Network Attack Visualization Greg Conti www.cc.gatech.edu/~conti.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
6/1/2014FLOCON 2009, Scottsdale, AZ. DoD Disclaimer 6/1/2014FLOCON 2009, Scottsdale, AZ This document was prepared as a service to the DoD community.
F3 Collecting Network Based Evidence (NBE)
Information Visualization Survey
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
1 Visualizing Network Attacks Eric Conrad April 2009.
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention with Snort Dr. Jim Chen, Victor Tsao, Barry Williams, Tokunbo Olojo, John Smet,
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Host Based Intrusion Detection: Analyzing System Logs Bob Winding, Vikram Ahmed University of Notre Dame 12/13/2006.
NAV Project Update By: Meghan Allen and Peter McLachlan.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
Security administrators The experts need better tools too!
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Information Design and Visualization
COEN 252 Computer Forensics
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
What is FORENSICS? Why do we need Network Forensics?
Passive Visual Fingerprinting of Network Attack Tools Gregory Conti Kulsoom Abdullah College of Computing Georgia Institute of Technology Passive.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Information Visualization for Intrusion Detection Analysis: A Needs Assessment of Security Experts John Goodall, Anita Komlodi, Wayne G. Lutters UMBC Workshop.
Fall 2002CS/PSY Information Visualization Picture worth 1000 words... Agenda Information Visualization overview  Definition  Principles  Examples.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Beyond Ethereal: Crafting A Tivo for Security Datastreams Gregory Conti
Countering Denial of Information Attacks with Network Visualization Gregory Conti
Linux Networking and Security
Adaptive Data Visualization Packet Information Collection and Transformation for Network Intrusion Detection and Prevention Richard A. Aló,
Parallel and Distributed Simulation Introduction and Motivation.
3 June, 2016 Toorcon Security Expo Hydra Intelligent Agent: Instrument for Security One Size Fits All Distributed Scanning Distributed IDS Distributed.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Information Fusion By Ganesh Godavari. Outline of Talk Problem Definition –Attack Types Correlation Solutions OSSIM Work Status.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Cristian Estan, Garret Magin University of Wisconsin-Madison USENIX LISA, 17 December 2015 Interactive traffic analysis and visualization with Wisconsin.
Artificial Intelligence Center,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Real Time and Forensic Network Data Analysis Using Animated Combined Visualizations Sven Krasser Gregory Conti Julian Grizzard Jeff Gribschaw Henry Owen.
Security System for KOREN/APII-Testbed
Hardened IDS using IXP Didier Contis, Dr. Wenke Lee, Dr. David Schimmel Chris Clark, Jun Li, Chengai Lu, Weidong Shi, Ashley Thomas, Yi Zhang  Current.
Network Security Data Visualization Greg Conti CS6262
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Snort – IDS / IPS.
Top 5 Open Source Firewall Software for Linux User
High Performance Computing Lab.
James Logan CS526 Dr. Chow April 29, 2009
Information Visualization Picture worth 1000 words...
Intrusion Detection Systems (IDS)
Information Design and Visualization
Information Visualization (Part 1)
PCAV: Evaluation of Parallel Coordinates Attack Visualization
Presentation transcript:

Network Attack Visualization Greg Conti

Disclaimer The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. image:

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

An Art Survey… A B C

Patterns Anomalies Comparisons Outliers/Extremes Big Picture & Details Interaction Large Datasets Why InfoVis? Replies Views

TCP Dump Tcpdump image: TCPDump can be found at Ethereal image: france.org/prj/edu/archinet/AMSI/index/images/ethereal.gif Ethereal by Gerald Combs can be found at EtherApe image: Etherape by Juan Toledo can be found at Ethereal EtherApe Packet Capture Visualizations

So What? Go Beyond the Algorithm –Complement current systems Make CTF a Spectator Sport Enhance forensic analysis –Mine large datasets –Logs Monitor in real time –Allow big picture, but details on demand –Fingerprint attacks/tools (people?) –Alerts (2-3 Million /day) Observe attacker behavior (example) What tasks do you need help with?

