SSL Automated Signatures

Size: px
Start display at page:

Download "SSL Automated Signatures"

Transcription

1 SSL Automated Signatures WilliamWilsonandJugalKalita DepartmentofComputerScience UniversityofColorado ColoradoSprings,CO80920USA and Abstract In the last few years there has been considerable research on automated intrusion signature generation. Automated signature generation helps mitigate the limitation signature based intrusion detection systems have with classifying novel exploits. The problem has been approached with a few different solutions. Systems that generate automaton based on system calls typically provide the least false negatives and least false positives, however they are significantly more resource intensive than basic signatures. In many cases they also require changes to each application they protect. Even though signatures that are generated using features extracted fromnetworkpayloadandprotocolcontextarenotasrobustasautomatonmodelingillegaloperations,theyare muchfastertobothgenerateandevaluate.thesslautomatedsignatures(sas)reportedheresystemfallsinthe categoryofruleinductionsystems.itcombinesmanyoftheadvantagesofbothhostbasedandnetworkbased intrusiondetection.itovercomesthelimitationsthatnetworkintrusiondetectionhaswithencryptedtrafficand novelexploits.thecomputationalexpenseandhighfalsepositiverateofclassichostbasedanomalydetectionis mitigatedthroughthecombinationofruleinductionandsensorcollaboration. 1 Introduction 1.1 Intrusion Detection Withtherapidgrowthofsociety sdependenceoninformationsystems,theriskfrommaliciousactivity has also grown rapidly. Intrusion detection systems provide some control against malicious activity. Intrusion detection systems look for patterns that are either known to be malicious or are not encountered during normal operations, then either prevent the activity or alert an administrator. Intrusiondetectionsystemsaregenerallyclassifiedintwosetsofcategories:networkorhostbased,and signatureoranomalybased.combinationswithinthesetsareusuallyreferredtoashybridsystems. Figure 1: Intrusion Detection System Types A signature based system utilizes expert knowledge to detect exploits. Signature based detection

2 systems are fast compared to anomaly based systems and are very accurate in detecting known exploits. The main drawback of signature based systems is their inability to detect most novel and obscuredexploits. Anomybasedsystemsanalyzeeithernetworktrafficorstatesofindividualhosts.Manyanomaly based systems that use network traffic rely on protocol information of network traffic as opposed to packet content.thesesystemsbuildprofilesofprotocolbehaviorforthedifferenthostsandgeneratealerts when traffic deviates from the profile. The advantage of anomaly based systems is they can detect novelexploitsthatcannotbeclassifiedusingsignatures. Networkbasedsensorsareusuallydedicatedhoststhatreadalldatafromanetworksegmentforusein detectingattacks.theprimaryadvantageofnetwork basedsensorsisintheirviewofanentirenetwork segment. A network sensor can detect if the same source was attempting to access multiple destinationsnearthesametime,whilesensorswithouttheabilitytoseetheentirenetworkcouldnot detectthosetypesofpatterns.networksensorsarealsonecessarytodetectattacksagainstnodesthat donothosttheirownintrusiondetectionagents,suchasmanyrouters,switches,andhoststhateither don thaveorcan tsparethenecessaryresources. Ahostbasedintrusiondetectionsystemisprettymuchexactlyasitsounds.Itinvolvesagentsthatrun on end systems. Host based intrusion detection systems can monitor operating system state, applicationstate,orevaluateprocessesandtrafficbasedonsignatures.itiscommonforhoststohave severalautonomousintrusiondetectionprogramsthatdonotinteractatall,whichleadstoscalability problems.whenaseparateagentisneededforeachprogram,theoverheadissignificant.however,a singleagentthatunderstandsthevalidoperationsofeveryprogramisimpractical.asmentionedinthe previoussection,themainadvantageofhostbasedsystemsisthatitcanmonitorstate,soitcandetect ifarequestwassuccessfulandifseeminglynormaltrafficleadstoaninvalidstate. Systemsthatcontainmorethanonecooperativehostornetworkbasedsensorareusuallyreferredtoas distributedintrusiondetectionsystems. 1.2 Automated Signature Generation Automated signature generate (ASG) refers to the process of dynamically creating rules for detecting networkintrusions.thestrictdefinitionofautomatedsystemgenerationshouldonlyincludesignature based intrusion detection systems; however modeling for anomaly based detection is frequently associated with ASG. In the last few years there has been considerable research on this topic. Automated signature generation helps mitigate the limitation signature based intrusion detection systems have with classifying novel exploits. Up until the advent of automated signature generation systemsthebestsolutiontoalertagainstnovelattackswastoemployanomalydetectionagentsonthe networkandoncriticalhosts.signaturesareonlyabletodetectexploitsagainstknownvulnerabilities. Anomaly detection systems are used to look at changes in usage network or application patterns or invalidstatesonahost.thisadditionalinformationgivesthemtheabilitytodetectexploitsonzeroday vulnerabilitiesthatwouldeasilypassthroughasignature basedsystem. Automatedsignaturegenerationhelpsfillthegaptoallowsignaturebasedsystemstodetectattackson novel exploits, which gives security experts time to analyze the vulnerability and create permanent signatures. ASG systems use data from anomaly detection systems and honeypots as input to their learningalgorithms.theoutputsaredeployablesignatures. Thequestioncanstillbeaskedastowhyuseautomaticallygeneratedsignaturesatallwhenanomaly detection can detect these zero day vulnerabilities. The answer is in the mean resource utilization requiredtodetectanattackwithhighconfidence.insomecases,theattackmightnotbedetecteduntil

3 after it was successful. In these cases, the automatically generated signature will protect other hosts even though it has already caused damage to at least one host. In other cases, the signature can be usedonhostsornetworksensorsthatdonothavetheresourcesforanomalydetection.evenonhosts thatusedanomalydetectiontosuccessfullythwarttheattack,theuseofasignaturewillprotectagainst futureattackswithoutrequiringtheperformancetaxassociatedwithanomalydetection. Oneofthemostaccuratemethodsformodelgenerationisananalysisofsystemcalls.Therehavebeen severalintrusiondetectionsystemsbasedonthisconcept.(wagner,etal.,2001)describeasystemin whichstaticanalysisisusedtocreatepushdownautomatathatmodelsalloftheallowedsystemcalls foranapplication.theresultsintermsofdetectionrateandfalsepositiveratewereverypromising,but the resources required for both generation and evaluation of the automata limited the scalability to applicationsupto32,000lines.(gopalakrishna,etal.,2005)describeasimilarsystemas(wagner,etal., 2001)thatusesinlineautomatonmodels.Theirsystemgreatlyreducescomplexitywithoutasignificant raiseinthefalsenegativerate. Evenwiththereducedcomplexityofinlineautomatonmodels,anomalydetectionsystemssuchasthis areconsiderablymorecomputationallyintensivethansignaturesbasedonnetworktraffic.mostofthe original work in generation of network based intrusion detection systems used longest common substringsfoundinknownnetworkflowsknowntobeanomalous(kreibich,etal.,2003).inthelastfew years,theasgsystemsandtheirresultingsignatureshavebeengrowingmorecomplex.thenemean systemcreatessemanticawaresignatures(yegneswaran,etal.,2005).nemeanbuildsuponthetheory from Autograph, Earlybird, and Honeycomb and adds a component of normalization and application awareness.thesslautomatedsignaturessystemdescribedinthispaperbuildsontheconceptsused in Nemean with improvements in methods use to separate anomalous data from normal data, use of protocolcontextinformation,andinthenumberofsupportedprotocols. 1.3 Feature Selection Featureselectionandweightingarekeyfactorsinautomatedsignaturegeneration.Thebasisofmany networkanomalybasedintrusiondetectionsystemsisanalysisofprotocolcontext.networkanomaly detection relies on creating a baseline for normal protocol behavior and determining when there is a deviation.inthe1999kddcupcompetition,mostofdatawasnetworkprotocolandoperatingsystem contextdataextractedfromthe1998darpaintrusiondetectiondataset.the1998darpaintrusion detectiondatasetcontainedprimarilydenialofserviceexploitsthatcouldbedetectedusingprotocol contextandafewcommonpayloadstrings.forcasessuchasthedenialofserviceattackspresentin the1998darpadataset,featureselectionisrelativelysimpleandcouldbecapturedinthe47features usedinthe1999kddcup. Theusertorootandremotetolocalexploitclassesprovedmoreofaproblemforfeatureselection.For the 1999 KDD Cup, features specific to the protected application needed to be selected using expert knowledge. The developers of the KDD 1999 data set extracted content strings statically from the payloadbasedonananalysisoftheexploitscontainedinthetestset.whenleavingtheconfinesofa small test set a more dynamic approach is needed for feature selection. Modeling the intended behavior of an application is one approach, but it has scalability limits (Yegneswaran, et al., 2005). Anotherapproachistomodelbehaviorthatiscommoninexploitsagainstanapplication.Forexample, (Kloft,Brefeld,Dussel,Gehl,&Laskov,2008)usetraitsthatarecommonlyfoundinmaliciouswebtraffic, such as excessively long URLs and POST variables, non printable characters, control characters, and otheruncommoncharactersasabasisforfeatures. These types of models require expert knowledge about the protected application or the class of vulnerability exploited. When there isn t knowledge about the exploit available to the intrusion

