Flow-based compromise detection
نویسنده
چکیده
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accounts by issuing large numbers of authentication attempts on applications and daemons. Widespread targets of such attacks are Secure SHell (SSH) and Web applications, for example. The impact of brute-force attacks and compromises resulting thereof is often severe: Once compromised, attackers gain access to remote machines, allowing those machines to be misused for all sorts of criminal activities, such as sharing illegal content and participating in Distributed Denial of Service (DDoS) attacks. While the number of brute-force attacks is ever-increasing, we have seen that only few brute-force attacks actually result in a compromise. Those compromised devices are however those that require attention by security teams, as they may be misused for all sorts of malicious activities. We therefore propose a new paradigm in this thesis for monitoring network security incidents: compromise detection. Compromise detection allows security teams to focus on what is really important, namely detecting those hosts that have been compromised instead of all hosts that have been attacked. Speaking metaphorically, one could say that we target scored goals, instead of just shots on goals. A straightforward approach for compromise detection would be host-based, by analyzing network traffic and log files on individual hosts. Although this typically yields high detection accuracies, it is infeasible in large networks; These networks may comprise thousands of hosts, controlled by many persons, on which agents need to be installed. In addition, host-based approaches lack a global attack view, i.e., which hosts in the same network have been contacted by the same attacker. We therefore take a network-based approach, where sensors are deployed at strategic observation points in the network. The traditional approach would be packet-based, but both high link speeds and high data rates make the deployment of packet-based approaches rather expensive. In addition, the fact that more and more traffic is encrypted renders the analysis of full packets useless. Flow-based approaches, however, aggregate individual packets into flows, providing major advantages in terms of scalability and deployment. The main contribution of this thesis is to prove that flow-based compromise detection is viable. Our approach consists of several steps. First, we select two target applications, Web applications and SSH, which we found to be important targets of attacks on the Internet because of the high impact of a compromise and their wide deployment. Second, we analyze protocol behavior, attack tools and attack traffic to better understand the nature of these attacks. Third, we
منابع مشابه
Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملUnveiling SSHCure 3.0: Flow-based SSH Compromise Detection
Network-based intrusion detection systems have always been designed to report on the presence of attacks. Due to the sheer and ever-increasing number of attacks on the Internet, Computer Security Incident Response Teams (CSIRTs) are overwhelmed with attack reports. For that reason, there is a need for the detection of compromises rather than compromise attempts, since those incidents are the on...
متن کاملComparison of Two Flow Cytometric Methods for Detection of Human Invariant Natural Killer T Cells (iNKT)
Background: Invariant natural killer cells (iNKT) are an important immunoregulatory T cell subset. Currently several flow cytometry-based approaches exist for the identifi-cation of iNKT cells, which rely on using the 6B11 monoclonal antibody or a combina-tion of anti-Vα24 and anti-Vβ11 antibodies. Objective: The aim of this study was to compare the ability of two flow cytometry-based methods f...
متن کاملA New Changeable Bioreactor for Detection of Organophosphate in a Flow-Through System
A flow-through biosensor consisting of a fixed bed bioreactor was employed to detect the insecticideparaoxon. Based on the inhibition of organophosphorous insecticide to the enzymatic activity of acetylcholinesterase (AChE), using paraoxon as a model compound, the condition for detection of the insecticide were optimized. The influence of enzyme loading on the packing surface was studied ...
متن کاملFinal report: Human activity detection in sports video
A new human activity detection method and a new particle filter based-tennis stroke detection algorithm are proposed. Our activity detection method is based on Efros et al.’s motion descriptor[4] and Ke et al.’s event detector[7]. Since both methods use optic flow, it is easy to combine them. However, the computational cost of the training increases considerably because of the increased number ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016