SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Network Attack and
Intrusion Prevention System
Deris Stiawan. Ph.D
C|EH, C|HFI
Computer Network & Information Security (COMNETS) Research Group
Universitas Sriwijaya
2017
David, S. (2012). "The state of network security." Network Security 2012(2): 14-20.
Dlamini, M. T., J. H. P. Eloff, et al. (2009). "Information security: The moving target." Computers & Security 28(3–4):
189-198.
Hansman, S. and R. Hunt (2005). "A taxonomy of network and computer attacks." Computers & Security 24: 31-43.
Reported increasing numbers of types, methods and volume of attacks
There are explosion of security threats in recent years: Trojan, virus,
worms, adware, spyware and DoS are continuing to grow, multiply,
evolve and toward future in the cyber war.
New method / trend of attack,
and cyber attack challenging
described
According to;
(CSI/FBI 2011), (CERT-IST, 2012)
(Kenneth, 2010b), (Mansfield-
Devine, 2011) and (David, 2012)
(Kenneth, 2010a), (Amoroso, 2011),
(Sommer, 2012) and (Chen et al., 2012)
Intrusion Prevention System
IPS are considered to be an extension of IDSs, although IPS and IDS both
examine network traffic searching for attacks. They both detect malicious or
unwanted traffic but IPS able to eliminate the threats traffic.
(Patel A et al., 2010; Patel A et al., 2013)
Intrusion prevention is the process of performing intrusion detection and
attempting to stop detected possible incidents.
IDS inform of a potential attack, whereas, IPS makes attempts to stop it. IPS is
designed and developed for more active protection to improve upon the IDS
and Firewall
Detection
Prevention
Reaction
Response
Firewall Features
Access Control
Policy Management
Alarm
Accuracy
Sensor
Reporting
Readiness
Early prevent
Prediction
Abstracted by;
(Manikopoulos 2003), (Zou & Towsley 2005), (Stakhanova et al. 2007), (Debar et al. 2008),
(Anuar et al. 2010), (Patel et al. 2010), (Mu et al. 2010), (K. Salah & Kahtani 2010), (Elshoush
& Osman 2011), (Patel et al. 2013)
CSI/FBI (2010) : Satisfaction With Security Technology
Patel, A., Q. Qassim, et al. (2010). "A survey of intrusion detection and prevention systems.“
Information Management & Computer Security 18(4): 277 - 290.
Comparison IDS & IPS
IDS design just only identify
and examined to produce
alarm
IPS design is to enhance data processing
ability, intelligent, accurate of it self.
- Simple pattern matching
- Stateful pattern matching
-Protocol decode-based
analysis
- Heuristic-based analysis
- Recognize attack pattern
- Blocking action
- Stateful pattern matching
- Protocol decode-based analysis
- Heuristic-based analysis
- A passive security solution
- Detect attack only after they
have entered the network,
and do nothing to stop
attacks only just attacks
traffic and send alert to
trigger.
- Active response security solution
- Early Detection, proactive technique,
early prevent the attack, when an
attack is identified then blocks the
offending data
- Commonly collected in
source sensors
- Multisensory architectures
- Enable to integrated with other
platform
- Have the ability to integrate with
heterogeneous sensor
Usefulness
Signatures
Action
Activity /
Response
Sensor
I D S I P S
The Problem & Issues IDPS
Active Reaction Passive Reaction
On-line / Off-line Detection Speed / Accuracy
Response
Time of Detection
Sniffing Packet Features Identification
Testing / Comparing
Data Sets
Identify threat
Simulation Live Environment Live attack Pentest
DARPA MIT ISCX ITD UTM
HighHumanInteraction
ResourceConsumption
TrafficData
ITD UTM Data set
Attack Pattern (sample)
ScanningBruteForceDoS
Windows Server 2003
Freebsd
Linux Redhat
(www.pcrg-utm.org/dataset)
10.10.10.15, 10.10.10.20 (Attacker’s)
10.10.10.10.5 (Redhat), 10.10.10.10 (FreeBsd), 10.10.10.25 (Windows Server 2003)
Normal & Attack Traffic
DoS
Normal / Attack ?
Normal Access:
Web 2.0 ( Video, Blog, Chat)
Penetration Testing:
Probe: Scanning, Network Mapping
U2R: Rooting, Escalating Privilege
R2L: Malware, SQL Injection, ARP
Man in the Middle Attack
DoS: ICMP Flooding
(1) How to capture, analyse the traffic and recognise threats in online
traffic?