4 detectionsystem,genericalgorithmsmustbeusedtofindsimilaritiesinanomalouspayloads.longest common substrings from payloads can be used after removing similarities from normal traffic. Polymorphic worms will slip past detection when using longest common substrings. Polygraph uses a statistical analysis of short payload substrings to find invariant segments in polymorphic payloads (Newsome, Karp, & Song, 2005). This technique performs reasonably well without any application specific knowledge. The intent of the SSL Automated Signatures (SAS) system is to protect against applicationvulnerabilitiesandnottoprotectfromworms,however,theconceptusedinpolygraphstill providesausefultechniqueforpayloadanalysiswithoutanyexpertknowledge. SASusesamulti tierapproachforfeatureselection.protocolfeaturesatthenetworkandssllayerare used as a first tier. The second tier includes application knowledge to find features in decrypted payloads. The third tier uses an algorithm similar to what was used in Polygraph to find correlations withtheabsenceofexpertknowledge. 2 Learning in Intrusion Detection 2.1 Rule Induction Once anomalous data is separated into categories and features have been selected, one can use rule induction to create signatures. The general concept of rule induction is to evaluate the values of the featureagainstthesetofclassestomaximizegain(quinlan,1993). TherawoutputofagreedyentropyminimizationalgorithmsuchasC5canbeusedasbasicsignatures. Iftheprocessforobtainingandlabelingdataisnotguaranteedaccurate,theresultingrulesshouldnot betreatedasabsolutetruths.theerrorratedeterminedfromtheinductiontestandtrainingdatamust becombinedwiththeconfidencefromtheanomalydetectionandcollectionsystemtocreateasetof possible classifications with probabilities for the rule sets. The use of probabilities on rule sets also allowsformorepruningthandiscreetrules.inthiscase,aneventmaymeetthecriteriaformorethan one rule and a classification decision will be calculated according to the probabilities of the triggered rules. 2.2 Collaboration and Data Fusion The SSL Automated Signature system requires collaboration in both anomalous data collection and combining generated signatures. Plurality voting, neural networks, Dempster Schafer, and Bayesian Inferencewereevaluatedforuseinthisproject.Pluralityvotingisthefastestandinmostcasesitisthe least accurate. When using plurality voting, the features with the most votes are selected for a classificationrule.neuralnetworkscanbeemployedinafewdifferentways.forthisprojecttheywere evaluated to determine weights each feature. As new decision trees were induced, the weights associatedtoeachclassifierwereadjusted.bayesianinferencechangestheprobabilityofaneventas newevidenceisintroduced.asnewevidenceisintroducedtheposteriorprobabilityiscalculatedusing thepriorprobability,theconditionalprobability,andthemarginalprobability.dempster Shafertheory is a method for combining evidence that is based on Bayesian theory. It introduces concepts of ignorance, belief, disbelief, and plausibility instead of probabilities. This removes the requirement for

5 prior probabilities on all features and accommodates for feature sets that do not have complete intersections(alani,etal.,2002). 3 SSL Signatures 3.1 SSL and Limitation of Current Systems Most of the current systems in automated signature generation are designed to thwart new worms. Theyarenotabletoclassifyattacksthatareencryptedordonothavesufficienttraffictoshowupusing theiranomalousdatacollectiontechniques. The SSL Automated Signature systems provides both a new approach at evaluating signatures and improvesonexistingtechniquesforcollectinganomalousdata. The Secure Sockets Layer (SSL) is a presentation layer protocol that provides confidentiality and integrity. It uses symmetric cryptography to encrypt application data and uses a key message authenticationcode(mac)toensuredatagramintegrity(dierks,etal.,1999).theprotocolallowsfor secure key negotiation and mutual authentication. It is designed to provide a flexible framework. Parameters such as encryption algorithm and bit length can be negotiated between hosts. This also allows for implementations of SSL to update the underlying encryption algorithms with relative ease. Sinceitisdefinedasapresentationlayerprotocol,itisindependentofapplicationlayerprotocols.This allowsittobeintegratedintocountlessapplications. One of the most common implementations of SSL is OpenSSL. The most recent version of OpenSSL provides support for each version of the SSL specification including TLSv1. OpenSSL makes it easy for programmers to secure their network communication. The push for security and the ease of use of librariessuchasopensslhasimprovedconfidentialityofinternetcommunicationswhilecreatinganew issue.securitycontrolssuchasnetworkinstructiondetectionsystemsandproxyfirewallsarenolonger abletoinspectthecontentoftheapplicationpayload.theaddedassurancetoconfidentialitydoesnot remove any application vulnerabilities. In most cases applications are just as vulnerable to buffer overflowandotherattacksthatresultinnotproperlycheckinginput.whilesslcanbeusedtomutually authenticateaclientandserver,thisfeatureisnotalwaysused.thecasewithoutauthenticationcanbe vulnerabletomaninthemiddleattacksorotherformsofimpersonation. TheuseofanSSLterminationproxyisonesolutiontohelpdetectanomaliesindataencryptedwithSSL. Thesesystems,however,haveafewlimitations.Fromthefunctionalityperspective,theyarelimitedby theirprocessingpowerandthespeedoftheirnetworkinterface.theresourcesrequiredtoterminate, inspect,andthenrecreateansslsessionlimitsthescalabilityofthesedevices.theyarealsoconsidered bysomesecurityexpertstocreateasecurityvulnerabilityjustasbadastheonetheyaresolving.since thesedevicesaretrustedtoactonthebehalfofclientsbyterminatingtheirsslsessions,theymustbe truly trusted devices. If one of these appliances exploited, the attacker has access to every flow that movesthroughit. Anothersolutiontoallowinspectionofthedataispushingtheresponsibilityofintrusiondetectionand responsedowntothehost.inadditiontobeingabletodecryptdatapriortoinspection,theuseofhost intrusiondetectionbringsadvantagessuchasbeingabletomonitorthestateofthesystemandblock theexecutionofcode. TheconceptofSSLsignaturesisbeingintroducedaspartoftheSSLAutomatedSignaturessystem.The SSL signature component introduces the ability to evaluate SSL payload and protocol context prior to returningareadrequesttoanapplication.evenwithoutthedynamiccapabilityofthesassystem,ssl signaturesstillprovidevaluableprotectionbecausetheyareabletoreaddataafterdecryptionanduse fewerresourcesthananomalybasedhostintrusiondetectionsystems.

