CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Argumentative Thesis Statements For use with Stepping Stone Argumentative Research Project.
The Model Following these assumptions, I propose a hierarchical model with these characteristics: where is the number of goals scored by a team’s offense.
CS682- Network Management and Security Prof. Katz.
Open Resolvers in COM/NET Resolution Duane Wessels, Aziz Mohaisen DNS-OARC 2014 Spring Workshop Warsaw, Poland.
Security Firewall Firewall design principle. Firewall Characteristics.
Internet Intrusions: Global Characteristics and Prevalence Presented By: Zhichun Li Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS 2003.
Internet Intrusions: Global Characteristics and Prevalence Presented By: Elliot Parsons Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS.
Network Resilience: Exploring Cascading Failures Vishal Misra Columbia University in the City of New York Joint work with Ed Coffman, Zihui Ge and Don.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
CSE5803 Advanced Internet Protocols and Applications (7) Introduction The IP addressing scheme discussed in Chapter 2 are classful and can be summarised.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Signature Based and Anomaly Based Network Intrusion Detection
Honeypot and Intrusion Detection System
FIREWALKING. KNOW YOUR ENEMY: FIREWALLS What is a firewall? A device or set of devices designed to permit or deny network transmissions based upon a set.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Routing and Routing Protocols
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Defending against Hitlist Worms using NASR Khanh Nguyen.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Networking Components Assignment 3 Corbin Watkins.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Basic Guide to Writing an Essay. What is an Essay? An essay can have many purposes, but the basic structure is the same no matter what. You may be writing.
The Research Paper English 12. Argumentative Research Papers  Present a strong claim to a possibly resistant audience  You will gather evidence by looking.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Security Benefits of Firewall Protection
Common System Exploits Tom Chothia Computer Security, Lecture 17.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Outline Introduction Characteristics of intrusion detection systems
Introducing To Networking
Firewalls.
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Towards an Archival Intermemory
DDoS Attack and Its Defense
Presentation transcript:

CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

CS-495 Advanced Networking 2 Plan of Attack Introduction Data Collection Data Analysis –Data as over-generalized –Response to data as flimsy –Projections as too simplistic –Final analysis shoddy

CS-495 Advanced Networking 3 Introduction As we’ve already heard, this paper has a lot of data! Unfortunately, the analysis provided does not match the depth of information collected –Few meaningful conclusions are drawn –Analysis is very simplistic and preliminary –Future work is suggested once

CS-495 Advanced Networking 4 Data Collection Firewall logs from across the world –1600 different locations –Collected over four months Sounds good, but… –No information given regarding the subnets these firewalls protect, such as size and composition (this become important later) –Logs lack IP header and connection information

CS-495 Advanced Networking 5 Data as Over-Generalized Data is placed into two very large groups –Worms –Non-worms But behavior of each intruder is specialized –Code Red I exhibits strong day-of-the-month characteristics whereas Code Red II does not –Global characteristics inferred are therefore very dependant on the worm in question –Same for non-worms

CS-495 Advanced Networking 6 Data as Over-Generalized (cont.) What does this mean? –Analysis of persistence is biased toward the worms considered Code Red I is memory resident while II is not –Periodicity is skewed by varied behavior While it’s neat to see traffic spike during the Code Red I spread phase, it is not necessary telling One more thing… –Not clear if the firewalls catch intra-subnet traffic, important for some worms

CS-495 Advanced Networking 7 Response to Data Analysis of top sources –Focus limited to non-worm sources –Author’s find a very Zipf-like distribution

CS-495 Advanced Networking 8 Response to Data (cont.) So author’s suggest… –“… blacklisting worst offenders would be an effective mechanism defending against non-port 80 intrusions.” Unfortunately, this is ineffective because of the long tail distribution –A few nodes are making a large number of attacks –Many are making a small number of attacks and not all IPs in that group can be banned –No information is given on how many intrusions would still remain

CS-495 Advanced Networking 9 Projections The limited data set is extrapolated to give an idea of the amount of intrusions Internet-wide –Calculated by taking the average intrusions per IP and multiplying that by the IP space –“We assume uniformity, but do not test for it. That is, we assume that since our set of provider networks are reasonably well distributed … our perspective reflects what is seen over the general internet.” Sound naïve?

CS-495 Advanced Networking 10 Projections (cont.) It is! –Simply stating that you did not test for uniformity does not make it ok to ignore it! A number of other factors are ignored in this assumption: –Intra-subnet traffic missed by the router –Traffic behind a NAT –Unassigned IP addresses Without regard to these factors, 25 billion scans a day is arbitrary

CS-495 Advanced Networking 11 Final Analysis Finally, the author’s take a look at how many subnets is adequate to determine “worst offenders” (top) and target ports (bottom) Data appears erratic still – is it possible that this data does not fit that model? Only mentions the data should be “relatively stable”

CS-495 Advanced Networking 12 Moving on to My Opponent…