The Research Question
(2) How to feature extracts from the TCP/IP header of packets and
decrease the dimensionality of the dataset by discarding any redundant
or irrelevant features ?
(3) What are the criteria to decide which features should be monitored
(Niemelä, 2011); (Davis and Clark, 2011) ?
(4) Is it possible for the intrusion prevention system to react automatically
to certain problems to try to contain or stop the damage (Niemi , 2012;
Stakhanova, 2007) ?
(1) Capture, analyze the traffic and recognize
(2) Feature extraction from raw data
(3) What the Relevant Parameter Features
Sensor Analyzer Reporting Event Response
SniffingModule
(4) Identify and Response Mechanism
Allow
Deny
LogNotificationCapturing
Experimental Stages
• Training the data
• The methodology
• Avoid some unexpected results
• Testing (sequence / randomize) process and
continuous
– Standard stages of observations
– Resume the results
Research: IPS
Existing method: Static Parameters for update policy
Naveed et al., (2010) Nicoletti , (2009) ;
Zhou et al., (2010)
abortion, ads,
adult, banking,
blog, chat,
drug,
ecommerce,
Gambling,
hacking, porn,
warez, etc
Wuu et al., 2007
The current methods of payload attacks have changed, modern attackers are able to change the information and
content of packets
Those solutions were only unable to identify traffic and can not detect or block threats occurring in real-time traffic
Able to identify threats without any response
method
Detection threat based on src IP, Dst IP, Packet
Length, TCP lags
URL lookup
& Content
Filtering
Able to block based on
URL & content filtering
IP Access List
Able to block threat
based on IP / Port
Wattanapongsakorn et al., (2012)Sangkatsanee et al., (2011)
Practical: IPS
Hardware / Software based
- Box devices, add on / module device for router (hardware based)
- Applications running on operating system (software based)
IPS Features from Firewall & IDS function with Unified Threat Management
- Able to stop L7 (Application), L4 (Transport), L3 (Network), L2 (Data Link)
- Firewall function: stop / reject the malicious
- IDS function: detection, monitoring and deep packet inspections
- One integration management system
Engine for device knowledge
- They have own knowledge / method or combined with Snort signature
Source: www.dtginc.net
Command Rules
Astaro Security
Gateway 110/120
Astaro Security
Gateway 220
Astaro Security
Gateway 320
Astaro Security
Gateway 425
Astaro Security
Gateway 525/525F
Environment
Small office/
branch office
Small to Medium
business
Medium business
Medium business,
enterprise division
enterprise division
Hardware
specs
3 x 10/100 Base-TX
ports
integrated HD
8 x 10/100 Base-TX
ports
integrated HD
4 x 10/100 Base-TX ports
4 x Gigabit Base-TX port
integrated HD
4 x Gigabit ports – PCI bus
4 x Gigabit ports – PCI
Express bus
Hardware acceleration card
integrated HD
Dual Intel Xeon CPU
10 x Gigabit ports – PCI
Express bus
- 525: 10 x Copper
- 525F: 4 x Copper/6 x SFP
Hardware acceleration card
2 integrated HD (RAID1) 1)
2 redundant Power supplies)
Performance
Firewall
VPN
IPS
100 Mbps
30 Mbps
55 Mbps
260 Mbps
150 Mbps
110 Mbps
420 Mbps
200 Mbps
180 Mbps
1,200 Mbps
265 Mbps
450 Mbps
3,000 Mbps
400 Mbps
750 Mbps
1) hot-swappable
Sophos Astaro: Security Gateway Appliances
Screenshot Dashboard Sophos
Screenshot Dashboard Sophos
Screenshot Dashboard Sophos
2013:05:26-17:09:24 sophos ulogd*4673+: id="2001” severity="info" sys="SecureNet"
sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="br0"
srcmac="68:ef:bd:ab:13:7f" dstmac="e4:1f:13:69:44:14"
srcip="115.239.210.27" dstip="202.9.69.90" proto="6"
length="40" tos="0x00" prec="0x00" ttl="47"
srcport="80" dstport="29238" tcpflags="ACK SYN“
Sample Log Astaro
drop tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS
(msg:"D WEB-MISC Webtrends HTTP probe"; flow:to_server,established;
content:"User-Agent|3A| Webtrends Security Analyzer|0D 0A|";
classtype:web-application-activity; sid:1101;)
Sample Rule Astaro
Testbed & Pentest
Analysis and Results
Traffic accuracy for
inbound – outbound:
(a) without policy,
(b) Other method,
(c) RT-IPS pitcher flow
Thank You
deris@ieee.org

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPSMinhaz A V
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS securityClarejenson
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systemsSeraphic Nazir
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsMohamed Jelidi
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 

Was ist angesagt? (20)

Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 

Ähnlich wie Network Attack and Intrusion Prevention System

COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsOlli-Pekka Niemi
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resumeNavya Jain
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1Ankit Gupta
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetIRJET Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 

Ähnlich wie Network Attack and Intrusion Prevention System (20)

IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Main Menu
Main MenuMain Menu
Main Menu
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systems
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 

Mehr von Deris Stiawan

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Deris Stiawan
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerDeris Stiawan
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Deris Stiawan
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeris Stiawan
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeris Stiawan
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionDeris Stiawan
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerDeris Stiawan
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Deris Stiawan
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityDeris Stiawan
 
Scanning & Penetration Testing
Scanning & Penetration Testing Scanning & Penetration Testing
Scanning & Penetration Testing Deris Stiawan
 
Snort alert signatures
Snort alert signaturesSnort alert signatures
Snort alert signaturesDeris Stiawan
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ PreventionDeris Stiawan
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting CorruptionDeris Stiawan
 

Mehr von Deris Stiawan (16)

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputer
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
 
Scanning & Penetration Testing
Scanning & Penetration Testing Scanning & Penetration Testing
Scanning & Penetration Testing
 
Snort alert signatures
Snort alert signaturesSnort alert signatures
Snort alert signatures
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
 
Wireshark
WiresharkWireshark
Wireshark
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting Corruption
 

Kürzlich hochgeladen

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 

Kürzlich hochgeladen (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Network Attack and Intrusion Prevention System