6 3.2 SAS Signature Generation InexamplesliketheDARPA1998testset,themajorityoftheanomalousdataisfromdenialofservice attacks.fordenialofserviceattacks,protocolanalysiswithlimiteduseofpayloadfeaturesisadequate. For remote to local, user to root attacks and other types of data access exploits this is often not the case. The SSL signature architecture makes use of TCP/IP protocol features, as well as SSL protocol features,andpayloadfeaturestoassistinclassifyingexploitsthataretailoredtowardsdataaccess.the intrusiondetectionmessageexchangeformat(idmef)dtdprovidesthetemplateforfeaturesthatare evaluated.itincludesthetcp/ipfeaturesthatareseenintraditionalintrusiondetectionsystemsand add some entities for upper layer protocol information. It also includes impact, category, and data sourceentities.theadditionalsslprotocoldataisaddedasanewentity.atthisstageofdevelopment, thesystemerrsonthesideoftoomuchdata.mostofthepropertiesthatareprovidedbytheopenssl encryptioncontextstructuresaredefinedinthesslentity.astestingprogresses,unneededattributes willberemoved. Thesignaturegenerationcomponentreliesontheresultsfromtheframeworkforsensorcollaboration. When the signature generation component gets data, it is expected that data has already been normalizedandassignedconfidencevaluesfromthesensorcollaborationcomponent. Thepayloadfeaturesarenotassimpletodefineastheprotocolcontextfeaturesunlessknowledgeof anapplicationisused.innon obfuscatedatomicattacks,alongestcommonsubstringcanbeusedto extractrelevantinformationfromapayload.eventhoughitisnotsufficientformanyattacks,itisworth includingasalowcomplexityfirstpass.adisadvantageofthelongestcommonsubstringmethodisit willgeneratesignaturesthatarelongerthanneededtobetoclassifytheattack.itwillalsooftenmiss components that are common to normal traffic, but are required as part of the attack. To improve accuracy over the longest common substring method, sets of smaller byte sequences are evaluated. Severalmethodsforcomparingstringswereevaluatedforoptimalperformanceandaccuracy.Settinga minimumandmaximumthresholdforbytesequencecanbeusedtocreatesmallersignaturesthanthe longest common substring method with comparable accuracy. To further increase accuracy, exact matchesatthebitlevelareevaluatedforthefirst32bitsofthepayload.thisisusedtohelpcapture applicationdirectivesthatarefrequentlyfoundatthebeginningofthepayload.atthistimeonlyunions ofthesetsarebeingevaluated.inthefuture,orderingandmorecomplexbooleanexpressionswillbe evaluated. Individual rules are generated using established rule induction techniques. Code from the C4.5 applicationisusedforthebasisoftheruleinductioncomponent.sincetheconfidenceofeachrulecan belowandthefeaturesselectedforeachrulemightnotbecomplete,therulesarecombinedasnew dataispresentedtothesystem.themethodproposedin(alani,etal.,2002)isbeingevaluatedforuse incombiningtherules.ithasahighercomputationalcostforcombininginitialsetsofclassifiersthan othersystemsbasedonsimilartheory,butcostdecreasesforadditionalclassifiersastheyareadded. Partofthecombiningprocessreducesthecomplexityofeachrule.Featureswithahighconfidencethat arepresentinmostrulesareincludedintheprimaryrulewithahighconfidence.inordertoprevent loss of decisions based on features that were not consistent in the data provided to the combiner process,supplementaryrulesaregeneratedwithalowconfidence.useofthesupplementaryrulesis helpfulinraisingtheconfidencewhentheprimaryruledoesnotprovideahighenoughconfidenceto createanalert.mostintrusiondetectionsystemsonlyhaveclassifiersformaliciousdata.thedynamic nature of the SAS and the simplified signatures creates an issue that an event may have a high confidence in different classes. When all of the classes are malicious, the impact of an overlap is minimal, but one must also take the normal class into account. To ensure that the overlap is not the resultofthetrafficactuallybeingnormal,signaturesareincludedtoclassifynormalevents.ingeneral, thetriggerfortheclasswiththehighestconfidenceisexecuted.

7 3.3 SSL Interception Architecture TheSSLAutomatedSignatures(SAS)systemhastheuniqueabilitytonotjustlookattrafficasitcomes fromthenetworkinterface,butitcanalsoevaluatedecryptedssltrafficandmetadata.themetadata includes information such as the typical TCP/IP features, SSL connection state, SSL alert value, SSL version,encryptionalgorithm,andafewotherattributes. TheSSLsignatureevaluationprocesshooksintotheSSL_ReadfunctionofOpenSSL.Whenasignatureis triggered,theuser_cancellederrorisraisedinopenssl.thistriggersthesslconnectiontoclose. Figure 2 SSL Signature Flow FordynamicgenerationofSSLsignatures,afewcomponentsinadditiontothesignatureevaluationare required.inordertoassociateanomalieswithssltraffic,arotatinglogfileisused.onthesassystems, every read and write and their associated metadata is stored. When an anomaly is detected the host_agent requests SSL data from the relevant time and protocol so it can be used for signature generation. 3.4 Signature Structure The signatures structure of SAS is a compromise between succinct signatures and complex fuzzy signatures.thefirsttierofsignaturesisinthesnortformat.thesesignaturesdon tcontainanyfuzzy information, but the action of the signature indicates if a fuzzy signature should be evaluated. This allowsthesignatureprocessortoquicklymoveoversignaturesthatareclearlyirrelevant. Thisexamplecreatesanalertwithoutanyadditionalprocessing: alert ssl $SRC_NET $SRC_PORT -> $DST_NET $DST_PORT (content: " PAYLOAD_SEG1" && "PAYLOAD_SEG2" ; ssl_options: "v2,aes168,md5,dh") Changing the rule to a trigger rule will make it so it will trigger additional rules. The trigger rule also needs to list the rule_id so the system can look up follow on rules in the rule database. This small changeenablesconvertsastrictruleintoatriggerforafuzzyrule:

8 trigger ssl $SRC_NET $SRC_PORT -> $DST_NET $DST_PORT (content: " PAYLOAD_SEG1" && "PAYLOAD_SEG2"; ssl_options: "v2,aes168,md5,dh"; rule_id:32767) Thefollowonrulesaresetsofprobabilitiesstoredinarelationaldatabasethatcanbereferencedbythe rule_id.arecordinthedatabaseisaconditionalprobability,p(class Event)=probability,wherethe Eventcanbeasingleobservationoracombinationofobservations,includingnegations.Forexample P(some_class PAYLOAD_SEG1 Λ PAYLOAD_SEG2 Λ (content_feature1 V content_feature2)) requires three conditions to be met to include the probability. Bayesian inference is used combine probabilitiesofrelevantrulestodeterminethemostprobableclass. 4 Results Theproofofconceptmodelwasevaluatedusingapplicationsdesignedwithintentionalsecurityflaws. Theintentionalsecurityflawsinsimpleapplicationsprovidedacontrolledenvironmentfortesting.The host anomaly detection components were designed with knowledge of the expected behavior of the testapplications.thetestapplicationsprimarilyincludedvulnerabilitiesfromuncheckedinputs.atthis time, all of the attacks used against the applications were atomic so a correlation could be made between data captured from the SSL intercept component and the anomaly detection agents without theadditionalstatetrackingrequiredtodetectcompositeattacks. Theapplicationsincludedanemulationofawebserverandatwosimpleclient serverapplication.the emulatedwebservercontainedsampleapplicationsthathadsqlinjectionvulnerabilitiesandscripting errors from unchecked inputs. The client server applications contained mostly buffer overflow vulnerabilities.thetestapplicationsalsocontainedsomecompletelysyntheticvulnerabilities,inwhich theapplicationswouldcreatelogentrieswhencertaininputconditionsweremetthatwouldallowthe anomalysensorstobelievetherewasanattack.thiswasnecessarysothetestsetcouldbeexpanded pastcommonexploitclasses. Scripts were used to generate test data. Semi random permutations of valid input were provided for 98%oftheinputcases.Fortheremaining2%ofthetestdata,randomlyselectedexploitswereused. Theexploittestsetincludedcaseswithvalidinputsmixedwithmalicious,randommixedwithmalicious, andstrictlymalicious.thetestswiththesescriptshadahighdetectionrate,butwhentechniqueswere usedtoattempttoconfusethesignaturegenerationsystemthefalsepositiverateincreased. Predicted Actual Normal BufferOverflow Injection Unique % Correct Normal BufferOverflow Injection Unique %Correct Figure 3 Results Theadditionalscriptcreatedinputswithdifferentmalicioussegmentsanddatathatcontainedseveral setsofidenticalsegmentsthanarecommonlyseeninnormaltraffic.thiscausedhigherfalsepositive and lower true positive rates because some of the generated signatures contained primarily normal segments.apossiblesolutiontothisattackagainstthesignaturegenerationsystemistoincludemore training with known normal data to reduce the weight of the normal segments when they are intentionallyinjectedwithmaliciousdata. Predicted Normal BufferOverflow Injection Unique %

9 Actual Correct Normal BufferOverflow Injection Unique %Correct Figure 4 Results with obfuscation Whencollapsingthecategoriestoonlynormalormalicious,theF 1 scoreforretrievingofnormaldatain thefirstexperimentis whenaddingtheobfuscationscript,thescoredropsto dueto theamountofnormaldatathereisn tasubstantialchange,butthedifferencecanbeeasilyseeninthe rawdata. 5 Future Work Atthispoint,allofthetestsaresyntheticusingproofofconceptapplications.Thesystemwillnothave anyrealvalueuntilitcanbesuccessfullyintegratedintorealapplications. Amajordrawbackfromthemethodusedtotesttheproofofconceptapplicationisthatthetypeofdata usedfortestingwasthetypeexpectedbythesystem.italsohadmoremaliciousdatainthetrainingset thanwouldbeseenwhencollectingfromalivenetwork.agreaterthan0.99f 1 scoreintheproofof conceptmodelispromising,butforausableintrusiondetectionsystemthefalsepositiveratemustbe muchlower.workiscurrentlybeingdonetodecreasethefalsepositiverate,butthemodulesarenot readytobeintegratedintothesystemfortesting. Theframeworkforsensorcollaborationusedtocollectanomalousdataisstillunderdevelopmentandis limited in its ability to provide data from distributed and non atomic attacks. Once the framework is mature,workmustbedonetoensuresignaturereliabilityisnotlostwhendataisnotprovidedfroma controlledenvironment. 6 Works Cited AlAniAhmedandDericheMohamedAnewTechniqueforCombiningMultipleClassifiersusing Dempster ShaferTheoryofEvidence[Journal] pages :Vol.17. DierksTandAllenCTheTLSProtocolVersion1.0,RFC2246[Online]//IETF GopalakrishnaRajeevandSpaffordEugeneEfficientIntrusionDetectionusingAutomatonInlining [Online]/prod.PrivacyProceedingsoftheIEEESymponiumonSecurityand. May KloftMarius[etal.]AutomaticFeatureSelectionforAnomalyDetection[Journal]//AISec KreibichChristianandCrowcroftJonHoneycomb CreatingIntrusionDetectionSignaturesUsing Honeypots[Journal]//InProceedingsoftheSecondWorkshoponHotTopicsinNetworks NewsomeJames,KarpBradandSongDawnPolygraph:AutomaticallyGeneratingSignaturesfor PolymorphicWorms[Conference]//Proceedingsofthe2005IEEESymposiumonSecurityandPrivacy

10 QuinlanJRossC4.5ProgramsforMachineLearning[Book]. SanMateo,CA:MorganKaufmann Publishers,1993. WagnerDavidandDeanDrewIntrusionDetectionviaStaticAnalysis[Journal]//Proceedingsofthe IEEESymposiumonSecurityandPrivacy pp YegneswaranVinod[etal.]Anarchitectureforgeneratingsemantics awaresignatures[conference]// InUSENIXSecuritySymposium

Polygraph: Automatically Generating Signatures for Polymorphic Worms

Polygraph: Automatically Generating Signatures for Polymorphic Worms Polygraph: Automatically Generating Signatures for Polymorphic Worms James Newsome Brad Karp Dawn Song Presented by: Jeffrey Kirby Overview Motivation Polygraph Signature Generation Algorithm Evaluation

More information

Automated Signature Generation: Overview and the NoAH Approach. Bernhard Tellenbach

Automated Signature Generation: Overview and the NoAH Approach. Bernhard Tellenbach Automated Signature Generation: Overview and the NoAH Approach Structure Motivation: The speed of insecurity Overview Building Blocks and Techniques The NoAH approach 2 The speed of insecurity Source:

More information

Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS. Outline

Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS. Outline Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer

More information

CIH

CIH mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

9. Security. Safeguard Engine. Safeguard Engine Settings

9. Security. Safeguard Engine. Safeguard Engine Settings 9. Security Safeguard Engine Traffic Segmentation Settings Storm Control DoS Attack Prevention Settings Zone Defense Settings SSL Safeguard Engine D-Link s Safeguard Engine is a robust and innovative technology

More information

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection Journal of Computer Science 7 (2): 255-261, 2011 ISSN 1549-3636 2011 Science Publications Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection Selvamani Kadirvelu and Kannan

More information

Misleading Worm Signature Generators Using Deliberate Noise Injection

Misleading Worm Signature Generators Using Deliberate Noise Injection Misleading Worm Signature Generators Using Deliberate Noise Injection Roberto Perdisci,, David Dagon,WenkeLee, Prahlad Fogla and Monirul Sharif Georgia Institute of Technology, Atlanta, GA 30332, USA University

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Access Control Using Intelligent Application Bypass

Access Control Using Intelligent Application Bypass Access Control Using Intelligent Application Bypass The following topics describe how to configure access control policies to use Intelligent Application Bypass: Introducing Intelligent Application Bypass,

More information

Activating Intrusion Prevention Service

Activating Intrusion Prevention Service Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers

More information

D1.2: Attack Detection and Signature Generation

D1.2: Attack Detection and Signature Generation SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS-011923 D1.2: Attack Detection and Signature Generation Abstract: The

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

A Firewall Architecture to Enhance Performance of Enterprise Network

A Firewall Architecture to Enhance Performance of Enterprise Network A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

DO NOT OPEN UNTIL INSTRUCTED

DO NOT OPEN UNTIL INSTRUCTED CS 378 - Network Security and Privacy Spring 2017 FINAL May 3, 2017 DO NOT OPEN UNTIL INSTRUCTED YOUR NAME: Collaboration policy No collaboration is permitted on this exam. Any cheating (e.g., submitting

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

Polymorphic Blending Attacks. Slides by Jelena Mirkovic

Polymorphic Blending Attacks. Slides by Jelena Mirkovic Polymorphic Blending Attacks Slides by Jelena Mirkovic 1 Motivation! Polymorphism is used by malicious code to evade signature-based IDSs Anomaly-based IDSs detect polymorphic attacks because their byte

More information

Cisco Intrusion Prevention Solutions

Cisco Intrusion Prevention Solutions Cisco Intrusion Prevention Solutions Proactive Integrated, Collaborative, and Adaptive Network Protection Cisco Intrusion Prevention System (IPS) solutions accurately identify, classify, and stop malicious

More information

Connection Logging. Introduction to Connection Logging

Connection Logging. Introduction to Connection Logging The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections

More information

CS System Security 2nd-Half Semester Review

CS System Security 2nd-Half Semester Review CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

Connection Logging. About Connection Logging

Connection Logging. About Connection Logging The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: About, page 1 Strategies, page 2 Logging Decryptable Connections with SSL

