Paulo Fernando da Silva Carlos Becker Westphall Network and Management Laboratory Post-Graduate Program in.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
CS 408 Computer Networks Congestion Control (from Chapter 05)
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Mid-Semester Presentation Spring 2005 Network Sniffer.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
INTRUSION DETECTION SYSTEM
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Mobile IP Add it into TCP/IP implementation Wireless communication techniques Wireless technique DistanceTransfer rate Frequency Bluetooth (WPAN)
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
S E C U R E C O M P U T I N G Intrusion Tolerant Server Infrastructure Dick O’Brien, Tammy Kappel, Clint Bitzer OASIS PI Meeting March 14, 2002.
1 Guide to Network Defense and Countermeasures Chapter 2.
Socket Lab Info. Computer Network. Requirement Use TCP socket to implement a pair of programs, containing a server and a client. The server program shall.
IODEF Design principles and IODEF Data Model Overview IODEF Data Model and XML DTD pre-draft Version 0.03 TERENA IODEF WG Yuri Demchenko.
Design of an optimal AQM controller for the Diffserv architecture Leonardo Rangel / Nelson Fonseca Institute of Computing - IC Unicamp, Campinas, ,
1 /160 © NOKIA 2001 MobileIPv6_Workshop2001.PPT / / Tutorial Mobile IPv6 Kan Zhigang Nokia Research Center Beijing, P.R.China
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
IP Forwarding.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Presented by : Team 11 Mathuvathanan M. Jayasinghe S. D. Luckshy S. T. Sujeetha L. Supervised by: Mr. Shantha Fernando Mr. Samantha Senarathne.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Application of Content Computing in Honeyfarm Introduction Overview of CDN (content delivery network) Overview of honeypot and honeyfarm New redirection.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
1 Action Automated Security Breach Reporting and Corrections.
F.Pacini - Milan - 8 May, n° 1 Results of Meeting on Workload Manager Components Interaction DataGrid WP1 F. Pacini
Report from Universidad Politécnica de Madrid Zorana Banković.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Distributed Denial of Service Attacks
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Lecture 24 Wireless Network Security
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
CHAPTER Windows Server Management. Chapter Objectives Give an overview of the Server Manager Provide details of accessing the Server Manager Explain the.
An Introduction to Mobile IPv4
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
A MAIN PROJECT SEMINAR ON PACKET FILTERING FIREWALL USING NETFILTERS IN LINUX FOR ARM9 BY: R. SRINIVASULU (07N21A0446) CH. SHIVA RAM (07N21A0442) K. MALLIKARJUNA.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
SQL Database Management
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
William Stallings Data and Computer Communications
Server-to-Client Remote Access and DirectAccess
Crisis Alert System Overview
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
OpenSec:Policy-Based Security Using Software-Defined Networking
Intrusion Detection Systems
Presentation transcript:

Paulo Fernando da Silva Carlos Becker Westphall Network and Management Laboratory Post-Graduate Program in Computer Science Federal University of Santa Catarina - Florianópolis, Brazil Paulo Fernando da Silva Carlos Becker Westphall Network and Management Laboratory Post-Graduate Program in Computer Science Federal University of Santa Catarina - Florianópolis, Brazil An Intrusion Answer Model Compatible with the Alerts IDWG Model The IDREF data model aims at extending the works of IDWG group in a way to implement sending mechanisms of answers to detected alerts. The IDREF data model aims at extending the works of IDWG group in a way to implement sending mechanisms of answers to detected alerts. For the support to the interoperability of answers, besides developing the IDREF data model, it was necessary to modify the architecture of IDSs proposed for IDWG group. The component countermeasures, action and resource have been added. For the support to the interoperability of answers, besides developing the IDREF data model, it was necessary to modify the architecture of IDSs proposed for IDWG group. The component countermeasures, action and resource have been added. - The Response class allows information with the objective to control or to inform on an attack to be sent, having three derived classes: TCP, ICMP and notify; - React class is used to Block or Finish a Resource; - The classes Block and Shutdown respectively represent the blockade and the closing of some resource; - The reply of the Config type allows the modification of the configuration of a specific resource, in order to contain an attack; - The Resource class represents a resource to which the reply will be sent. This class has five derived classes: Node, Process, Service, UserList and FileList; - In the new architecture proposal, when the operator receives a notification from the manager he has the option of sending a reply in return to the manager; - When the manager receives a reply it codifies it in accordance with IDREF model and sends it to the component of countermeasures; - The actions contain information of the Response classes, React or Config of IDREF model. An action can be, for example, the blockade or closing of some resource; - The resources are specified in the reply for the Resource class of IDREF model. A resource can be, for example, a user account or a router; - To create an environment of intrusion detection with support to the sending of responses three components have been developed: IDSMan, IDSAna and IDSRes; - The IDSMan component is a manager of alerts that is able to receive IDMEF messages and to send IDREF messages; - IDSAna is a component that makes the connection between the analyzer of a IDS and the IDSMan manager; - IDSRes is a countermeasures component that is able to receive IDREF messages and to apply actions to resources; This architecture allows the reception of alerts from several different IDSs, using the IDMEF alert model and also allows the transmission of answers to received alerts, using the IDREF model of answers. This architecture allows the reception of alerts from several different IDSs, using the IDMEF alert model and also allows the transmission of answers to received alerts, using the IDREF model of answers. With that the proposed architecture allows interoperability as of alerts and as of reply between IDSs. With that the proposed architecture allows interoperability as of alerts and as of reply between IDSs.