  • 1. Network Attack and Intrusion Prevention System Deris Stiawan. Ph.D C|EH, C|HFI Computer Network & Information Security (COMNETS) Research Group Universitas Sriwijaya 2017
  • 2. David, S. (2012). "The state of network security." Network Security 2012(2): 14-20.
  • 3. Dlamini, M. T., J. H. P. Eloff, et al. (2009). "Information security: The moving target." Computers & Security 28(3–4): 189-198.
  • 4.
  • 5. Hansman, S. and R. Hunt (2005). "A taxonomy of network and computer attacks." Computers & Security 24: 31-43.
  • 6. Reported increasing numbers of types, methods and volume of attacks There are explosion of security threats in recent years: Trojan, virus, worms, adware, spyware and DoS are continuing to grow, multiply, evolve and toward future in the cyber war. New method / trend of attack, and cyber attack challenging described According to; (CSI/FBI 2011), (CERT-IST, 2012) (Kenneth, 2010b), (Mansfield- Devine, 2011) and (David, 2012) (Kenneth, 2010a), (Amoroso, 2011), (Sommer, 2012) and (Chen et al., 2012)
  • 7. Intrusion Prevention System IPS are considered to be an extension of IDSs, although IPS and IDS both examine network traffic searching for attacks. They both detect malicious or unwanted traffic but IPS able to eliminate the threats traffic. (Patel A et al., 2010; Patel A et al., 2013) Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. IDS inform of a potential attack, whereas, IPS makes attempts to stop it. IPS is designed and developed for more active protection to improve upon the IDS and Firewall
  • 8. Detection Prevention Reaction Response Firewall Features Access Control Policy Management Alarm Accuracy Sensor Reporting Readiness Early prevent Prediction Abstracted by; (Manikopoulos 2003), (Zou & Towsley 2005), (Stakhanova et al. 2007), (Debar et al. 2008), (Anuar et al. 2010), (Patel et al. 2010), (Mu et al. 2010), (K. Salah & Kahtani 2010), (Elshoush & Osman 2011), (Patel et al. 2013)
  • 9. CSI/FBI (2010) : Satisfaction With Security Technology
  • 10. Patel, A., Q. Qassim, et al. (2010). "A survey of intrusion detection and prevention systems.“ Information Management & Computer Security 18(4): 277 - 290. Comparison IDS & IPS
  • 11. IDS design just only identify and examined to produce alarm IPS design is to enhance data processing ability, intelligent, accurate of it self. - Simple pattern matching - Stateful pattern matching -Protocol decode-based analysis - Heuristic-based analysis - Recognize attack pattern - Blocking action - Stateful pattern matching - Protocol decode-based analysis - Heuristic-based analysis - A passive security solution - Detect attack only after they have entered the network, and do nothing to stop attacks only just attacks traffic and send alert to trigger. - Active response security solution - Early Detection, proactive technique, early prevent the attack, when an attack is identified then blocks the offending data - Commonly collected in source sensors - Multisensory architectures - Enable to integrated with other platform - Have the ability to integrate with heterogeneous sensor Usefulness Signatures Action Activity / Response Sensor I D S I P S
  • 12. The Problem & Issues IDPS Active Reaction Passive Reaction On-line / Off-line Detection Speed / Accuracy Response Time of Detection Sniffing Packet Features Identification Testing / Comparing Data Sets Identify threat Simulation Live Environment Live attack Pentest DARPA MIT ISCX ITD UTM HighHumanInteraction ResourceConsumption TrafficData
  • 14. Attack Pattern (sample) ScanningBruteForceDoS Windows Server 2003 Freebsd Linux Redhat (www.pcrg-utm.org/dataset)
  • 15. 10.10.10.15, 10.10.10.20 (Attacker’s) 10.10.10.10.5 (Redhat), 10.10.10.10 (FreeBsd), 10.10.10.25 (Windows Server 2003)
  • 16. Normal & Attack Traffic DoS Normal / Attack ? Normal Access: Web 2.0 ( Video, Blog, Chat) Penetration Testing: Probe: Scanning, Network Mapping U2R: Rooting, Escalating Privilege R2L: Malware, SQL Injection, ARP Man in the Middle Attack DoS: ICMP Flooding
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. (1) How to capture, analyse the traffic and recognise threats in online traffic? The Research Question (2) How to feature extracts from the TCP/IP header of packets and decrease the dimensionality of the dataset by discarding any redundant or irrelevant features ? (3) What are the criteria to decide which features should be monitored (Niemelä, 2011); (Davis and Clark, 2011) ? (4) Is it possible for the intrusion prevention system to react automatically to certain problems to try to contain or stop the damage (Niemi , 2012; Stakhanova, 2007) ?
  • 24. (1) Capture, analyze the traffic and recognize
  • 25. (2) Feature extraction from raw data
  • 26. (3) What the Relevant Parameter Features
  • 27. Sensor Analyzer Reporting Event Response SniffingModule (4) Identify and Response Mechanism Allow Deny LogNotificationCapturing
  • 28. Experimental Stages • Training the data • The methodology • Avoid some unexpected results • Testing (sequence / randomize) process and continuous – Standard stages of observations – Resume the results
  • 29. Research: IPS Existing method: Static Parameters for update policy Naveed et al., (2010) Nicoletti , (2009) ; Zhou et al., (2010) abortion, ads, adult, banking, blog, chat, drug, ecommerce, Gambling, hacking, porn, warez, etc Wuu et al., 2007 The current methods of payload attacks have changed, modern attackers are able to change the information and content of packets Those solutions were only unable to identify traffic and can not detect or block threats occurring in real-time traffic Able to identify threats without any response method Detection threat based on src IP, Dst IP, Packet Length, TCP lags URL lookup & Content Filtering Able to block based on URL & content filtering IP Access List Able to block threat based on IP / Port
  • 30. Wattanapongsakorn et al., (2012)Sangkatsanee et al., (2011)
  • 31. Practical: IPS Hardware / Software based - Box devices, add on / module device for router (hardware based) - Applications running on operating system (software based) IPS Features from Firewall & IDS function with Unified Threat Management - Able to stop L7 (Application), L4 (Transport), L3 (Network), L2 (Data Link) - Firewall function: stop / reject the malicious - IDS function: detection, monitoring and deep packet inspections - One integration management system Engine for device knowledge - They have own knowledge / method or combined with Snort signature
  • 34. Astaro Security Gateway 110/120 Astaro Security Gateway 220 Astaro Security Gateway 320 Astaro Security Gateway 425 Astaro Security Gateway 525/525F Environment Small office/ branch office Small to Medium business Medium business Medium business, enterprise division enterprise division Hardware specs 3 x 10/100 Base-TX ports integrated HD 8 x 10/100 Base-TX ports integrated HD 4 x 10/100 Base-TX ports 4 x Gigabit Base-TX port integrated HD 4 x Gigabit ports – PCI bus 4 x Gigabit ports – PCI Express bus Hardware acceleration card integrated HD Dual Intel Xeon CPU 10 x Gigabit ports – PCI Express bus - 525: 10 x Copper - 525F: 4 x Copper/6 x SFP Hardware acceleration card 2 integrated HD (RAID1) 1) 2 redundant Power supplies) Performance Firewall VPN IPS 100 Mbps 30 Mbps 55 Mbps 260 Mbps 150 Mbps 110 Mbps 420 Mbps 200 Mbps 180 Mbps 1,200 Mbps 265 Mbps 450 Mbps 3,000 Mbps 400 Mbps 750 Mbps 1) hot-swappable Sophos Astaro: Security Gateway Appliances
  • 38. 2013:05:26-17:09:24 sophos ulogd*4673+: id="2001” severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="br0" srcmac="68:ef:bd:ab:13:7f" dstmac="e4:1f:13:69:44:14" srcip="115.239.210.27" dstip="202.9.69.90" proto="6" length="40" tos="0x00" prec="0x00" ttl="47" srcport="80" dstport="29238" tcpflags="ACK SYN“ Sample Log Astaro drop tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"D WEB-MISC Webtrends HTTP probe"; flow:to_server,established; content:"User-Agent|3A| Webtrends Security Analyzer|0D 0A|"; classtype:web-application-activity; sid:1101;) Sample Rule Astaro
  • 40. Analysis and Results Traffic accuracy for inbound – outbound: (a) without policy, (b) Other method, (c) RT-IPS pitcher flow
  • 41.