Network Protocol Packet Analysis By: Daniel Ruiz.

Slides:



Advertisements
Similar presentations
Presented by: Subek Shakya Sudip Shrestha Sujan Thapa.
Advertisements

March Wireshark CA Plugin EPICS Meeting 2008, Shanghai, China. 1 Wireshark CA Plug-in EPICS Channel Access Dissector Kazuro Furukawa, KEK Ron Rechenmacher,
JAVA Programming Environment © Juhani Välimäki 2003.
Lesson 22. Networking Tools. Objective At the end of this Presentation, you will be able to:
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
ITIS2110 Lab 9. Scenario There are web network problems at your site Your manager has assigned you to track down the problem  He “highly” suggests you.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 The Shark Distributed Monitoring System: Distributing Wireshark Deep Packet Analysis to LAN/WAN.
Dive Even Deeper sysdig – Wireshark for your system.
Database Encryption. Encryption: overview Encrypting Data-in-transit As it is transmitted between client-server Encrypting Data-at-rest Storing data in.
Capture Packets using Wireshark. Introduction Wireshark – – Packet analysis software – Open source.
Wireshark – Introduction Wire 1 Due date: Friday, October 30th.
Mobile Computing Dorota Huizinga Department of Computer Science.
UNIX Chapter 01 Overview of Operating Systems Mr. Mohammad A. Smirat.
Thraxion: Three Dimensional Action Simulator Justin Gerthoffer, Jon Studebaker, David Colborne, Jeff Stuart, Frederick C. Harris, Jr Department of Computer.
Local Area Network Layer-2 Topology Mapping Local Area Network Layer-2 Topology Mapping Doron Peled Michal Rimmer Supervisor: Zigi Walter Networked Software.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Computer Security and Penetration Testing
Network Analyzer CS4500 Spring 2004 Hong Jiang Ryan Pratt Raul Chiari By Palantir:
ITIS3100 By Fei Xu. Acknowledge This document is basically a digest from “Wireshark User's Guide for Wireshark 1.0.0” You can download the software.
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2013.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
PROJECT PROPOSAL TOPIC: CAPACITY PLANNING MODEL USING SIP AND IAX WITH G. 726 AND ILBC By: Vishal and Anoosha.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
Wireshark Monitoring Packet
Layered Approach using Conditional Random Fields For Intrusion Detection.
1 GAIA VoIP traffic generator and analyzer Presentation by Amrut Bang Ashish Deshpande Vijay Gabale Santosh Patil Sponsored by GS Lab Pvt. Ltd Pune Institute.
Network Security Evan Roggenkamp
Computer Networking Course Introduction Dr Sandra I. Woolley.
Scapy. Introduction  It’s a packet manipulation tool.  It can forge or decode packets of a wide number of protocols, send them on the wire, capture.
Copyright 2004 Sheng Bai1 CommView Report for By Sheng Bai.
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2014.
RomanHunter (ROuter huMAN Hunter). How to protect networks with wireless devices (802.xx/Zigbee/etc...) This presentation is about a specific implementation.
Remote Controller & Presenter Make education more efficiently
CS Lecture 00 Swing overview and introduction Lynda Thomas
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Practice 4 – traffic filtering, traffic analysis
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
ASP. ASP is a powerful tool for making dynamic and interactive Web pages An ASP file can contain text, HTML tags and scripts. Scripts in an ASP file are.
Packets and Protocols Chapter Three Obtaining and Installing Wireshark.
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Ethernet WireShark Utkarsh Mahajan Id: A1238. Download: Referance:
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
COURSE OUTLINE 1 Introduction(History) Key functions Interface analysis 2 Traffic Analysis/OSI Review Protocol Filtering 3 IP and port filtering Wireshark.
Packet Sniffing Hans Kokx
Chapter 5 Operating Systems.
Networking Tool Presentation
CSCE 548 Student Presentation By Manasa Suthram
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2016.
Pixy Python API Charlotte Weaver.
Before You Begin Nahla Abuel-ola /WIT.
資料通訊與網路 教授: 吳照輝 助教: 鄺福全.
A Quick Guide to Ethereal/Wireshark
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
Intro to Ethical Hacking
Intro to Ethical Hacking
Intro to Wireshark What is it? What does it do? Why do I need it?
ICTF EC2 By Daniel Ruiz.
Cross Platform Network Calls Automation
BlackBerry Test Validation and Analysis using Deep Learning
Wireshark CSC8510 David Sivieri.
Computers: Tools for an Information Age
TCP Protocol Analysis Access UMKC Home Page.
Hilscher Gesellschaft für Systemautomation mbH
Computers: Tools for an Information Age
Presentation transcript:

Network Protocol Packet Analysis By: Daniel Ruiz

Overview How to Capturing Packets ▫WireShark ▫Lua Analyzing Packets ▫Principle Component Analysis (PCA)

WireShark Best Open Source Packet Analyzer available today Used in ICTF Multi-platform runs on Linux, Window, OS X and many others Live capture and offline analysis Much Much More!!!

Lua Lua is a powerful light-weight programming language designed for extending applications Very is to use API Allows for scripting in Wireshark Lua can be used to write dissectors, post-dissectors and taps.

Analyzing Packets Tshark is able to detect, read and write the same capture file that are supported by WireShark To detect ▫Tshark.exe –i eth0 –x To read ▫Tshark.exe –r “file” –x To write ▫Tshark.exe –i eht0 –x –w “file” Understand the software tools before writing them yourself!

Pictures and Packets Good PacketMalicious Packet

Principle Component Analysis Use PCA instead of convolution with FFT PCA takes your cloud of data points, and rotates it such that the maximum variability is visible (most important gradients). Maximum variability is found by the Eigen values of each packet Packets with malicious data should have different gradients than those with good data Data Cloud Gradient Abundance

Improvements Use Neural Network to recognize malicious Eigen values Investigate Wavelet PCA PCA and FFT convolution speed analysis

Questions?