., Levitt, K., Mukherjee, B., Wood, J., & Wolber, D. (1990). A network security monitor Symposium on Research in Security and Privacy, (pp ). [10]. Hochberg, J. (1993). NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 12 (3), [11]. Javitz, H., & Valdez, A. (1991). The SRI IDES Statistical Anomaly Detector IEEE Symposium on Research in Security and F'rivacy. Oakland. [12]. Laing, B. (2000). How to guide-implementing a network based intrusion detection system. Reading: Internet Security Systems. [13]. Ling, J. (2012). Campus Network Security Program Based on Snort Network Security Intrusion Detection System. Advanced Materials Research, [14]. Mukherjee, B., Heberlein, L., & Levitt.K. (1994). Network Intrusion Detection. IEEE Network, 8 (3), [15]. Monash University. (2010, 07 28). About the Monash network. Retrieved 05 30, 2012 from

8 Monash University: / [16]. Newman, R. C. (2010). Computer Security: Protecting Digital Resources. Sudbury: Jones and Bartlett Publishers. [17]. Ptacek, T., & Newsham, T. (1998). Insertion, Evasion, and Denial of Service: Eluding Network Instrusion Detection. Secure Networks, Inc. [18]. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). Gaithersburg: National Institute of Standards and Technology. [19]. Snapp, S., Brentano, J., Dias, G., & Goan, T. e. (1991). DIDS(Distributed intrusion detection system) motivation, architecture, and an early prototype. the Fourteenth National Computer Security Conference, (pp ). [20]. Sourcefire, Inc. (2011, 12 7). SNORT User Manual. Retrieved 02 29, 2012 from [21]. Sourdis, I., & Pnevmatikatos, D. (2003). Fast, Large-Scale String Match for a 10Gbps Fpga- Based Network Intrusion. FPL, 2003, [22]. Softpanorama. (2012, 11 4). TCP Performance Tuning. Retrieved 10 20, 2012 from Softpanorama: /Performance_tuning/tcp_performance_tuning.sht ml [23]. Tener, W. (1988). AI and 4GL: automated detection and investigation and detection tools. IFIP Security Conference. [24]. Tener, W. T. (1986). Discovery: An expert system in the commercial data security environment. In IFIP Security Conference. [25]. Vogel, M., & Schmerl, S. (2011). Efficient Distributed Intrusion Detection applying Multi Step Signatures. 17th GI/ITG Conference on Communication in Distributed Systems, (pp ). [26]. Weir, J. (2012, 07 20). Building a Debian\Snort based IDS.

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Implementation of Signature-based Detection System using Snort in Windows

Implementation of Signature-based Detection System using Snort in Windows Implementation of Signature-based Detection System using Snort in Windows Prerika Agarwal Sangita Satapathy Ajay Kumar Garg Engineering College, Ghaziabad Abstract: Threats of attacks are increasing day

More information

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack Yasuo Musashi, Ryuichi Matsuba, and Kenichi Sugitani Center for Multimedia and Information Technologies, Kumamoto University,

More information

PROTECTING INFORMATION ASSETS NETWORK SECURITY

PROTECTING INFORMATION ASSETS NETWORK SECURITY PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Intrusion Detection. October 19, 2018

Intrusion Detection. October 19, 2018 Intrusion Detection October 19, 2018 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please)

More information

Development of Automatic Detection and Prevention Systems of DNS Query PTR record-based Distributed Denial-of-Service Attack

Development of Automatic Detection and Prevention Systems of DNS Query PTR record-based Distributed Denial-of-Service Attack DNS PTR : DNS DNS (DDoS) DNS syslog : (1)DNS DDoS (PTR) (2) PTR IP IP IP PTR DNS DDoS DDoS (IPS) Development of Automatic Detection and Prevention Systems of DNS Query PTR record-based Distributed Denial-of-Service

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved.

