12 research outputs found
A survey on network security monitoring systems
Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time, productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. There are several approaches to network security monitoring. This paper provides the readers with a critical review of the prominent implementations of the current network monitoring approaches
INPUT SPLITS DESIGN TECHNIQUES FOR NETWORK INTRUSION DETECTION ON HADOOP CLUSTER
Intrusion detection system (IDS) is one of the most important components being used to monitor network for possible cyber-attacks. However, the amount of data that should be inspected imposes a great challenge to IDSs. With recent emerge of variousbig data technologies, there are ways for overcoming the problem of the increased amount of data. Nevertheless, some of this technologies inherit data distribution techniques that can be a problem when splitting a sensitive data such as network data frames across a cluster nodes. The goal of this paper is design and implementation of Hadoop based IDS. In this paper we propose different input split techniques suitable for network data distribution across cloud nodes and test the performances of their Apache Hadoop implementation. Four different data split techniques will be proposed and analysed. The techniques will be described in detail. The system will be evaluated on Apache Hadoop cluster with 17 slave nodes. We will show that processing speed can differ for more than 30% depending on chosen input split design strategy. Additionally, we’ll show that malicious level of network traffic can slow down the processing time, in our case, for nearly 20%. The scalability of the system will al so be discussed
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
This work has been partly funded by the research grant PID2020-115199RB-I00 provided by the Spanish ministry of Industry under the contract MICIN/AEI/10.13039/501100011033, and also by FEDER/Junta de Andalucia-Consejeria de Transformacion Economica, Industria, Conocimiento y Universidades under project PYC20-RE-087-USE.Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal
of security components of most organizations. They can find traces of known attacks in the network
traffic or host events for which patterns or signatures have been pre-established. SIDS include
standard packages of detection rulesets, but only those rules suited to the operational environment
should be activated for optimal performance. However, some organizations might skip this tuning
process and instead activate default off-the-shelf rulesets without understanding its implications and
trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the
performance of SIDS. We experimentally explore the performance of three SIDS in the context of web
attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort,
ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of
alert generated by each detector in a real-life case using a large trace from a public webserver. Results
show that the maximum detection rate achieved by the SIDS under test is insufficient to protect
systems effectively and is lower than expected for known attacks. Our results also indicate that the
choice of predefined settings activated on each detector strongly influences its detection capability
and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating
the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also
found that using various SIDS for a cooperative decision can improve the precision or the detection
rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS
with default configurations as core elements for protection in the context of web attacks. Finally, we
provide an efficient method for systematically determining which rules deactivate from a ruleset to
significantly reduce the false alarm rate for a target operational environment. We tested our approach
using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h
of work.Spanish Government PID2020-115199RB-I00
MICIN/AEI/10.13039/501100011033FEDER/Junta de Andalucia-Consejeria de Transformacion Economica, Industria, Conocimiento y Universidades PYC20-RE-087-US
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work. View Full-TextMinisterio de Ciencias e Innovación (MICINN)/AEI 10.13039/501100011033: PID2020-115199RB-I00FEDER/Junta de Andalucía-Consejería de Transformación Económica, Industria, Conocimiento y Universidades PYC20-RE-087-US
An Empirical Study of Reflection Attacks Using NetFlow Data
We would like to thank the anonymous reviewers for their constructive feedback, which helped improve our paper significantly.Peer reviewe
Malicious SSL certificate detection: A step towards advanced persistent threat defence
Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multistep attack. Within the APT life cycle, continuous communication between infected hosts and Command and Control (C&C) servers is maintained to instruct and guide the compromised machines. these communications are usually protected by Secure Sockets Layer (SSL) encryption, making it difficult to identify if the traffic directed to sites is malicious. This paper presents a Malicious SSL certificate Detection (MSSLD) module, which aims at detecting the APT C&C communications based on a blacklist of malicious SSL certificates. This blacklist consists of two forms of SSL certificates, the SHA1 fingerprints and the serial & subject, that are associated with malware and malicious activities. In this detection module, the network traffic is processed and all secure connections are filtered. The SSL certificate of each secure connection is then matched with the SSL certificate blacklist. This module was experimentally evaluated and the results show successful detection of malicious SSL certificates
Federated Agentless Detection of Endpoints Using Behavioral and Characteristic Modeling
