DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
DDoS A look back from 2003 Dave Dittrich The Information School / Computing & Communications University of Washington I2 DDoS Workshop - August 6/
Lesson 3-Hacker Techniques
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
1`1 Hacking and Information Warfare. 2 Overview Information Warriors  Who Are They  What Do They Do Types of Threat PsyOps Civil Affairs Electronic.
1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Increasing customer value through effective security risk management
Legal and Ethical Issues in Computer Security
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Web server security Dr Jim Briggs WEBP security1.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
1 Information Warfare: The Warriors Casey J. Dunlevy CERT Survivable Enterprise Management.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Lecture 1 Introduction Basic Security Concepts
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,
Honeypot and Intrusion Detection System
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
CIS 450 – Network Security Chapter 3 – Information Gathering.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Larry Clinton Operations Officer Internet Security Alliance
Computer & Internet Security. Today’s Situation – Universal Access… There are an estimated 304 million people with Internet access. All 304 million of.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Integrated Factory Acceptance Test (IFAT) as Security Best Practice 10/27/2015FoxGuard Solutions1 Larry Alls, Security Engineering Manager FoxGuard Solutions.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Topic 5: Basic Security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Computer Security By Duncan Hall.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Filip Chytrý Everyone of you in here can help us improve online security....
Network Devices and Firewalls Lesson 14. It applies to our class…
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Wireless Network Security
Threats to computers Andrew Cormack UKERNA.
Legal and Ethical Issues in Computer Security
امنیت اطلاعات و ضرورت آن
1:53:58 AM.
Lecture 3: Secure Network Architecture
Intrusion Detection system
Presentation slide for courses, classes, lectures et al.
Presentation transcript:

DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National Economy 2) Department of Computer Science, U. of Maine

The Web Neighborhood Watch Project This project seeks to identify websites belonging to dangerous people such as terrorists In addition to the artificial intelligence components, there is a need for locating the website in physical space At last year's conference, work was presented on using the distributed traceroute approach to help locate computers physically

Not only is locating computers physically important for the Web Neighborhood Watch Project, but for dealing with cyber- attacks in general Current methods for tracking Internet- based attacks are primitive. It is almost impossible to trace sophisticated attacks using current tools. Locating Computers in Physical Space

Intruders Attack Sophistication and Intruder Technical Knowledge High Low Intruder Knowledge Attack Sophistication Cross site scripting password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools stealth / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Staged Auto Coordinated

Techniques for Physically Locating Computers Whois Traceroute Distributed Traceroute Time Delay Method (new)

Whois Limitations Whois contains information about top-level domains only Distributed databases are not always connected

Traceroute Limitations It does not take advantage of the fact that there typically exist several different paths to the target computer Executing a single trace from a single location tends to produce results that are geographically insufficient

Distributed Traceroute Limitations The results are not always as accurate as one would want This approach cannot be applied when the attacker uses intermediate hosts with software redirectors to make a cyber-attack

Time Delay Method (new) Based on the concept that the most recent computer from which the attack was received was either: – a) The actual attacking computer – b) An intermediate host being used with redirection software Choosing between a) and b) is based on comparing the time delay between the attacking computer (AC) and the victim computer (VC) to the most recent time delay

A Cyber-attack using Redirectors T total = t 1 + t 2 + t 3 +…+t n + t n+1, t i - the time delay of the i-th link Attacking Computer Redirector 1 t1t1 t2t2 t3t3 tntn t n+1 Redirector 2 … Redirector n Victim Computer

Experimental Results The following servers were used: –TANE (Ternopil Academy of the National Economy, Ukraine, ) –Kiel University (Germany, ) –HTTL (Home To good service and Technology Ltd, London, England, )

Direct connection

Time Delays From HTTL to TANE

Time Delays from TANE to HTTL

Connection using redirector

Time Delays from HTTL to TANE using Kiel-redirector

Conclusion The Time Delay Method has the ability to locate a remote computer in real time based on delays in IP packet travel The Time Delay Method can also be used to analyze the nature of the links involved in the attack chain

Contact Information Roman Romanyak: Anatoly Sachenko: Serhiy Voznyak: Gene Connolly: George Markowsky: