An attack-norm separation approach for detecting cyber attacks

Size: px
Start display at page:

Download "An attack-norm separation approach for detecting cyber attacks"

Transcription

1 Inf Syst Front (2006) 8: DOI /s y An attack-norm separation approach for detecting cyber attacks Nong Ye Toni Farley Deepak Lakshminarasimhan Received: 28 July 2004 / Revised: 22 February 2006 / Accepted: 5 April 2006 C Science + Business Media, LLC 2006 Abstract The two existing approaches to detecting cyber attacks on computers and networks, signature recognition and anomaly detection, have shortcomings related to the accuracy and efficiency of detection. This paper describes a new approach to cyber attack (intrusion) detection that aims to overcome these shortcomings through several innovations. We call our approach attack-norm separation. The attacknorm separation approach engages in the scientific discovery of data, features and characteristics for cyber signal (attack data) and noise (normal data). We use attack profiling and analytical discovery techniques to generalize the data, features and characteristics that exist in cyber attack and norm data. We also leverage well-established signal detection models in the physical space (e.g., radar signal detection), and verify them in the cyberspace. With this foundation of information, we build attack-norm separation models that incorporate both attack and norm characteristics. This enables us to take the least amount of relevant data necessary to achieve detection accuracy and efficiency. The attack-norm separation approach considers not only activity data, but also state and performance data along the cause-effect chains of cyber attacks on computers and networks. This enables us to achieve some detection adequacy lacking in existing intrusion detection systems. N. Ye ( ). T. Farley. D. Lakshminarasimhan Arizona State University, Tempe, Arizona, USA nongye@asu.edu T. Farley toni@asu.edu D. Lakshminarasimhan deepakee@asu.edu Keywords Cyber attacks. Intrusion detection. Computer and network security. Signal processing. Signal detection Introduction Cyber attacks on computers and networks have presented a considerable threat to our information infrastructure, as well as business transactions (e.g., e-commerce and online banking), mission-critical operations (e.g., supervisory control of power supply networks), and many other activities that rely on this infrastructure. An insider or outsider of a computer or network system may launch an attack. An insider has authorized access to the system but may abuse that access right to perform illegitimate activities. An outsider does not have direct access to the system. An attack may target a computer (host) based asset (e.g., a data file) or a network based asset (e.g., a port for network service), resulting in a host or network based attack. There are many attack methods (password guessing, bandwidth flooding, buffer overflow, etc.) used to accomplish different goals (denying service, gaining access, stealing, corrupting or deleting data, etc.). A sophisticated attack may go through several phases (Skoudis, 2002): reconnaissance, scanning, gaining access, maintaining access, further attacking, and covering tracks. Each phase involves different methods and different goals. Furthermore, not all attacks include every phase, and an attack may go through the phases in a different order from that listed above. In the reconnaissance phase, an attacker investigates a target system, usually through publicly available information sources, to obtain information that is useful in later phases of the attack. For example, a web site may reveal the name of a network domain that an attacker can use to obtain the IP address of the network from information available on a Domain Name Server. In the scanning phase, an attacker

2 164 Inf Syst Front (2006) 8: attempts to map the topology of a system, find potential entry points (e.g., server), and discover vulnerabilities (e.g., buffer overflow vulnerability) that can be exploited in later intrusion phases using information (e.g., IP address) obtained during reconnaissance. Scanning usually requires direct interaction with a system. For example, an attacker can use the traceroute tool for network mapping to discover active host computers and the topology of a target network. A system prompt, in response to a request for a network service running on an active host, may reveal the type of the operating system running on the host. An attacker can then exploit a vulnerability of this particular operating system in later phases of an attack. In the gaining access phase, an attacker attempts to penetrate a system by exploiting a previously discovered vulnerability. Vulnerabilities render a system susceptible to attacks, such as password guessing, buffer overflow, web attacks, worms and viruses. In the maintaining access phase, an attacker attempts to establish easy, safe access to a target system in order to return later without going through the initial complicated, risky process of gaining access. Methods to maintain access include creating a new user account or backdoor running a network service. In the further attacking phase, an attacker may take subsequent attack actions to expand the impact and/or scope of an attack. An example of a further attack is using a victim host to propagate a virus or worm to other computers. In the covering tracks phase, an attacker may alter audit or log files to remove any activities that may be indicative of an attack, or otherwise implicate the attacker. There exists a variety of defense mechanisms to protect computers and networks from attacks. These mechanisms generally serve one of three purposes: prevention, detection, or reaction. Prevention mechanisms, such as firewalls, cryptography, and authorization, authentication and identification for access and flow control, usually control or limit access to a system. Prevention raises the difficulty level in launching attacks, but cannot completely block attacks from especially determined, organized, skilled attackers due to many unknown vulnerabilities on computers and networks. Detection mechanisms monitor activities on computers or networks to identify the intrusive activities of an ongoing attack. Reaction mechanisms control the further spreading of an attack and its impact, then trace and diagnose the attack to determine its path, cause, and consequences, and finally take actions to recover systems and correct problems along the cause-effect path. This paper focuses on detection mechanisms, and presents a new approach to attack or intrusion detection. This approach involves building separate attack and norm models to filter out normal noise from mixed data and then identify a cyber attack in the filtered data. We first describe two existing approaches to intrusion detection: signature recognition and anomaly detection. We then present a new approach, called attack-norm separation, and compare it with the two existing approaches. We discuss the research work necessary to enable the attack-norm separation approach for intrusion detection, and provide some preliminary results to illustration the concept. Finally, we look at some related work and conclude the paper. Signature recognition Most commercial intrusion detection systems, including antivirus software, employ signature recognition to detect cyber attacks. In this approach, signature patterns of attacks are either manually captured by expert analysts or automatically discovered through mining computer and network activity data collected under attack and normal operating conditions (Ye, 2003; Proctor, 2001). Attack signatures are stored and used in an intrusion detection system to check against activities and files on computers or networks for the presence of a signature. If present, the system detects an attack. For example, three consecutive login failures may be stored and used as the signature of a password guessing attack. Thus, a detection solution monitors the number of consecutive login failures, and compares it with the signature to detect this attack. Since the signature patterns of novel attacks are often unknown, signature recognition is not effective against them. Anomaly detection Anomaly detection considers any large deviation from normal system behavior as an indication of a possible attack (Proctor, 2001; Ye et al., 2001). Thus, it requires an established model of normal system behavior (norm profile), to monitor activities on computers and networks and measure deviations from the norm. A large deviation indicates a possible attack. We can establish a norm profile according to the system norm by design, or by learning from data of system behavior collected under normal operating conditions. For example, we can construct a norm profile for a web server by considering sequences of user actions that represent expected user-web server interactions. A sequence that differs from this expected sequence indicates a possible attack. In another example, we use an Exponentially Weighted Moving Average (EWMA) control chart to learn the statistical distribution of event intensity as the norm profile (Ye and Chen, 2003). At any given time, event intensity exceeding a threshold, determined from the statistical distribution properties in the norm profile, indicates a possible attack. Various norm profile modeling techniques have been investigated, including strings representing sequences of system calls, Statistical Process Control (SPC) charts, Markov chain models, data clusters, association rules and artificial neural networks (Proctor, 2001; Ye et al., 2001).