Recon Focused Attacks Next Wave Destination IP Time

Classical InfoVis Research

InfoVis Mantra Overview First Zoom and Filter Details on Demand

Overview and Detail Examples by Dr. John Stasko, see cs7450_spring/Talks/09-overdetail.ppt for more details. Game shown is Civilization II

Focus and Context Examples by Dr. John Stasko, see cs7450_fall/Talks/8-focuscontext.ppt for more details. Table lens (right) is from Xerox Parc and Inxight Fisheye View Table Lens

For more information… Courses (free) Conferences Systems Research Groups Bookmarks on CD

Example Classical InfoVis Systems

example 1 - data mountain

example 2 - filmfinder

example 3 - parallel coordinates A. Inselberg and B. Dimsdale. Parallel coordinates: A tool for visualizing multidimensional geometry. Proc. of Visualization '90, p , MPG 35 0

example 4 - informative art

Many, many untapped security applications… examples (on CD)

More Information Information Visualization Envisioning Information by Tufte The Visual Display of Quantitative Information by Tufte Visual Explanations by Tufte Beautiful Evidence by Tufte (due this year) Information Visualization by Spence Information Visualization: Using Vision to Think by Card See also the Tufte road show, details at images:

Representative Security Visualization Research

Soon Tee Teoh Routing Anomalies See also treemap basic research:

Secure Scope

Starlight

Open Source Security Information Management (OSSIM)

TCP/IP Sequence Number Generation Initial paper - Follow-up paper - Linux 2.2 TCP/IP sequence numbers are not as good as they might be, but are certainly adequate, and attack feasibility is very low. Michal Zalewski x[n] = s[n-2] - s[n-3] y[n] = s[n-1] - s[n-2] z[n] = s[n] - s [n-1] x[n] = s[n-2] - s[n-3] y[n] = s[n-1] - s[n-2] z[n] = s[n] - s [n-1]

Wireless Visualization

Observing Intruder Behavior Dr. Rob Erbacher –Visual Summarizing and Analysis Techniques for Intrusion Data –Multi-Dimensional Data Visualization –A Component-Based Event- Driven Interactive Visualization Software Architecture

Glyphs Dr. Rob Erbacher

examples (to be posted)

Hot Research Areas… visualizing vulnerabilities visualizing IDS alarms (NIDS/HIDS) visualizing worm/virus propagation visualizing routing anamolies visualizing large volume computer network logs visual correlations of security events visualizing network traffic for security visualizing attacks in near-real-time security visualization at line speeds dynamic attack tree creation (graphic) forensic visualization

More Hot Research Areas… feature selection and construction incremental/online learning noise in the data skewed data distribution distributed mining correlating multiple models efficient processing of large amounts of data correlating alerts signature and anomaly detection forensic analysis

Building a System

Visual IDS

Ethernet Packet Capture Parse Process Plot tcpdump (pcap, snort) Perl xmgrace (gnuplot) tcpdump capture files winpcap VB System Architecture Creativity

rumint tool components (CD)

External Port Internal Port 65,535 0 External IP Internal IP External IP Internal Port , parallel port views

External IP External Port Internal Port Internal IP ,535 65, Also a Port to IP to IP to Port View

sara (port to port view) Light MediumHeavy

nmap 3 (RH8) NMapWin 3 (XP) SuperScan 3.0 (XP) SuperScan 4.0 (XP) nmap 3 UDP (RH8) nmap 3.5 (XP) scanline 1.01 (XP) nikto 1.32 (XP) Tool Fingerprinting (port to port view)

time sequence data (external port vs. packet) nmap winsuperscan 3 ports packets Also internal/external IP and internal port

packet length and protocol type over time ports packets length

30 days on the Georgia Tech honeynet External IP Internal PortExternal Port Internal Port

Demo’s rumint xmgrace treemap worm propagation survey x 2.ppt links

classic infovis survey (on CD) security infovis survey ( perl/linux/xmgrace demo (on CD) rumint tool (on CD) bookmarks (on CD) this talk (on CD &

Acknowledgements 404.se2600 –Clint –Hendrick –icer –Rockit –StricK Dr. John Stasko – Dr. Wenke Lee – Dr. John Levine – Julian Grizzard –

Questions?