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved. IDS & IPD CSH6 Chapter 27 Intrusion Detection & Intrusion Prevention Devices Rebecca Gurley Bace Topics Security Behind the Firewall Main Concepts Intrusion Prevention Information Sources Analysis Schemes

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan Emerging Threat Intelligence using IDS/IPS Chris Arman Kiloyan Who Am I? Chris AUA Graduate (CS) Thesis : Cyber Deception Automation and Threat Intelligence Evaluation Using IDS Integration with Next-Gen

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. NIDPSs can reliably ascertain if an attack was successful or not. 2. Intrusion detection consists of procedures and systems that identify system intrusions

More information

UMSSIA INTRUSION DETECTION

UMSSIA INTRUSION DETECTION UMSSIA INTRUSION DETECTION INTRUSION DETECTION Sensor1 Event1, Event2 Monitor No intrusion M SensorN Event1, Event2 Alarm! IDS CHARACTERISTICS Characteristics an IDS can be classified/evaluated by: Type

More information

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0 DC-228 ADSL2+ Modem/Router -Annex A- User Manual Version: 1.0 TABLE OF CONTENTS 1 PACKAGE CONTENTS...3 2 PRODUCT LAYOUT...4 3 NETWORK + SYSTEM REQUIREMENTS...6 4 DC-228 PLACEMENT...6 5 SETUP LAN, WAN...7

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 Caution Anomaly detection assumes it gets traffic from both directions. If the sensor is configured to see only one direction of traffic, you should turn off anomaly detection. Otherwise, when

More information

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology Behavior-Based IDS: Overview and Deployment Methodology Lancope 3155 Royal Drive, Building 100 Alpharetta, Georgia 30022 Phone: 770.225.6500 Fax: 770.225.6501 www.lancope.com techinfo@lancope.com Overview

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 This chapter describes anomaly detection and its features and how to configure them. It contains the following topics: Understanding Security Policies, page 9-2 Understanding Anomaly Detection,

More information

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli NIDS: Snort Group 8 Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli 1 Summary NIDS Snort Syn Flood Attack Exploit Kit Detection: Bleeding Life Packet Level Evasion Snort as

More information

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials Firewalls, IDS and IPS MIS5214 Midterm Study Support Materials Agenda Firewalls Intrusion Detection Systems Intrusion Prevention Systems Firewalls are used to Implement Network Security Policy Firewalls

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 13 Chapter 6: Intrusion Detection Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events,

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation) 1 Network Security Kitisak Jirawannakool Electronics Government Agency (public organisation) A Brief History of the World 2 OSI Model vs TCP/IP suite 3 TFTP & SMTP 4 ICMP 5 NAT/PAT 6 ARP/RARP 7 DHCP 8

More information

Intrusion Detection. What is Intrusion Detection

Intrusion Detection. What is Intrusion Detection Intrusion Detection 1 What is Intrusion Detection We are referering to the act of detecting an unauthorized intrusion by a computer on a Network. Attemp to compromise or otherwise do harm, to other Network

More information

HSNORT: A Hybrid Intrusion Detection System using Artificial Intelligence with Snort

HSNORT: A Hybrid Intrusion Detection System using Artificial Intelligence with Snort HSNORT: A Hybrid Intrusion Detection System using Artificial Intelligence with Snort Divya Asst. Prof. in CSE Department Haryana Institute of Technology, India Surender Lakra Asst. Prof. in CSE Department

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

Security Device Roles

Security Device Roles Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS FLOODING ATTACKS

A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS FLOODING ATTACKS A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS FLOODING ATTACKS 1 A. SAIDI, 2 A. KARTIT, 3 M. EL MARRAKI 1 ALaboratoire De Recherche En Informatique Et Télécommunications Unité

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks N S ABOUZAKHAR, A GANI, E SANCHEZ, G MANSON The Centre for Mobile Communications

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 12 This chapter describes how to create multiple security policies and apply them to individual virtual sensors. It contains the following sections: Understanding Policies, page 12-1 Anomaly Detection

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers

Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers Ryuichi Matsuba, Yasuo Musashi, and Kenichi Sugitani Center for Multimedia and Information Technologies, Kumamoto University, Kurokami,