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

PROVING WHO YOU ARE TLS & THE PKI

PROVING WHO YOU ARE TLS & THE PKI PROVING WHO YOU ARE TLS & THE PKI CMSC 414 MAR 29 2018 RECALL OUR PROBLEM WITH DIFFIE-HELLMAN The two communicating parties thought, but did not confirm, that they were talking to one another. Therefore,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Analyzing Huge Data for Suspicious Traffic. Christian Landström, Airbus DS

Analyzing Huge Data for Suspicious Traffic. Christian Landström, Airbus DS Analyzing Huge Data for Suspicious Traffic Christian Landström, Airbus DS Topics - Overview on security infrastructure - Strategies for network defense - A look at malicious traffic incl. Demos - How Wireshark

More information

How to Configure IPS Policies

How to Configure IPS Policies IPS policies control the behavior of the IPS when an attack is detected. You can define multiple IPS policies and apply them to individual firewall rules as needed. In this article: Default IPS Policy

More information

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate

More information

IPS-1 Robust and accurate intrusion prevention

IPS-1 Robust and accurate intrusion prevention Security Check Point security solutions are the marketleading choice for securing the infrastructure. IPS-1 Robust and accurate intrusion prevention Today s s operate in an environment that is ever changing,

More information

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 12 This chapter describes how to create multiple security policies and apply them to individual virtual sensors. It contains the following sections: Understanding Policies, page 12-1 Anomaly Detection

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

UMSSIA INTRUSION DETECTION

UMSSIA INTRUSION DETECTION UMSSIA INTRUSION DETECTION INTRUSION DETECTION Sensor1 Event1, Event2 Monitor No intrusion M SensorN Event1, Event2 Alarm! IDS CHARACTERISTICS Characteristics an IDS can be classified/evaluated by: Type

More information

Current Trends in Network Intrusion Detection Techniques

Current Trends in Network Intrusion Detection Techniques Current Trends in Network Intrusion Detection Techniques Ritika Lohiya Pranav Varma Yaman patel Dept of CSE, Dept of CSE, Dept of CSE, Nirma University, Nirma University, Nirma University, Ahmedabad. Ahmedabad.

More information

Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier

Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Perform differently in different environments No Free Lunch Theorem Combine

More information

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(4): 43-47 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) A Novel Approach

More information

The Protocols that run the Internet

The Protocols that run the Internet The Protocols that run the Internet Attack types in the Internet Seminarvortrag Sommersemester 2003 Jens Gerken Content Internet Attacks Introduction Network Service Attacks Distributed Denial of Service

More information

Limits of Learning-based Signature Generation with Adversaries

Limits of Learning-based Signature Generation with Adversaries Limits of Learning-based Signature Generation with Adversaries Shobha Venkataraman Carnegie Mellon University shobha@cs.cmu.edu Avrim Blum Carnegie Mellon University avrim@cs.cmu.edu Dawn Song University

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic. White Paper February 2005 McAfee Network Protection Solutions Encrypted Threat Protection Network IPS for SSL Encrypted Traffic Network IPS for SSL Encrypted Traffic 2 Introduction SSL Encryption Overview

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

Survey of Polymorphic Worm Signatures. Mesra, Ranchi, India. Mesra, Ranchi, India. Abstract

Survey of Polymorphic Worm Signatures. Mesra, Ranchi, India. Mesra, Ranchi, India. Abstract , pp.129-150 http://dx.doi.org/10.14257/ijunesst.2014.7.3.12 Survey of Polymorphic Worm Signatures Sounak Paul 1 and Bimal Kumar Mishra 2 1 Dept. of Information Technology, Birla Institute of Technology,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Contents Motivation and basics (Why and what?) IDS types and detection principles Key Data Problems

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Coordinated Threat Control

Coordinated Threat Control Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

(WHASG) Automatic SNORT Signatures Generation by using Honeypot

(WHASG) Automatic SNORT Signatures Generation by using Honeypot 3280 JOURNAL OF COMPUTERS, VOL. 8, NO. 12, DECEMBER 2013 () Automatic Signatures Generation by using Honeypot Hesham Altwaijry and Khalid Shahbar Department of Computer Engineering, College of Computer

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 This chapter describes anomaly detection and its features and how to configure them. It contains the following topics: Understanding Security Policies, page 9-2 Understanding Anomaly Detection,

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

Self-Learning Systems for Network Intrusion Detection

Self-Learning Systems for Network Intrusion Detection Self-Learning Systems for Network Intrusion Detection Konrad Rieck Computer Security Group University of Göttingen GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN About Me» Junior Professor for Computer Security» Research

More information

OSSIM Fast Guide

OSSIM Fast Guide ----------------- OSSIM Fast Guide ----------------- February 8, 2004 Julio Casal http://www.ossim.net WHAT IS OSSIM? In three phrases: - VERIFICATION may be OSSIM s most valuable contribution

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

Forensic Network Analysis in the Time of APTs

Forensic Network Analysis in the Time of APTs SharkFest 16 Forensic Network Analysis in the Time of APTs June 16th 2016 Christian Landström Senior IT Security Consultant Airbus Defence and Space CyberSecurity Topics - Overview on security infrastructure

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown CHAPTER V KDD CUP 99 DATASET With the widespread use of computer networks, the number of attacks has grown extensively, and many new hacking tools and intrusive methods have appeared. Using an intrusion

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Transparent Multi-Factor Authentication June 2015 910 E HAMILTON AVENUE. SUITE 430. CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview...