3 Inf Syst Front (2006) 8: An anomaly detection technique can detect a novel attack if it shows a large deviation from its norm profile. However, a novel attack may not deviate largely from the norm profile, yielding a miss or detection failure. The modeling technique used in an anomaly detection solution may not be powerful enough to cover all kinds of normal system behavior, especially that which is normal, but irregular. When such behavior occurs, the solution erroneously indicates a possible attack, yielding a false alarm. Too many false alarms burden system administrators, who must investigate them, rendering the anomaly detection approach impractical to some extent. Hence, in spite of its advantage in possibly detecting novel attacks, anomaly detection has not become popular in commercial intrusion detection systems. Shortcomings of existing intrusion detection systems Existing intrusion detection systems in the form of either commercial software or research prototypes mostly use network traffic data (data packets traveling on networks) to monitor activities on networks and audit/log data to monitor activities on computers. Tools such as Tcpdump and Windump are typically used to capture network traffic data. Various operating systems, such as Windows and Linux, usually come with their own auditing and logging facilities to capture system, user and application events on computers. Since attacks may occur in an intermittent manner, skipping any data packet on a network or any event on a computer presents the risk of missing a critical step of an attack. On the other hand, the continuous monitoring of all network data packets and computer events requires processing large amounts of data. Moreover, network traffic data and computer audit/log data contain a lot of irrelevant information to cyber attack detection. For example, a network data packet consists of a header and data portion. The header has numerous data fields, including the source IP address, destination IP address, the source port, the destination port, and so on. These data fields are originally designed for the purpose of controlling and coordinating data transmission on networks, rather than cyber attack detection. Handling large amounts of data with much irrelevant information presents a considerable challenge to the detection efficiency of all existing intrusion detection systems. This problem will only become worse with the increasing speed of computing on hosts and data transmission on networks. Hence, current solutions are inefficient in that they require large amounts of sometimes irrelevant activity data to be monitored. Not only does the anomaly detection approach suffer from false alarms and misses as discussed previously, the signature recognition approach faces a similar problem of detection accuracy. Human experts often extract attack signatures without the clear knowledge or explicit contract to normal behavior false alarms Attack-Norm Separation Signature Recognition Anomaly Detection Attack models (signature or attack profile) Norm models (norm profile) Deviation from norm profile True normal space Fig. 1 3 approaches to cyber attack detection: attack norm separation, signature recognition and anomaly detection patterns. For example, a security analyst may examine a virus code and extract a signature of the virus without an accurate model of normal program code that provides the definite knowledge of whether or not such a signature also appears in normal program code on a computer. Then there is a possibility that this signature will later produce false alarms as shown in Fig. 1. In Fig. 1, an attack signature identified without knowledge of the true normal space actually falls in this space, producing a false alarm. Hence, signature recognition can produce false alarms in addition to misses of novel attacks. When data mining techniques (e.g., artificial neural networks) are used to automatically extract attack signature patterns, both attack data and normal data are often required to learn attack signature patterns that identify attack data but not normal data. Although the contrast of attack signature patterns to normal behavior patterns is employed in those data mining techniques to identify attack signature patterns, only attack signature patterns are captured and later used for signature recognition. Normal data are used in data mining only for the purpose of identifying attack signature patterns that exist in attack data but not in normal data. If a normal model for an anomaly detection technique has only the power to express a regular norm profile, and fails to cover the irregular true normal space accurately, some deviation from the normal model actually falls in the true normal space, producing a false alarm as shown in Fig. 1. Essentially, both approaches employ data analysis combined with a model of system behavior to detect attacks. The two approaches differ in their underlying models. Signature recognition uses a model of bad system behavior under the attack condition, whereas anomaly detection uses a model of good system behavior under the normal operation condition. Attacks on computers and networks are detected when the observed behavior either correlates with known attack profiles or diverges from known normal profiles. Neither of the two approaches requires and enforces the use of both

4 166 Inf Syst Front (2006) 8: attack and normal behavior models in contrast to achieve detection accuracy. Without using both attack and norm profiles in a cyber attack detection model, both approaches are susceptible to the inaccuracy of using attack and norm models alone with mixed data, which includes both attack and normal activities. Note that when an attack occurs on computers and networks, there often are normal activities going on computers and networks at the same time. Hence, the data contains a mixture of both attack and normal activities. Normal data from normal activities may obscure attack signatures to recognize in the mixed data for signature recognition, resulting in the detection inaccuracy. Attack data from attack activities may obscure normal models from which large deviations need to be determined for anomaly detection, resulting in the detection inaccuracy. Hence, the two existing approaches of signature recognition and anomaly detection rely on inadequate modeling solutions to handling the mixed data of both attack and normal activities for attack detection, and thus are inaccurate with the potential consequence of many false alarms and/or misses. Furthermore, existing signature recognition and anomaly detection techniques are mostly developed empirically, using only test results from limited cases, rather than based on scientific knowledge of attack and normal data. We have little confidence in the accuracy of attack or normal models employed with those techniques, and thus little confidence in their detection performance, especially in a realistic environment. In fact, there exists little scientific knowledge of attack and normal data in the field of cyber attack detection, despite many existing intrusion detection techniques developed and tested empirically. Another shortcoming of current solutions to cyber attack detection is in their reliance on only activity data on computers and networks. Network traffic data and computer audit/log data capture only activities on computers and networks and not state and performance data. Computers and networks have a collection of resources (e.g., CPU as a hardware resource, database as a host-based software resource, and a web server as a network-based software resource) that provide services to processes representing users requests. Those resources have their own state of availability, integrity, and confidentiality that in turn affects the performance of processes in regards to timeliness, accuracy, and precision (Ye, 2002). The execution of a user s process (an activity, which includes attackers activities) on a resource changes the state of that resource, which in turn impacts the performance of the process. This state and performance change may propagate to other resources and processes (e.g., processes sharing the same resources). Hence, an activity actually starts a causeeffect propagation chain or network. Monitoring only activity data, and not state and performance data, fails to cover the entire cause-effect chain of an attack, and gives up the benefit of correlating elements on the chain for more accurate detection. For example, in a UDP storm attack, an attacker attacks two host computers, host A and host B, by sending out a spoofed packet to the echo port of host A that appears to come from the echo port of host B. When host A receives the packet, host A responds with an echo-reply to the echo port of host B. Host B perceives the packet from host A as an echo-request, and sends out an echo-reply to host A. Host A then replies to host B, and this cycle continues until one of the echo services is shut down. The detection of a single packet the initial echo request packet to host A is not sufficient to identify this attack. However, correlating this echo request packet with the later echo packets and the continuous decrease in network bandwidth (state data) and performance of other network processes (performance data) allows the accurate detection of this attack. Attack-norm separation a new approach to intrusion detection Consider attack data as a signal to detect and normal use data as noise mixed with the signal in cyberspace. Then, there is a mapping between cyber attack detection and signal detection in the physical space (e.g.) radar and sound signal detection). Unlike existing techniques for cyber attack detection that rely on the model of only one element (signal or noise) in the monitored data, existing techniques for signal detection in the physical space often employ models that incorporate characteristics of both signal and noise, that is, all elements that exist and are mixed together in the monitored data (Bailey et al., 1998; Box and Luceno, 1997; Atlas and Duhamel, 1999; Jain et al. 2000; Botella et al., 2003). For example, in the cuscore model for detecting a sine wave signal buried in random noise that fluctuates around the level of T, the following noise and signal models are considered (Box and Luceno, 1997): Noise model : y t = T + a t0 (1) Signal model : y t = T + δ sin x t + a t (2) where a t0 and a t are Gaussian white noise. The cuscore is Box and Luceno (1997): Q = r t = ta t 0 t = t (y t T ) δ sin x t δ (y t T ) (a t0 a t ) δ = t (y t T ) sin x t. (3) This cuscore model is sensitive to detecting a sine wave signal buried in random noise. Box and Luceno provide other cuscore models that are constructed to detect: a step change

5 Inf Syst Front (2006) 8: signal, a slope change and single spike signal buried in the random noise of Eq. (1), and parameter change signals with the noise of a first-order autoregressive time series model or the nonstationary disturbance noise of an Integrated Moving Average (IMA) time series model (Box and Luceno, 1997). Many signal detection techniques in the physical space, including low-pass and high-pass filters, use frequency bands to characterize and differentiate signal and noise to perform signal filtering or detection accordingly (Atlas and Duhamel, 1999). A signal detection model, incorporating characteristics of both signal and noise mixed together in monitored data, can more accurately detect a signal in noise than a model relying on only one element, and is more sensitive to low signal-tonoise ratios (where the signal is buried in a lot of noise) (Box and Luceno, 1997). A low signal-to-noise ratio is often the case in cyber attack detection since there are usually many more normal users than attackers on computer and network systems when an attack occurs. Hence, we propose a new approach called attack-norm separation to bring the accuracy of cyber attack detection to that of signal detection in the physical space. This approach allows us to leverage the extensive work of well-established theories and technologies for signal detection in many disciplines, such as electrical engineering, physics and geology, to build attack-norm separation models. Equations (1) (3) provide an example of the cuscore signal detection model from the physical space. The attack-norm separation approach consists of the following three steps in order to detect an attack: (1) Define the model of cyber attack and the norm model (2) Filter out normal noise from mixed data using the norm model (3) Identify the cyber attack signal in the remaining data using the attack model. For example, in the cuscore model Eqs. (1) and (2) carry out Step 1 of the attack-norm separation approach by defining the attack and norm models. The signal model indicates that the sine signal is added to the noise. Hence, it is an additive signal model. Note that not all signals are additive. Some signals may distort the noise in other ways than simply adding a signal to the noise. Steps 2 and 3 of the attack-norm separation are embedded in Eq. (3) with (y t T ) filtering out the noise of T from the mixed data of y t through subtraction and the multiplication of the remaining data, (y t T ), to the signal pattern of sin x t. The multiplication has a resonant effect to produce a large positive value if the sine signal pattern of sin x t is present in the remaining data of (y t T ). Hence, the cuscore model uses the resonance method through multiplication to identify the signal in the data after filtering out the noise. Note that different methods of noise filtering and different methods of signal identification can also be used from those in the cuscore model. Figure 1 illustrates how attack-norm separation differs from signature recognition and anomaly detection. Each attack-norm separation model provides the detection of a given cyber attack signal in a given norm environment. We can construct a collection of models, which cover different attack signals and their norm environments in contrast. Unlike current solutions, which monitor only activity data, the attack-norm separation approach in Fig. 1 considers the true normal space, and attack signals from that space, to include activity, state and performance data, thus providing adequate coverage of the cause-effect propagation data space associated with attacks and normal user activities. Each attacknorm separation model calls for the monitoring and processing of only a small amount of specific data to provide certain characteristics. Therefore, each model is efficient, accurate, and adequate in detecting a given attack in normal noise. This approach can raise the level of detection accuracy, reduce the amount of monitored data, improve the relevance of monitored data to intrusion detection, and allow for easy protection of a small amount of specific data. Therefore, attack-norm separation may overcome accuracy and efficiency shortcomings of signature recognition and anomaly detection. Both attack-norm separation and signature recognition can detect known attacks, and since attack-norm separation allows for more accurate results, it can replace signature recognition. However, attack-norm separation cannot completely replace anomaly detection because it requires known characteristics of attack and norm and cannot detect novel attacks. However, caution should be taken when the anomaly detection approach is employed due to its shortcomings in detection accuracy, and its outcomes should be used for advisory purpose only, not for the definite detection of an attack. We expect that attack coverage of the attack-norm separation approach will expand with increasing knowledge of cyber attack and norm characteristics, just as signal detection knowledge and technologies in the physical world evolved. Ultimately, our scientific knowledge of cyber characteristics will grow to a sufficient level to replace anomaly detection as well. A comprehensive knowledge of cyber characteristics will establish a solid, scientific foundation of cyber attack detection, overcoming the shortcomings of empirical techniques. This leads to the emergence of science and engineering in cyber attack detection, providing confidence in detection accuracy, efficiency and adequacy, thus paving the way for practical applicability. Attack-norm data, features, characteristics and detection models A model for the attack-norm separation approach requires a clear, scientific understanding of cyber attack and norm data. Since most existing work on intrusion detection is

6 168 Inf Syst Front (2006) 8: Raw Data Data Processing Processed Data Decision Signal Detection Model (Characteristics of signal and noise in the model) Feature Extraction Feature Fig. 2 Data, features, characteristics, and signal detection models in the signal-noise separation approach empirical in nature, we currently have little scientific knowledge of attack and norm characteristics, and thus are not yet able to leverage well-established theories and technologies for physical signal detection to build attack-norm separation models. Hence, we must obtain the scientific understanding of these characteristics to enable our approach. A characteristic is defined as a feature of a data variable. Consider a Denial of Service (DoS) attack that sends large amounts of network packets with service requests to a web server port on a computer. The network data variable is the ratio of packet intensity (i.e., the number of packets received) for the web server port to the packet intensity for all network service ports. The feature of this data variable is the sample average (i.e., the average or mean value in a 5-s sample). The characteristic defined on this feature is step change (e.g., an increase of a certain amount). Thus, this DoS attack is characterized and modeled by a step change (characteristic) of the sample average (feature) of the intensity ratio (data variable), from that observed under normal operating conditions. Attack and norm in this example are distinguished by a difference between levels (high for attack, normal for norm) of the sample average (feature extracted in both attack and norm conditions) of the intensity ratio, (data variable obtained from network traffic data in both conditions). In this example, a cuscore model for detecting a step change can be used as the attack-norm separation model. Therefore, three elements need to be defined for a cyber attack in a given norm environment to build an attack-norm separation model: data, features, and characteristics. Figure 2 illustrates these three elements along with an attack-norm separation model. In Fig. 2, raw data (e.g., network traffic data) collected from computers and networks go through data processing to obtain the desired data (e.g., the intensity ratio of packets for the web server to all packets) from which the feature is extracted using a feature extraction method (e.g., an arithmetic calculation of the sample average). The attacknorm separation model incorporates both attack and norm characteristics and monitors the feature to detect the attack characteristic mixed with normal noise. Table 1 illustrates an example of these three elements and associated signal detection models in physical space for the radar detection of a hostile object in the air, and in cyberspace for the detection of the DoS attack in the above example. Data must be relevant to attack-norm separation, and may include data variables representing the activities, performance, and state of computers and networks. A feature is a measure from an individual data observation or multiple data observations. Features may address mathematical, statistical, spatial, temporal, or causal properties of data observation(s) (e.g., such statistics as mean, variance, correlation, autocorrelation, transition probability, and others). A characteristic is an aspect of a given feature that enables the distinction of cyber signal from cyber noise. Characteristics may be shift (e.g., step change), intermittent spike or bump, drift (i.e., upward and downward), trend (e.g., slope, sinewave, square-wave, cyclic, and seasonal change), etc. Research methodologies for attack-norm separation Although we can leverage well-established signal detection models in the physical space, we must carry out research work to investigate and obtain the scientific understanding of data, features, and characteristics of various kinds of attack and norm conditions in cyberspace. If the uncovered cyber attack and norm characteristics differ from those characteristics that exist in the physical space, it is also necessary to develop additional attack-norm separation models to cope with them. For example, in the physical space signal detection models usually assume Gaussian white noise due to the central limit effect and the cumulative effect of multiple environmental factors on noise (Box and Luceno, 1997). However, normal use activities on computers and networks, which contribute to noise in the cyberspace, are less random in nature than environmental noise in the physical space. Gaussian white noise Table 1 Example of data, features, characteristics, and signal detection model in the physical and attack-norm separation model in the cyberspaces Element Physical space Cyberspace Data Radar image data Packet intensity ratio Feature Shape and size of an object Sample average (mean) Characteristic Shape is square and size is large Step change Signal detection and attack-norm Separation models A rule-based model: if shape is square and size is large, then signal Cuscore model for step change

7 Inf Syst Front (2006) 8: Data Mining Attack Profiling Data Feature Characteristic Sensor Model Focused Verification of features and characteristics from the physical space Fig. 3 The elements and research work to enable the Attach-Norm Separation approach State 0: Attacker probes victim for FTP service. State 1: FTP server requiring password authentication running on victim Activity 1: Attacker initiates dictionary attack program has a normal probability distribution. However, preliminary observations from our initial investigations reveal that more data variables in the cyberspace follow skewed, uniform, or bimodal probability distributions. We present some of these early findings later in this paper. Note that there are signal detection models in the physical space to deal with colored noise, such as those in Box and Luceno (1997). To obtain the scientific understanding of cyberspace data, features, and characteristics, we are currently employing three research methodologies in parallel (see Fig. 3): attack profiling, data mining, and focused verification between cyberspace and signal detection models that exist in the physical space. The three methodologies are briefly described below. Detailed research work in these methodologies is presented in our other reports (Ye, Bashettihalli and Farley (in review); Johnson and Wichern, 1998; Ye, Napatkamon and Farley (in review)). The purpose of this paper is to introduce the attacknorm separation approach and call for research work in this area from the scientific community. For attack profiling, we let expert security analysts identify the steps involved in the setup and execution of an attack (the attack s cause-effect chain of activity, state and performance changes) and probe each step for the data variables, features, and characteristics, and their correlation among the steps, which enable the detection of the attack. The outcomes of attack profiling are profiles for various known attacks, represented in cause-effect chains or networks. Each node of the chain includes the data, features, and characteristics to detect that aspect of the attack. Figure 4 illustrates the attack profile for the Dictionary attack in which the attacker uses words in a dictionary to conduct brute-force password guessing for a user account (Ye, Bashettihalli and Farley (in review)). We then generalize the data, features, and characteristics from all the attack profiles to construct an efficient, accurate, and adequate set of these elements for cyber attack detection. Hence, the methodology of attack profiling uses the expert knowledge of known attacks for manual analysis to uncover the data, features, and characteristics of cyber signal and noise. For data mining, we collect activity, state and performance data on computers and networks under various attacks, and normal use conditions. Table 2 describes the data that we Activity 2: Program attempts to authenticate using next entry in the dictionary database. Success State 3: Confidentiality of the application /file system compromised. Activity 4: Abnormal use of application by attacker Failure Observation D: Successive attempts to login use same username Fig. 4 The attack profile for a dictionary attack Observation A: Multiple login attempt failures Observation B: Subsequent password attempts follow dictionary pattern Observation C: Time between successive login attempts follows pattern collect using the Microsoft Windows operating system (OS) before, during, and after an attack. We then use various data analysis and mining techniques to uncover the data, features, and characteristics that enable the distinction of cyber attack and norm data. For example, we apply statistical analysis to data variables to obtain basic statistics (e.g., mean, variance, minimum and maximum for numerical variables, and range and frequency for categorical variables), examine randomness through run tests, create time-series plots, perform tests of variable correlation (e.g., Pearson correlation coefficients and Spearman, Kendal tow, and Gamma tests for non-parametric correlation coefficients) and autocorrelation, determine the probability distribution (e.g., histogram, skewness test, kurtosis test and KS test), and so on (Ye, Jearkpaporn and Lakshminarasimhan (in review)). We also perform tests for the difference in mean between cyber attack and norm conditions (i.e. t-test, Manwhitney test, KS two samples, Wards Wolf run test and exact test) and tests for selection of sensitive variables (e.g., decision trees such as C&RT). For example, Fig. 5 shows a skew distribution that we commonly find in our data (Johnson and Wichern, 1998).

