Final Year Project Oral Presentation
ImplementationIntroduction
Results and
Analysis
4Conclusion
Latest Trends, Motivation
Latest Trends - Increasing Botnet Activity
Increase
57% - Attack bandwidth
(from 70 to 110 Mbps)
1800% - Packet-per-second
volume
Decrease
20.9% - Attack duration
(from 43 to 34 hours)
http://www.techspot.com/news/47582-kaspersky-ddos-attacks-57-more-powerful-in-h2-2011-russia-tops-list.html
http://www.theregister.co.uk/2012/02/08/ddos_attack_trends/
Latest Trends - Sectors
26%
21%
15%
15%
6%
6%
3% 2%
2%
4% Online shopping
Trading sites
Gaming sites
Banks
Other business-related sites
Blogs and forums
Adult content sites
Mass media
Government sites
Other
Create an efficient solution compared to
bandwidth-overprovisioning
Motivation
Initial Ideas, Design Plan, Main Implementation
Mitigation
Initial Ideas – Three-pronged approach (1)
Neutralization Attack
Absorbs the
impact of the
attack
(Intelligent Swarm
layer)
Mitigation
Initial Ideas – Three-pronged approach (1)
Neutralization Attack
Absorbs the
impact of the
attack
(Intelligent Swarm
layer)
Detection and ban
suspected attacks
(CAPTCHA, firewall,
detection methods)
Mitigation
Initial Ideas – Three-pronged approach (1)
Neutralization Attack
Shut down
source of
attack
(Counter-DDoS)
Absorbs the
impact of the
attack
(Intelligent Swarm
layer)
Detection and ban
suspected attacks
(CAPTCHA, firewall,
detection methods)
Mitigation
Initial Ideas – Three-pronged approach (1)
Neutralization Attack
Absorbs the
impact of the
attack
(Intelligent Swarm
layer)
Detection and ban
suspected attacks
(CAPTCHA, firewall,
detection methods)
Shut down
source of
attack
(Counter-DDoS)
Initial Ideas – Three-pronged approach (1)
Attack
Shut down
source of
attack
(Counter-DDoS)
1) Need to reorganize swarm layer to
create ‘flanking team’ for counter-DDoS
2) Tracing Command & Control server IP
with fast-fluxing technology
3) Retaliation by attacker
1) Need to reorganize swarm layer to
create ‘flanking team’ for counter-DDoS
2) Tracing Command & Control server IP
with fast-fluxing technology
Initial Ideas – Three-pronged approach (2)
Attack
Shut down
source of
attack
(Counter-DDoS)(Detect anomalous
traffic and send
reports to relevant
authorities)
1) Assume node within swarm layer is
compromised and sending out packet
flood
2) Classify probability of suspected IP as
C&C server using algorithms
3) Suspect list sent to authorities
Initial Ideas – Three-pronged approach (2)
5
LOIC
x IRC / Twitter
Initial Ideas – Three-pronged approach (2)
Demo
Collection
Initial Ideas – Three-pronged approach (2)
LOIC with
Hivemind
mode
(IRC)
Initial Ideas – Three-pronged approach (2)
LOIC with
Hivemind
mode
(Twitter)
Design Plan – Bandwidth Threshold Detection
QuantityCommunication
Compromised
Internal Node
Other internal or
external nodes
Threshold = 250%
Estimated Net Traffic Graph
0
5
10
15
20
25
8:00
9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
0:00
1:00
2:00
3:00
4:00
5:00
6:00
7:00
Upper Threshold Normal Traffic
(thousands)
(Time of day)
Design Plan – Bandwidth Threshold Detection
Main Implementation – Bandwidth Threshold Detection
Detection using Wireshark:
1) HTTP floods
2) SYN floods
3) UDP floods
4) ICMP floods
HTTP GET - HTTP Response
SYN ACK - SYN
Percentage
difference
between
nominal and
current log file
Main Implementation – Bandwidth Threshold Detection
Filters:
HTTP GET Response - (ip.src == 192.168.0.0/16 and http.request)
HTTP Response - (ip.dst== 192.168.0.0/16 and http.response)
SYN ACK- (tcp.flags.syn == 1 and tcp.flags.ack == 1 and ip.dst == 192.168.0.0/16)
SYN - (tcp.flags.syn == 1 and tcp.flags.ack == 0 and ip.src == 192.168.0.0/16)
UDP - (udp)
ICMP - (icmp)
Main Implementation – Bandwidth Threshold Detection
1) Wireshark > Statistics > IO Graphs
After logging:
Main Implementation – Bandwidth Threshold Detection
Note:
- HTTP and SYN
•Contains 2 rules
•‘HTTP GET Request’
exactly before
‘HTTP Response’, etc.
2) Input rules
Main Implementation – Bandwidth Threshold Detection
3) ‘Copy’
4) Open text
editor
5) ‘Paste’ and
save as a
.csv file
Main Implementation – Bandwidth Threshold Detection
Outflow.java basic flowchart
Read in
arguments
Check
argument
validity
Read in nominal
and current log
files
Compare
data
Output
results
Main Implementation – Bandwidth Threshold Detection
Sample
output
Functionality Testing, Result Summary, Analysis, Limitations
1) FileNotFound Exception
2) ArrayIndexOutOfBounds Exception
3) Invalid Arguments
Functionality Testing
Change to invalid filename
Remove column of data
Entered invalid arguments
•18 normal traffic logs
•2 malicious traffic logs
•88.89% accuracy
Result Summary
88.89% accuracy relatively effective in detecting
anomalous traffic
Suitable to integrate with:
1) Intelligent Swarm Network
2) Firewall
3) CAPTCHA
4) Other detection algorithms
Analysis
1) Compromised node
2) Perfect Nominal traffic log file
Limitations – Assumptions
1) Manual log collection
2) Analysis after logging
Limitations – Response Time
1) Irregular sample and capture time size
2) Small pulses of DDoS attacks may not be
captured with high threshold
Limitations – Logic Limitations
Three-pronged approach4
Integration of:
1) Intelligent Swarm Network
2) Firewall
3) CAPTCHA
4) ‘Outflow.java’
Allows efficient three-pronged approach in
detecting and mitigating botnets
Three-pronged approach
SCE11-0315
SCE11-0315

