DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.

Slides:



Advertisements
Similar presentations
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Department Of Computer Engineering
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Information Fusion By Ganesh Godavari. Outline of Talk Problem Definition –Attack Types Correlation Solutions OSSIM Work Status.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Role Of Network IDS in Network Perimeter Defense.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
SECURING NETWORK TRAFFIC WITH IPSEC
Domain 4 – Communication and Network Security
CompTIA Security+ Study Guide (SY0-401)
Defending Against DDoS
Red Team Exercise Part 3 Week 4
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
DDoS Attack and Its Defense
Presentation transcript:

DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson University.

Design and implement a tool that does distributed tcpdump capability for Linux. Basic Operation Description: A client sends a command to a server instructing the server to do particular tcpdump commands. At the server, there needs to be a way for the tcpdump data to be sent back to the client. Significance: A generic building block that can be deployed in a highly distributed manner for Distributed Denial Of Service (DDoS) and Intrusion Detection (ID). Work is closely related to the frame work developed for intrusion detection. Project Goals

PROBLEM DEFINITION & SCOPE Distributed Denial of Service and Intrusion Detection System (IDS) A “denial-of-service” attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include: attempts to “flood” a network, thereby preventing legitimate network traffic. attempts to disrupt connections between two machines, thereby preventing access to a service. attempts to disrupt service to a specific system or person. Note: Other types of attacks may include a denial of service as a component, but the denial of service may be part of a larger attack.... contd

PROBLEM DEFINITION & SCOPE A network-based intrusion detection system (IDS) might be able to detect an attack instance (either an attack packet or a sequence of attack packets) by automatically extracting and analyzing the attack signatures from a collection of incoming and outgoing data packets. However, because of the Source accountability problem of today’s Internet, an IDS generally cannot tell where the attack packets were originated. Recent attention : Many DDoS (Distributed Denial Of Service) attacks have affected web sites such as Yahoo! E-Bay, CNN among many others, utilizing IP source address spoofing.

Nomenclature – The Plain DDoS Model DDoS Attack Infrastructure : Hackers from their own community and they share resources among themselves. When one Internet host is compromised (a resource for the hackers), the host identity and the key to access this host is announced to all the hackers. Gradually, compromised hosts are organized and connected together as a DDoS attack infrastructure. In this host infrastructure, some hosts play the role of masters, while others are slaves. Attacker: A 15-YEAR-OLD MONTREAL boy with the alleged Internet codename of Mafia boy was the attacker who launched the attacks that briefly immobilized and brought down Internet giants eBay, Amazon.com, Yahoo.com, and ETrade back in February through the plain DDoS attack infrastructure. [ ] community. Must be a “Gryffindor wizard” !!

The plain DDOS Model [ ] Ref : On Design and Evaluation of “Intention-Driven” ICMP Traceback. UCLAOn Design and Evaluation of “Intention-Driven” ICMP Traceback. UCLA

Tool Functionality How to detect the distributed attack ?? Signatures represent the attacks in a generic way. A signature is a distributed event pattern that represents a distributed attack. Generate log files required for further processing. Specify what information is needed. Identify the attack from specific signature flow. Trace bandwidth consumed by the following flow description xxx: the data sent back is simple byte count per second. Alert the client when data specific to flow xxx is observed : send back an alert message. Alert the client when you see this particular flow signature.

IMPLEMENTATION ARCHITECTURE Pseudo Signatures: Generate specific command – oriented tcpdump log files for processing. [ CMD : tcpdump_command, param_String, START, STOP, probing_frequency, file *log_file ] CMD : any tcpdump command. File : log file generated with the resultant tcpdump data. Generate list of offending flows [ CMD : ID_Non_tcp_friendly_flows, START, STOP, probing_frequency, file *list_file ] Identify specific offending flows [ CMD : search_for_this_flow, reporting_mode, probing_frequency, file *search_stats ] Search_for_this_flow : based on for example, { address, port, protocol } Reporting_mode : First occurrence of specific flow, Bandwidth > TCP_Friendly.

CARDS Architecture Fig : The CARDS architecture Ref : Design and Implementation of A Decentralized Prototype System for Detecting Distributed Attacks. [Dr. Ning, Dr. Sushil, Dr. Sean, North Carolina State University. ]Design and Implementation of A Decentralized Prototype System for Detecting Distributed Attacks. [Dr. Ning, Dr. Sushil, Dr. Sean, North Carolina State University. ]

Extensions Provide hooks for some other extended tcpdump commands. Provide a Interactive Java GUI interface for the Client. Think !!!! NOTE : [ Cpsc881 Students - Fall’03 ] May Implement security feature to this application. !??!