8 170 Inf Syst Front (2006) 8: Table 2 Data collection for data mining Data collected Collection location Tool used OS performance counters (performance objects, each of which has several counters) Host Computer Performance monitor utility in Windows OS Windows event logs (security, system and application logs) Host computer Event monitor utility in Windows OS Network packet data (first 256 bytes of each packet on the network, which covers header and beginning of data) Network Windump utility For focused verification in the cyberspace of features, characteristics and signal detection models from the physical space, we first conduct a literature review with the objective of surveying and classifying existing examples in the physical space. Our literature review includes literatures published in the years 1995 to We find 173 papers from the theoretical fields of cuscore statistics, wavelets transform, time series analysis, signal processing and detection, and the application fields of digital signal detection, quality and process control in production and manufacturing, earth and planetary science (e.g., earthquake detection), biomedical science (e.g., cancer detection), and economics (e.g., stock market analysis) (Ye, Napatkamon and Farley, (in review)). From each paper, we extract the data, features, characteristics and signal detection model discussed in the paper. For example, Fig. 6 shows these elements that we extract from Bailey et al. (1998): Goal: Data: Features: Characteristics: Sensor Model: Detect dolphin sound Underground water data Energy in the raw sound Sum of squares of selected wavelet coefficients Step change in energy If step change occurs, then flag We then generalize the data, features, characteristics and signal detection models from all papers surveyed. We check this information against cyber attack and norm data and use the feature extraction methods, and signal detection models, originally employed in the surveyed papers to examine if those features and characteristics also exist in cyberspace. Method demonstration To illustrate the attack-norm separation method, we choose one attack, Ettercap, and one user activity, web browsing. Ettercap is an address resolution protocol (ARP) poison attack ( The attack begins by sending out a series of ARP requests to every internet protocol (IP) address on the current subnet to determine which computers are currently on the network. Then, the attacker sends out spoofed ARP replies to a victim. These routing updates contain IP addresses of computers on the network with the attacker s physical computer (MAC) address. Once the victim computer updates its ARP table with the erroneous data, network traffic sent by all computers within the victim network goes through the attacker s machine. Attack profiling leads to the Ettercap attack profile in Fig. 7. For web browsing, a user opens Internet Explorer and performs a pre-defined web search on For both the attack and user activity, we collect data from the activity alone as well as idle machine time. To collect the data for these activities, we perform the activity (attack or web browsing) and collect data from Windows logging facilities for 10 minutes before, and during the activity. This gives us Fig. 5 The skew distribution found from our histogram investigation in data mining.

9 Inf Syst Front (2006) 8: Fig. 6 Data, feature, characteristic and signal detection model for detecting dolphin sound Raw Data = Underground water data Feature Extraction = Discrete Wavelet Transform (DWT) Features = Sum squares of selected wavelets coefficients Detection Model = Recursive joint distribution kernel estimate of sum squares of selected wavelet coefficients Decision: Any outliers from the kernel estimate is flag as the signal the data to build the attack and norm models. For testing purposes, we make a third run with both the attack and user activity occurring at the same time. Then, we can test our models, made with pure data, against the mixed data. We look at performance objects, which include a number of activity, state and performance variables. Examples of each are Activity Network Interface packets/s indicates the number of packets sent and received through the network interface card State Memory\Available bytes measures the amount of memory space available Fig. 7 Attack profile for an Ettercap attack

10 172 Inf Syst Front (2006) 8: Fig. 8 Wavelet transforms considered in study Performance Process ( Total)\Page Faults/s a page fault occurs when a thread refers to a virtual memory page that is not in its working set in main memory. For the focused verification methodology, we employ a method commonly used in physical signal detection to build an attack-norm separation, signal detection model for the Ettercap attack. The method we choose for this study is time-frequency analysis using wavelet transform. Given the time-series data for a variable (signal), distinguishing information may be hidden in its frequency content. Wavelet transforms allow us to view frequencies in time series data, signal strength (energy) in different frequencies at different times, and find the correlation between the data pattern and the unknown signal to approximate the wavelet pattern (Lakshminarasimhan, 2005). Selection of the best wavelet transform varies by data pattern. Our preliminary analysis reveals five dominant data patterns: spike, random fluctuation, step change, steady change and sine-cosine wave embedded in noise (Lakshminarasimhan, 2005). For the Ettercap attack, we collect 306 variables with a pattern distribution of 51.2% spike, 36.4% random fluctuation, 6.3% step change, 3.2% steady change and 2.9% sin-cosine with noise. Based on these observations, we consider the five wavelet transforms shown in Fig. 8, where data patterns are respectively approximated by the transforms: Paul for spike, Derivative of Gaussian (DoG) for random fluctuation (Guassian noise), Haar for step change, Daubechies for steady change, and Morlet for noise embedded sine-cosine. For a complete definition of these wavelets see Lakshminarasimhan (2005). For each data variable, wavelet, and frequency band, we extract the signal strength feature. We then use analysis of Variance (ANOVA) and the Tukey comparison test to compare different signal strength values at low (L), medium (M) and high (H) frequency bands between idle and attack, and idle and normal user activity conditions. From these results, we discover the frequency bands where there is the significant difference in signal strength between the two conditions and whether the difference is increasing or decreasing between idle and attack/norm. Tables 3 and 4 show select variables from our ANOVA results for Ettercap and web browsing respectively (Lakshminarasimhan, 2005). Each cell shows the significant changes for each frequency for one variable (row) and wavelet (column), where none signifies no significant change in any frequency. From the characteristics in Table 3, we choose three, which do not appear in Table 4, to uniquely represent Ettercap attack characteristics. These characteristics, shown in the table embedded in Fig. 8 and described in detail in (Lakshminarasimhan, 2005), enable us to distinguish between attack and norm data. This analysis forms the basis for building a sensor model to detect a specific attack characteristic in a given norm environment. Armed with the information gathered thus far, we can build three sensor models to detect three distinguishing characteristics of the Ettercap attack in a web browsing environment. Thus we ve completed the first step in attack-norm separation: building attack and norm models. We test our sensors on the mixed data we collected earlier, using the Cuscore statistic described previously to detect attack signals in the presence of norm data. For the second step in our approach, we cancel out normal noise in the cuscore

11 Inf Syst Front (2006) 8: Table 3 ANOVA results for the Ettercap attack Variable DoG Paul Morlet Haar Daubechies (1) Cache\Data Maps/s H(+), M( ), L(+) H(+), L(+) L(+) None None (2) Cache\Sync Data Maps/s H(+), M( ), L(+) H(+), L(+) L(+) None None (3) Cache\Data Map Pins/s H(+), M( ), L(+) H(+), L(+) L(+) None None (4) Cache\Pin Reads/s H(+), L(+) H(+), M(+), L(+) L(+), M(+) None None (5) Cache\Sync Pin Reads/s H(+), L(+) H(+), M(+), L(+) L(+), M(+) None None Table 4 ANOVA results for web browsing Variable DoG Paul Morlet Haar Daubechies (1) Cache\Data Maps/s H( ), L( ) H( ), L( ) L( ) None None (2) Cache\Sync Data Maps/s H( ), L( ) H( ), L( ) L( ) None None (3) Cache\Data Map Pins/s M(+) M(+) M(+) None H(+) (4) Cache\Pin Reads/s H( ), M(+), L( ) H( ), M(+), L( ) M(+), L( ) None L( ) (5) Cache\Sync Pin Reads/s H( ), M(+), L( ) H( ), M(+), L( ) M(+), L( ) None L( ) model by subtracting the norm model from our testing data as shown in Eq. (4). Q = n [y t f (t)]g(t) (4) t=1 where f(t) is the norm model, g(t) is the attack model, and y t is an observation of the test data at time t. Equation (4) also shows the final step of detecting the attack characteristic in the residual data by multiplying the two. A significant slope change in a plot of cuscore values reveals the presence of an attack signal. We use the slope prior to the attack as a threshold, so whenever the cuscore value for an observation exceeds this value, we trigger an alert. Figures 9 11 show the cuscore plots for our three variables under the Ettercap attack + web browsing scenario. For each plot, the first 300 observation are under web browsing only, with the actual attack (mixed data) beginning at observation 301. The observation in which our attack model detects the attack characteristic is also given on the cuscore plot. We can see from these results the effectiveness of our models in quickly and accurately detecting this characteristic attack signals. Preliminary findings support attack-norm separation Discoveries in our current work have also revealed the importance of our attack-norm separation approach for early and accurate attack identification. For example, although some variables show a significant change in probability distribution (e.g., from a skew distribution to a uniform distribution) from the norm to attack condition (with no user activity), Fig. 9 Cuscore plot for Network Interface/Packets/s

12 174 Inf Syst Front (2006) 8: Fig. 10 Cuscore plot for Process ( Total)\IO Write Bytes/s this change may be weakened when normal user activities are added in both conditions. This means that the presence of noisy norm data in the attack data weakens the characteristic change of the probability distribution, thereby making it much more difficult to detect. This demonstrates the importance of first filtering out the norm data effect for a better attack-norm data ratio, or improved data quality, before performing attack identification. Our attack-norm separation approach does this filtering, in contrast to signature recognition and anomaly detection, which do not take the step of denoising or noise removal. Figure 12 plots the values of a data variable first in the norm condition of a text editing activity and second in the condition of an ARP Poison attack mixed with the same text editing activity. We can see that this data variable is more active with a few spikes in the norm condition than in the attack condition. Using the signature recognition approach, we trained an artificial neural network (ANN) to learn attack signatures from such data (Ye, 2003). ANN performed poorly in detecting this attack since the attack data consists of small values (low values in the figure) which are also commonly found in the norm data. Thus, ANN could not distinguish between attack and norm. Using the anomaly detection approach, we applied the Exponentially Weighted Moving Average (EWMA) technique, which learns a statistical norm profile from the norm data and sets the threshold value for signaling an attack (Ye and Chen, 2003). The spikes in the norm data produce a large variance that does not exist in the attack data, resulting in a relatively large threshold value. Since the attack data fell below this threshold, EWMA could not detect the attack. In other words, the anomaly detection approach works when attack data is more volatile or has a more significant characteristic than norm data, whereas the data in Fig. 12 is less volatile Fig. 11 Cuscore plot for Process ( Total)\Page Faults/s

13 Inf Syst Front (2006) 8: Fig. 12 Variable observations under the normal user activity, text editing, and norm mixed with the ARP Poison attack starting at observation 301 Textedit-Local-Process-ARP Training data(textedit-local - ARP - Process 2v *958c) Table 5 The four combinations of attack-norm characteristics Weak Attack characteristic Strong Norm characteristic Weak Weak norm, weak attack Weak norm, strong attack (signature recognition and anomaly detection may work for only this combination) Strong Strong norm, weak attack strong norm, strong attack in the attack condition but more volatile in the norm condition. These results suggest that the two existing approaches of signature recognition and anomaly detection do not work well for the combination of strong norm and weak attack characteristics, but may for weak norm and strong attack. Since all four combinations of attack-norm characteristics (shown in Table 5) are possible, our attack-norm separation approach incorporating the models of both attack data and norm data should be capable of handling all four combinations whereas signature recognition and anomaly detection work well for only one combination. In addition to the advantages of our attack-norm separation approach over signature recognition and anomaly detection, using the exact mathematical models of both attack data and norm data will allow not only the detection, but also the identification of an attack. In contrast, using only one model, such as the norm model for the anomaly detection approach, allows only the detection of something anomalous, not the identification of a specific attack. Direct attack identification will enable a quick attack reaction. Hence, the difference between detection and identification also distinguishes our attack-norm separation approach. Related work Our solution requires a separation of cyber attack and norm data. We need to filter out normal noise from mixed data using an attack-norm separation model. For example, in the cuscore model of Eq. (3), a sine wave signal is separated from random noise in an observation. This requires information of both the noise model (Eq. (1)) and the signal model (Eq. (2)). This is just one example of filtering, there are many other ways to do this. Reviewed literature does not perform this attack-norm separation. Lee et al. propose data mining algorithms to learn the patterns of intrusive and normal activities to recognize known intrusions and anomalies for building intrusion detection models (Lee et al., 1998; 1999; 2000a; Lee and Stolfo, 2000b; Lee et al., 2001). This work does not have the step of separating attack and norm by filtering out normal noise before identifying the attack signal. Furthermore, the normal use data is there to help identifying the pattern of attack but not to build the norm model. Other work considers improving intrusion detection by detecting anomalous activities, but none considers separate attack and norm models (Lee et al., 2001; Lunt, 1988; Garvey and Lunt, 1991; Ghosh, Schwartzbard and Schatz, 1999; Warrander, Forrest and Pearlmutter, 1999; Lane and Brodley, 1999; Fan et al., 2001; Kruegel and Vigna, 2003; Vigna et al., 2003). The three steps involved in the attack-norm separation approach presented in this paper require a model of both cyber attack and norm data. This work differs from related work in that we separate attack and norm data to build individual models, and then use both models; the norm model to filter out normal noise from mixed data, and the attack model to identify the attack characteristics in the filtered data. Summary This paper presents our vision on attack-norm separation as a new approach to intrusion detection. This approach aims

14 176 Inf Syst Front (2006) 8: to overcome problems with the two existing approaches: detection accuracy, efficiency and adequacy. The approach addresses not only activity data, but also state and performance data along cause-effect chains of attacks on computers and networks. This enables us to achieve the detection adequacy lacking in existing intrusion detection systems. We engage in the scientific discovery of data, features and characteristics for cyber attack and norm data, along with well-established signal detection models in the physical space, to build attacknorm separation models that incorporate characteristics of both cyber attack and norm data. This enables us to take the least amount of relevant data necessary to achieve detection accuracy and efficiency. Existing intrusion detection systems are developed mostly empirically, or on a heuristic basis with little scientific understanding of attack and norm characteristics. These systems are neither efficient nor accurate, and lack the scientific and engineering rigor of physical signal detection technologies based on the scientific understanding of signal and noise characteristics. For example, with known characteristics of attack signals and normal noise, we can develop cuscore statistics that will accurately detect an attack in noise even if the signal is low and slow. These innovations will aid us in achieving higher cyber attack (intrusion) detection efficiency, adequacy, and accuracy, and establish the science and engineering of cyber attack detection. Acknowledgments This material is based upon work supported in part by the Air force Research Laboratory (AFRL) and Advanced Research and Development Activity (ARDA) under Contract No. F C-0233, the Air Force Office of Scientific Research (AFOSR) under Grant No. F , and a gift from Symantec Corporation. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of AFRL, ARDA, AFOSR, or Symantec Corporation. The authors would also like to acknowledge contributions made by Patrick Kelley for the execution and data collection of attacks used in our study. References Atlas L, Duhamel P. Recent developments in the core of digital signal processing. IEEE Signal Processing Magazine 1999;16(1): Bailey TC, Sapatinas T, Powell KJ, Krzanowski WJ. Signal detection in underwater sound using wavelets. Journal of the American Statistical Association 1998;93(441): Botella F, Rosa-Herranz J, Giner JJ, Molina S, Galiana-Merino JJ. A real-time earthquake detector with prefiltering by wavelets. Computers & Geosciences 2003;29(7): Box G, Luceno A. Statistical Control by Monitoring and Feedback Adjustment. New York: John Wiley & Sons, Fan W, Miller M, Stolfo S, Lee W, Chan P. Using artificial anomalies to detect unknown and known network intrusions. In: Proceedings of The First IEEE International Conference on Data Mining. San Jose, CA, Garvey T, Lunt T. Model-based intrusion detection. In 14th National Computer Security Conference (NCSC). Baltimore, Maryland, Ghosh A, Schwartzbard A, Schatz M. Learning program behavior profiles for intrusion detection. In 1st USENIX Workshop on Intrusion Detection and Network Monitoring. Santa Clara, CA, Jain AK, Duin P, Mao J. Statistical pattern recognition: Review. IEEE Transactions on Pattern Analysis and Machine Intelligence 2000;22(1):4 37. Johnson RA, Wichern DW. Applied Multivariate Statistical Analysis. Upper Saddle River, New Jersey: Prentice Hall, Kruegel C, Vigna G. Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 03). Washington, DC, ACM Press, 2003; Lakshminarasimhan DK. Wavelet based cyber attack detection. Master s Thesis, Arizona State University, November Lane T, Brodley C. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security August 1999;2(3): Lee W, Stolfo S, Chan P, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection. In: Proceedings of the 2001 DARPA Information Survivability Conference and Exposition (DISCEX II). Anaheim, CA, Lee W, Stolfo S, Mok K. A Data Mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, Lee W, Stolfo S, Mok K. Adaptive intrusion detection: A data mining approach. In: Artificial Intelligence Review. Kluwer Academic Publishers, December 2000;14(6): Lee W, Stolfo S, Mok K. Mining audit data to build intrusion detection models. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD 98). New York, NY, 1998 Lee W, Stolfo S. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 2000;3(4). Lunt T. Automated audit trail analysis and intrusion detection: A survey. In: 14th National Computer Security Conference (NCSC), Baltimore, MD, Proctor PE. Practical Intrusion Detection HandBook. 3rd edn. Prentice Hall, Skoudis E. Counter Hack. Upper Saddle River, New Jersey, Prentice Hall PTR, Vigna G, Robertson W, Kher V, Kemmerer RA. A stateful intrusion detection system for world-wide web servers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC). Las Vegas, NV, 2003; Warrander C, Forrest S, Pearlmutter B. Dectecting intrusions using system calls: alternative data models. IEEE Symposium on Security and Privacy. Oakland, CA, Ye N. QoS-centric stateful resource management in information systems. Information Systems Frontiers 2002;4(2): Ye N. (ed.). The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, Ye N. Mining computer and network security data. In: Ye N. eds., The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003; Ye N, Bashettihalli H, Farley T. Attack profiles to derive data observations, features, and characteristics of cyber attacks. Information, Knowledge, Systems Management ;5(1):23 47.

15 Inf Syst Front (2006) 8: Ye N, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;52(1): Ye N, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;52(1): Ye N, Jearkpaporn D, Lakshminarasimhan DK. Extraction and detection of signal features and characteristics in the physical space: Towards signal detection in the cyberspace. Proceedings of the IEEE, (in review). Ye N, Li X, Chen Q, Emran SM, Xu M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man, and Cybernetics 2001;31(4): Ye N, Napatkamon A, Farley T. Correlations of activity, state and performance data on computers and networks in attack and normal conditions. IEEE Transactions on Dependable and Secure Computing (in review). Nong Ye is a Professor of Industrial Engineering and an Affiliated Professor of Computer Science and Engineering at Arizona State University (ASU) the Director of the Information Systems Assurance Laboratory at ASU. Her research interests lie in security and Quality of Service assurance of information systems and infrastructures. She holds a Ph.D. degree in Industrial Engineering from Purdue University, West Lafayette, and M.S. and B.S. degrees in Computer Science from the Chinese Academy of Sciences and Peking University in China respectively. She is a senior member of IIE and IEEE, and an Associate Editor for IEEE Transactions on Systems, Man, and Cybernetics and IEEE Transactions on Reliability. Toni Farley is the Assistant Director of the Information and Systems Assurance Laboratory, and a doctoral student of Computer Science at Arizona State University (ASU), Tempe, Arizona. She is studying under a Graduate Fellowship from AT&T Labs-Research. Her research interests include graphs, networks and network security. She holds a B.S. degree in Computer Science and Engineering from ASU. She is a member of IEEE and the IEEE Computer Society. Her address is toni@asu.edu. Deepak Lakshminarasimhan is a Research Assistant at the Information and Systems Assurance Laboratory, and a Master of Science student of Electrical engineering at Arizona State University (ASU), Tempe, Arizona. His research interests include network security, digital signal processing and statistical data analysis. He holds a B.S degree in Electronics and Communication Engineering from Bharathidasan University in India.

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association Proceedings of Machine Learning Research 77:20 32, 2017 KDD 2017: Workshop on Anomaly Detection in Finance Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value

More information

CYBER SIGNAL/NOISE CHARACTERISTICS AND SENSOR MODELS FOR EARLY CYBER INDICATIONS AND WARNING

CYBER SIGNAL/NOISE CHARACTERISTICS AND SENSOR MODELS FOR EARLY CYBER INDICATIONS AND WARNING AFRL-IF-RS-TR-2005-332 Final Technical Report September 2005 CYBER SIGNAL/NOISE CHARACTERISTICS AND SENSOR MODELS FOR EARLY CYBER INDICATIONS AND WARNING Arizona State University APPROVED FOR PUBLIC RELEASE;

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Cyber attack detection using decision tree approach

Cyber attack detection using decision tree approach Cyber attack detection using decision tree approach Amit Shinde Department of Industrial Engineering, Arizona State University,Tempe, AZ, USA {amit.shinde@asu.edu} In this information age, information

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0 Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Comments and errata should be directed to: cyber- tm@cisco.com Introduction One of the most common network

More information

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Introduction One of the earliest indicators of an impending network attack is the presence of network reconnaissance.

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader misfeasor clandestine user varying levels of competence

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY DATA CENTER WEB APPS NEED MORE THAN IP-BASED DEFENSES AND NEXT-GENERATION FIREWALLS table of contents.... 2.... 4.... 5 A TechTarget White Paper Does

More information

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

A Firewall Architecture to Enhance Performance of Enterprise Network

A Firewall Architecture to Enhance Performance of Enterprise Network A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions IPS Effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defense that helps you protect

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1. Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN U.Kavitha 1 1 PG Student, Department of ECE, CK College of Engineering & Technology, Cuddalore, Tamil Nadu, India Abstract Wireless

More information

Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks

Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks Jim Ralston, Wireless Sales Engineer ProSoft Technology, August 2007 Abstract The performance of wireless networks can

More information

Intrusion Detection Systems Overview

Intrusion Detection Systems Overview Intrusion Detection Systems Overview Chris Figueroa East Carolina University figueroac13@ecu.edu Abstract Modern intrusion detection systems provide a first line of defense against attackers for organizations.

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 13 Chapter 6: Intrusion Detection Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events,

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

AAD - ASSET AND ANOMALY DETECTION DATASHEET

AAD - ASSET AND ANOMALY DETECTION DATASHEET 21 October 2018 AAD - ASSET AND ANOMALY DETECTION DATASHEET Meaningful Insights with Zero System Impact Classification: [Protected] 2018 Check Point Software Technologies Ltd. All rights reserved. This

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

Chapter 4. Network Security. Part I

Chapter 4. Network Security. Part I Chapter 4 Network Security Part I CCNA4-1 Chapter 4-1 Introducing Network Security Introduction to Network Security CCNA4-2 Chapter 4-1 Introducing Network Security Why is Network Security important? Rapid

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Tiger Scheme QST/CTM Standard

Tiger Scheme QST/CTM Standard Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)

More information

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems Presenters: Rima Asmar Awad, Saeed Beztchi Co-Authors: Jared M. Smith, Stacy Prowell, Bryan Lyles Overview Supervisory

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 22-1 1. Intruders 2. Intrusion

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data MINI-PAPER by Rong Pan, Ph.D., Assistant Professor of Industrial Engineering, Arizona State University We, applied statisticians and manufacturing engineers, often need to deal with sequential data, which

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected

More information

Training for the cyber professionals of tomorrow

Training for the cyber professionals of tomorrow Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Nandini P 1 Nagaraj M.Lutimath 2 1 PG Scholar, Dept. of CSE Sri Venkateshwara College, VTU, Belgaum,

More information

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin ARC VIEW FEBRUARY 1, 2018 Critical Industries Need Continuous ICS Security Monitoring By Sid Snitkin Keywords Anomaly and Breach Detection, Continuous ICS Security Monitoring, Nozomi Networks Summary Most

More information

Online Intrusion Alert Based on Aggregation and Correlation

Online Intrusion Alert Based on Aggregation and Correlation Online Intrusion Alert Based on Aggregation and Correlation Kunchakarra Anusha 1, K.V.D.Sagar 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur.,

More information

What s New in Spotfire DXP 1.1. Spotfire Product Management January 2007

What s New in Spotfire DXP 1.1. Spotfire Product Management January 2007 What s New in Spotfire DXP 1.1 Spotfire Product Management January 2007 Spotfire DXP Version 1.1 This document highlights the new capabilities planned for release in version 1.1 of Spotfire DXP. In this

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

A Neural Network for Real-Time Signal Processing

A Neural Network for Real-Time Signal Processing 248 MalkofT A Neural Network for Real-Time Signal Processing Donald B. Malkoff General Electric / Advanced Technology Laboratories Moorestown Corporate Center Building 145-2, Route 38 Moorestown, NJ 08057

More information

Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham

Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham Final Report for cs229: Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham Abstract. The goal of this work is to use machine learning to understand

More information

No Time for Zero-Day Solutions John Muir, Managing Partner

No Time for Zero-Day Solutions John Muir, Managing Partner No Time for Zero-Day Solutions John Muir, Managing Partner Executive Summary Innovations in virus construction and propagation have created a zero-day threat from email attachments that can wreak significant

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

Demystifying Service Discovery: Implementing an Internet-Wide Scanner Demystifying Service Discovery: Implementing an Internet-Wide Scanner Derek Leonard Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University,

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Datasheet SIEM in a nutshell The variety of cyber-attacks is extraordinarily large. Phishing, DDoS attacks in combination with ransomware demanding bitcoins

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10 Chapter10 Protecting the Platforms Painting: The art of protecting flat surfaces from the weather and exposing them to the critic. Ambrose Bierce (1842 1914) When it comes to the cost of keeping computers

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information