Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Intrusion Detection Systems and Practices
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Toward Sophisticated Detection With Distributed Triggers Ling Huang* Minos Garofalakis § Joe Hellerstein* Anthony Joseph* Nina Taft § *UC Berkeley §
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Design and Implementation of SIP-aware DDoS Attack Detection System.
Lecture 11 Intrusion Detection (cont)
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Networking Components
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
SECURING NETWORKS USING SDN AND MACHINE LEARNING DRAGOS COMANECI –
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Version 1.0 digitaloffice.intel.com Intel ® vPro ™ Technology Intel ® Active Management Technology Setup and Configuration Lenovo T61 Laptop Small Business.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
COEN 252 Computer Forensics
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IIT Indore © Neminah Hubballi
Copyright © 2009 Intel Corporation. All rights reserved. Intel and Intel Education are trademarks or registered trademarks of Intel Corporation or its.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
Connect. Communicate. Collaborate Experiences with tools for network anomaly detection in the GÉANT2 core Maurizio Molina, DANTE COST TMA tech. Seminar.
1 Impact of IT Monoculture on Behavioral End Host Intrusion Detection Dhiman Barman, UC Riverside/Juniper Jaideep Chandrashekar, Intel Research Nina Taft,
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Open-Eye Georgios Androulidakis National Technical University of Athens.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina with Mark Crovella and Christophe Diot NANOG35, Oct 23-25, 2005.
Intel ® Education K-12 Resources Copyright © 2010 Intel Corporation. All rights reserved. Intel, the Intel logo, and the Intel Education Initiative are.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC.
Taming Internet Traffic Some notes on modeling the wild nature of OD flows Augustin Soule Kavé Salamatian Antonio Nucci Nina Taft Univ. Paris VI Sprintlabs.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Security System for KOREN/APII-Testbed
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Role Of Network IDS in Network Perimeter Defense.
Assignment # 3 Networking Components By: Jeff Long.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Firewalls.
Prepared By : Pina Chhatrala
Click to edit Master subtitle style
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
POOJA Programmer, CSE Department
ე ვ ი ო Ш Е Т И О А С Д Ф К Ж З В Н М W Y U I O S D Z X C V B N M
Firewalls.
Presentation transcript:

Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2006, Intel Corporation. All rights reserved. Research at Intel Different outlier behaviors PROTEUS: Profiling for Enterprise Network Security Nina Taft, Frederic Giroire (IRB), Dina Papagiannaki (IRP) Jaideep Chandrashekar (SC), Michalis Faloutsos (UC Riverside) Build profiles using communication traffic (all packet headers entering & exiting host) Captures communication behavior, application usage, community of people interact with, temporal patterns Approach: graphlets (see figures below), combining small graphs with time series data Adaptive profiles evolve with user via ongoing learning short-term evolution: changing environments between enterprise & home, wired & wireless long-term evolution: user changes application mix, community interacts with, etc. OS-independent, implementable in tamper-proof hardware #dstIP# src port # dst port Total Nodes Today: all enterprise hosts configured the same way for security purposes. Easy to manage Easy to attack on large scale Goal: Change the game based on a new paradigm: end the “one-size-fits-all” era, and personalize end-host security solutions Why personalize security? A single universal configuration won’t work for everyone. Most anomaly detection algorithms based on “outlier” detection –Anomaly detection schemes rely on detecting deviations from patterns, by defining “normal” and “abnormal” behaviors. But what’s normal and what’s not is very personal ! –Each person uses their machine differently, so anomalous behavior should be defined relative to particular machine & user. End Host ProfilingA New Paradigm for Security Users differ both in their “typical” and “atypical” behaviors Threshold-based detectors used inside Host-IDS, firewalls, to detect DDOS, worms, scans, botnets, flash crowds. Example: If number simultaneous TCP connections > 1 million, raise an alarm. Using graphlets, can find out which ports, applications, and services a user uses, uncover the range of intensity of usage that is normal for user, and then supervise for extreme behavior. Graphlets enable learning of relevant thresholds Limits on number of simultaneous connections –number of failed TCP connections, –port 80 connections (thresholding limits port re-use) –catch via tracking of out-degree of relevant graphlet node Catch changes in dispersion metrics –entropy of destination addresses –entropy of ports. Thresholds should be set based on what is an outlier for a particular user. Example: Set max num TCP connections at 98% of what user usually does. How does this help security ? Night traffic (3-4am) Day traffic (10-11 am) #dstIP# src port # dst port Total nodes srcIP Protocol ID dstIPsrcPortdstPort 8 users, 4 laptops (L) and 4 desktops (D) Entropy of destination ports Average out-degree of TCP nodeAverage out-degree of “port 80 node” # End Hosts dstIP Does one user need more than one profile ? L1 D1 D2 D3 D4 L2 L3 L4