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

GE s Enterprise Sensor Grid

GE s Enterprise Sensor Grid GE s Enterprise Sensor Grid It s not the size of your network, it s how well you monitor it. David J. Bianco Incident Handler GE-CIRT David.Bianco@ge.com [Network Security Monitoring is] the collection,

More information

SIEM (Security Information Event Management)

SIEM (Security Information Event Management) SIEM (Security Information Event Management) Topic: SECURITY and RISK Presenter: Ron Hruby Topics Threat landscape Breaches and hacks Leadership and accountability Evolution of security technology What

More information

Implementation and Analysis of DoS Attack Detection Algorithms

Implementation and Analysis of DoS Attack Detection Algorithms Implementation and Analysis of DoS Attack Detection Algorithms Rupesh Jaiswal 1, Dr. Shashikant Lokhande 2, Aditya Gulavani 3 1 Assistant Professor, Dept. of E&TC, Pune Institute of Computer Technology,

More information

BOR3307: Intro to Cybersecurity

BOR3307: Intro to Cybersecurity Key Terms for lesson 4 are listed below: It is important that you maintain a copy of these key terms handy as you take this course and complete the readings. Working from a standard lexicon will keep you

More information

Configuring Dashboards

Configuring Dashboards CHAPTER 2 This chapter describes dashboards, and how to add and delete them. It contains the following topics: Understanding Dashboards, page 2-1 Adding and Deleting Dashboards, page 2-1 Understanding

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Professor, SIS Lecture 12 2016 Intrusion Detection, Auditing System Firewalls & VPN 1 Intrusion Detection 2 Intrusion Detection/Response Denning:

More information

Fuzzy Intrusion Detection System

Fuzzy Intrusion Detection System AU J.T. 6(2): 109-114 (Oct. 2002) Fuzzy Intrusion Detection System Piyakul Tillapart, Thanachai Thumthawatworn and Pratit Santiprabhob Faculty of Science and Technology, Assumption University Bangkok,

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

Lab Guide 1 - Basic Configuration and Interface Configuration

Lab Guide 1 - Basic Configuration and Interface Configuration IXP Workshop Lab Lab Guide 1 - Basic Configuration and Interface Configuration Objective: All the workshop lab routers are set to the default configuration and cabling requirements are prebuild according

More information

Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud

Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud Berkah I. Santoso, M. Rien S. I, Irwan P. Gunawan @Eastparc Hotel, Yogyakarta berkah.santoso@bakrie.ac.id,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Intrusion Goals and Methods

Network Intrusion Goals and Methods Network Intrusion Goals and Methods Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network

More information

CE Advanced Network Security

CE Advanced Network Security CE 817 - Advanced Network Security Lecture 5 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other

More information

ProCurve Network Immunity

ProCurve Network Immunity ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards. or Detection Comp Sci 3600 Security Outline or 1 2 3 4 5 or 6 7 8 Classes of or Individuals or members of an organized crime group with a goal of financial reward Their activities may include: Identity

More information

Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP

Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP Sagar N. Shah* M.E. (Computer Science & Engineering), Parul Institute of Engineering & Technology, Vadodara, Gujarat, India Ms.

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Security Principles SNORT - IDS

Security Principles SNORT - IDS Security Principles SNORT - IDS Intrusion detection What is intrusion detection? Technically, any method that allows you to discover if someone has penetrated or is attempting intrusion into your network,

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING Moch. Zen Samsono Hadi, Entin M. K., Aries Pratiarso, Ellysabeth J. C. Telecommunication Department Electronic Engineering Polytechnic

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

International Journal of Research (IJR) Vol-1, Issue-10 November 2014 ISSN Network Security

International Journal of Research (IJR) Vol-1, Issue-10 November 2014 ISSN Network Security Network Security Megha Verma ; Palak Sharma ; Neha Sundriyal ; Jyoti Chauhan III Semester, Department of Computer Science & Engineering Dronacharya College of Engineering, Gurgaon-123506, India Email Id:

More information

Abstract. Keywords: Virus, inetmon Engine, Virus Parser, Virus Matching Engine. 1. Introduction

Abstract. Keywords: Virus, inetmon Engine, Virus Parser, Virus Matching Engine. 1. Introduction Real-Time Detection System Using inetmon Engine Sureswaran Ramadass, Azlan Bin Osman, Rahmat Budiarto, N. Sathiananthan, Ng Chin Keong, Choi Sy Jong Network Research Group, School Of Computer Science,

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Developing the Sensor Capability in Cyber Security

Developing the Sensor Capability in Cyber Security Developing the Sensor Capability in Cyber Security Tero Kokkonen, Ph.D. +358504385317 tero.kokkonen@jamk.fi JYVSECTEC JYVSECTEC - Jyväskylä Security Technology - is the cyber security research, development

More information

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary Takeaways You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

Study of Snort Ruleset Privacy Impact

Study of Snort Ruleset Privacy Impact Study of Snort Ruleset Privacy Impact Nils Ulltveit-Moe and Vladimir Oleshchuk University of Agder Presented at: Fifth International PrimeLife/IFIP Summer School, Nice, France 7.-11. September 2009. This

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Intrusion Detection CIT 480: Securing Computer Systems Slide #1 Topics 1. Definitions and Goals 2. Models of Intrusion Detection 3. False Positives 4. Architecture of

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System

LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System Nikos Tsikoudis Thesis Supervisor: Evangelos Markatos June 2013 Heraklion, Greece Low-Power Design Low-power systems receive significant

More information

The Future of Threat Prevention

The Future of Threat Prevention The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network

More information

Cisco IPS AIM Deployment, Benefits, and Capabilities

Cisco IPS AIM Deployment, Benefits, and Capabilities Cisco IPS AIM Abstract The Cisco IPS Advanced Integration Module (AIM) for Cisco modular integrated services routers integrates a high-performance, feature-rich intrusion prevention system (IPS) into the

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform 9.2 (Quick Tour) McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and software that accurately detects and prevents

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

Smart Cooperative Firewalls

Smart Cooperative Firewalls Smart Cooperative Firewalls An aid to a safer and secure cyber world Thomas Graves Computer Science Truman State University Kirksville Missouri USA tcg6531@truman.edu Abstract A Firewall is a necessity

More information

Network Security Terms. Based on slides from gursimrandhillon.files.wordpress.com

Network Security Terms. Based on slides from gursimrandhillon.files.wordpress.com Network Security Terms Based on slides from gursimrandhillon.files.wordpress.com Network Security Terms Perimeter is the fortified boundary of the network that might include the following aspects: 1. Border

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.124-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 6 Intrusion Detection First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Intruders significant issue hostile/unwanted

More information

Improved Detection of Low-Profile Probes and Denial-of-Service Attacks*

Improved Detection of Low-Profile Probes and Denial-of-Service Attacks* Improved Detection of Low-Profile Probes and Denial-of-Service Attacks* William W. Streilein Rob K. Cunningham, Seth E. Webster Workshop on Statistical and Machine Learning Techniques in Computer Intrusion

More information

Computer and Network Security

Computer and Network Security Computer and Network Security c Copyright 2000 R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Network Security (Pfleeger

More information

Implementing a network operations centre management console: Netmates

Implementing a network operations centre management console: Netmates Section 1 Network Systems Engineering Implementing a network operations centre management console: Netmates R.Bali and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom

More information

Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log. 69 Scientia Africana, Vol. 13 (No.2), December 2014. Pp69-80 College of Natural and Applied Sciences, University of Port Harcourt, Printed in Nigeria ISSN 1118-1931 COMBINING HOST-BASED AND NETWORK-BASED

More information

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ] s@lm@n ECCouncil Exam 312-50v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ] Question No : 1 An Intrusion Detection System(IDS) has alerted the network administrator to a possibly

More information