During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that is reliably attributed to each individual endpoint over time. With the current state of dissociated data collected from networks using different tools it is challenging to correlate the necessary data to find origin and propagation of attacks within the network. Critical indicators of compromise may go undetected due to the drawbacks of current data collection systems leaving endpoints vulnerable to attacks. Proliferation of distributed organizations demand distributed federated security solutions. Without robust data collection systems that are capable of transcending architectural and computational challenges, it is becoming increasingly difficult to provide endpoint protection at scale. This research focuses on reliable agentless endpoint detection and traffic attribution in federated networks using behavioral and characteristic modeling for incident response
Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey
International audienceTraffic analysis is a compound of strategies intended to find relationships, patterns, anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic classification is a subgroup of strategies in this field that aims at identifying the application's name or type of Internet traffic. Nowadays, traffic classification has become a challenging task due to the rise of new technologies, such as traffic encryption and encapsulation, which decrease the performance of classical traffic classification strategies. Machine Learning gains interest as a new direction in this field, showing signs of future success, such as knowledge extraction from encrypted traffic, and more accurate Quality of Service management. Machine Learning is fast becoming a key tool to build traffic classification solutions in real network traffic scenarios; in this sense, the purpose of this investigation is to explore the elements that allow this technique to work in the traffic classification field. Therefore, a systematic review is introduced based on the steps to achieve traffic classification by using Machine Learning techniques. The main aim is to understand and to identify the procedures followed by the existing works to achieve their goals. As a result, this survey paper finds a set of trends derived from the analysis performed on this domain; in this manner, the authors expect to outline future directions for Machine Learning based traffic classification
Recommended from our members
An overview of safety and security analysis frameworks for the Internet of Things
YesThe rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous benefits, including many security and safety-critical applications. However, unlocking the full potential of IoT applications, especially in high-consequence domains, requires the assurance that IoT devices will not constitute risk hazards to the users or the environment. To design safe, secure, and reliable IoT systems, numerous frameworks have been proposed to analyse the safety and security, among other properties. This paper reviews some of the prominent classical and model-based system engineering (MBSE) approaches for IoT systems’ safety and security analysis. The review established that most analysis frameworks are based on classical manual approaches, which independently evaluate the two properties. The manual frameworks tend to inherit the natural limitations of informal system modelling, such as human error, a cumbersome processes, time consumption, and a lack of support for reusability. Model-based approaches have been incorporated into the safety and security analysis process to simplify the analysis process and improve the system design’s efficiency and manageability. Conversely, the existing MBSE safety and security analysis approaches in the IoT environment are still in their infancy. The limited number of proposed MBSE approaches have only considered limited and simple scenarios, which are yet to adequately evaluate the complex interactions between the two properties in the IoT domain. The findings of this survey are that the existing methods have not adequately addressed the analysis of safety/security interdependencies, detailed cyber security quantification analysis, and the unified treatment of safety and security properties. The existing classical and MBSE frameworks’ limitations obviously create gaps for a meaningful assessment of IoT dependability. To address some of the gaps, we proposed a possible research direction for developing a novel MBSE approach for the IoT domain’s safety and security coanalysis framework
Diseño e implementación de una plataforma de detección de amenazas de red
Este TFG presenta una guía completa de los aspectos teóricos y prácticos necesarios para realizar
el diseño e implementación de una plataforma de detección de amenazas en la red del Departamento
de Informática de la Universidad de Valladolid. Como introducción al proyecto se nos describen los
problemas de seguridad a los que se expone una red y las distintas medidas existentes para lograr
protegerla. Esta introducción nos presenta las medidas de seguridad que tendrán relevancia a lo largo
del proyecto, estas medidas son los sistemas de detección de intrusos (IDS) y los sistemas de seguridad
de la información y gestión de eventos(SIEM). Con el fin de realizar la elección de las herramientas
empleadas en la plataforma de detección, se ha realizado un estudio individualizado de las herramientas
IDS y SIEM en el mercado. Este estudio nos ha permitido decidir emplear la distribución Security
Onion para la creación de la plataforma de detección.
Mediante el diseño e implementación de una arquitectura distribuida Security Onion se ha logrado
monitorizar el tráfico del Departamento de Informática y con ello permitir desarrollar un estudio con
las posibles vulnerabilidades de la red. Como comprobaciones complementarias, se ha realizado
la inyección sobre la plataforma de detección de archivos PCAP con tráfico malicioso que nos ha
permitido corroborar la correcta detección de ataques.Grado en Ingeniería Informátic