More information

Defending against Polymorphic Attacks: Recent Results and Open Questions

Defending against Polymorphic Attacks: Recent Results and Open Questions Defending against Polymorphic Attacks: Recent Results and Open Questions mikepo@ics.forth.gr Institute of Computer Science Foundation for Research and Technology Hellas Crete, Greece TERENA Networking

More information

Automated Network Anomaly Detection with Learning and QoS Mitigation. PhD Dissertation Proposal by Dennis Ippoliti

Automated Network Anomaly Detection with Learning and QoS Mitigation. PhD Dissertation Proposal by Dennis Ippoliti Automated Network Anomaly Detection with Learning and QoS Mitigation PhD Dissertation Proposal by Dennis Ippoliti Agenda / Table of contents Automated Network Anomaly Detection with Learning and QoS Mitigation

More information

Cyber Moving Targets. Yashar Dehkan Asl

Cyber Moving Targets. Yashar Dehkan Asl Cyber Moving Targets Yashar Dehkan Asl Introduction An overview of different cyber moving target techniques, their threat models, and their technical details. Cyber moving target technique: Defend a system

More information

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Ondrej Linda, Milos Manic, Miles McQueen Abstract: This paper presents design and simulation of a low cost and low

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

SSL/TLS Vulnerability Detection Using Black Box Approach

SSL/TLS Vulnerability Detection Using Black Box Approach Journal of Physics: Conference Series PAPER OPEN ACCESS SSL/TLS Vulnerability Detection Using Black Box Approach To cite this article: D Gunawan et al 2018 J. Phys.: Conf. Ser. 978 012121 View the article

More information

Network Intrusion Detection with Semantics-Aware Capability

Network Intrusion Detection with Semantics-Aware Capability Network Intrusion Detection with Semantics-Aware Capability Walter Scheirer and Mooi Choo Chuah Lehigh University Dept. of Computer Science and Engineering Bethlehem, PA 18015 USA {wjs3, chuah}@cse.lehigh.edu

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection CSE543 - Computer and Network Security Module: Intrusion Detection Professor Trent Jaeger 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus a successful

More information

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection CSE543 - Computer and Network Security Module: Intrusion Detection Professor Trent Jaeger CMPSC443 - Introduction to Computer and Network Security 1 2 Intrusion An authorized action... that exploits a

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

Evading Network Anomaly Detection Sytems - Fogla,Lee. Divya Muthukumaran

Evading Network Anomaly Detection Sytems - Fogla,Lee. Divya Muthukumaran Evading Network Anomaly Detection Sytems - Fogla,Lee Divya Muthukumaran Intrusion detection Systems Signature Based IDS Monitor packets on the network Compare them against database of signatures/attributes

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

NetDetector The Most Advanced Network Security and Forensics Analysis System

NetDetector The Most Advanced Network Security and Forensics Analysis System Get Real......Real Solutions For Global Networks www.niksun.com NetDetector The Most Advanced Network Security and Forensics Analysis System NIKSUN, Inc. 1100 Cornwall Road Monmouth Junction, NJ 08852

More information

"GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200

GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200 128.111.41.15 "GET /cgi-bin/purchase? itemid=1a6f62e612&cc=mastercard" 200 128.111.43.24 "GET /cgi-bin/purchase?itemid=61d2b836c0&cc=visa" 200 128.111.48.69 "GET /cgi-bin/purchase? itemid=a625f27110&cc=mastercard"

More information

Network Intrusion Detection with Semantics-Aware Capability W. Scheirer, M. Chuah {wjs3, Department of Computer Science and

Network Intrusion Detection with Semantics-Aware Capability W. Scheirer, M. Chuah {wjs3, Department of Computer Science and Network Intrusion Detection with Semantics-Aware Capability W. Scheirer, M. Chuah {wjs, chuah}@cse.lehigh.edu Department of Computer Science and Engineering Lehigh University Abstract Malicious network

More information

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Copyright 2018 Tech Science Press CMC, vol.57, no.2, pp.297-306, 2018 Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Chak Fong Cheang 1, *, Yiqin Wang 1, Zhiping Cai 2 and

More information

PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms

PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms Sounak Paul and Bimal Kumar Mishra Dept. of Information Technology, Birla Institute of Technology, Mesra, Ranchi, India Dept. of

More information

Help Your Security Team Sleep at Night

Help Your Security Team Sleep at Night White Paper Help Your Security Team Sleep at Night Chief Information Security Officers (CSOs) and their information security teams are paid to be suspicious of everything and everyone who might just might

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 9 Caution Anomaly detection assumes it gets traffic from both directions. If the sensor is configured to see only one direction of traffic, you should turn off anomaly detection. Otherwise, when

More information

A Modular Approach for Implementation of Honeypots in Cyber Security

A Modular Approach for Implementation of Honeypots in Cyber Security A Modular Approach for Implementation of Honeypots in Cyber Security Muneeb Mirza 1, Muhammad Usman 1, Robert P. Biuk-Aghai 2, Simon Fong 2 1 Department of Computing, SZABIST-Islamabad, Pakistan 2 Department

More information

Symantec Ransomware Protection

Symantec Ransomware Protection Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway

More information