More Related Content

PDF
Network Security and Visibility through NetFlow
PPT
Gprs security threats and solutions
PPTX
MNSEC 2018 - Evolving DDoS Threat Landscape
PPTX
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
PDF
Zmap talk-sec13
PDF
Secured Internet Gateway for ISP with pfsense & FRR
PPTX
kiểm tra sơn ngoại thất
PPTX
B&B Overview
Network Security and Visibility through NetFlow
Gprs security threats and solutions
MNSEC 2018 - Evolving DDoS Threat Landscape
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Zmap talk-sec13
Secured Internet Gateway for ISP with pfsense & FRR
kiểm tra sơn ngoại thất
B&B Overview

Viewers also liked (8)

PDF
Cardigan le-van-sy-dang-dai- g5961 w tr-ng - balo153
PPTX
Codefor saitama 説明資料
PDF
Horizons job overview june 2015 final
DOC
Ajay Singh
PPTX
DBryant-Cybersecurity Challenge
PDF
99 költséghatékony marketingmódszer
PDF
The Guide to Medicare Preventative Services for Physicans, Providers and Supp...
PPTX
Job Search Tips & Hints
Cardigan le-van-sy-dang-dai- g5961 w tr-ng - balo153
Codefor saitama 説明資料
Horizons job overview june 2015 final
Ajay Singh
DBryant-Cybersecurity Challenge
99 költséghatékony marketingmódszer
The Guide to Medicare Preventative Services for Physicans, Providers and Supp...
Job Search Tips & Hints
Ad

Similar to SCE11-0315 (20)

PDF
DDoS Attack Detection & Mitigation in SDN
PPTX
types of firewalls ppt computer networks
PDF
Infrastructure Security
PPTX
Anomaly detection final
PPTX
anti-ddos GNTC based on P4 /BIH
PDF
Network Threat Hunting Training - 202308.pdf
PDF
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PDF
PDF
12 Years in DNS Security As a Defender
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PDF
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
PDF
Visualizing Threats: Network Visualization for Cyber Security
PDF
Paper(edited)
PDF
Having Honeypot for Better Network Security Analysis
PDF
Adversary Pattern Analysis - A Journey with APNIC Honeypot
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
PPT
rajesh swarupa
PPT
Network Security
PPT
Net Defender
PDF
BSIT3CD_Continuation of Cyber incident response (1).pdf
DDoS Attack Detection & Mitigation in SDN
types of firewalls ppt computer networks
Infrastructure Security
Anomaly detection final
anti-ddos GNTC based on P4 /BIH
Network Threat Hunting Training - 202308.pdf
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
12 Years in DNS Security As a Defender
CNIT 40: 4: Monitoring and detecting security breaches
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Visualizing Threats: Network Visualization for Cyber Security
Paper(edited)
Having Honeypot for Better Network Security Analysis
Adversary Pattern Analysis - A Journey with APNIC Honeypot
Detection of application layer ddos attack using hidden semi markov model (20...
rajesh swarupa
Network Security
Net Defender
BSIT3CD_Continuation of Cyber incident response (1).pdf
Ad

SCE11-0315

  • 1. Final Year Project Oral Presentation
  • 4. Latest Trends - Increasing Botnet Activity Increase 57% - Attack bandwidth (from 70 to 110 Mbps) 1800% - Packet-per-second volume Decrease 20.9% - Attack duration (from 43 to 34 hours) http://www.techspot.com/news/47582-kaspersky-ddos-attacks-57-more-powerful-in-h2-2011-russia-tops-list.html http://www.theregister.co.uk/2012/02/08/ddos_attack_trends/
  • 5. Latest Trends - Sectors 26% 21% 15% 15% 6% 6% 3% 2% 2% 4% Online shopping Trading sites Gaming sites Banks Other business-related sites Blogs and forums Adult content sites Mass media Government sites Other
  • 6. Create an efficient solution compared to bandwidth-overprovisioning Motivation
  • 7. Initial Ideas, Design Plan, Main Implementation
  • 8. Mitigation Initial Ideas – Three-pronged approach (1) Neutralization Attack Absorbs the impact of the attack (Intelligent Swarm layer)
  • 9. Mitigation Initial Ideas – Three-pronged approach (1) Neutralization Attack Absorbs the impact of the attack (Intelligent Swarm layer) Detection and ban suspected attacks (CAPTCHA, firewall, detection methods)
  • 10. Mitigation Initial Ideas – Three-pronged approach (1) Neutralization Attack Shut down source of attack (Counter-DDoS) Absorbs the impact of the attack (Intelligent Swarm layer) Detection and ban suspected attacks (CAPTCHA, firewall, detection methods)
  • 11. Mitigation Initial Ideas – Three-pronged approach (1) Neutralization Attack Absorbs the impact of the attack (Intelligent Swarm layer) Detection and ban suspected attacks (CAPTCHA, firewall, detection methods) Shut down source of attack (Counter-DDoS)
  • 12. Initial Ideas – Three-pronged approach (1) Attack Shut down source of attack (Counter-DDoS) 1) Need to reorganize swarm layer to create ‘flanking team’ for counter-DDoS 2) Tracing Command & Control server IP with fast-fluxing technology 3) Retaliation by attacker 1) Need to reorganize swarm layer to create ‘flanking team’ for counter-DDoS 2) Tracing Command & Control server IP with fast-fluxing technology
  • 13. Initial Ideas – Three-pronged approach (2) Attack Shut down source of attack (Counter-DDoS)(Detect anomalous traffic and send reports to relevant authorities) 1) Assume node within swarm layer is compromised and sending out packet flood 2) Classify probability of suspected IP as C&C server using algorithms 3) Suspect list sent to authorities
  • 14. Initial Ideas – Three-pronged approach (2) 5 LOIC x IRC / Twitter
  • 15. Initial Ideas – Three-pronged approach (2) Demo Collection
  • 16. Initial Ideas – Three-pronged approach (2) LOIC with Hivemind mode (IRC)
  • 17. Initial Ideas – Three-pronged approach (2) LOIC with Hivemind mode (Twitter)
  • 18. Design Plan – Bandwidth Threshold Detection QuantityCommunication Compromised Internal Node Other internal or external nodes Threshold = 250%
  • 19. Estimated Net Traffic Graph 0 5 10 15 20 25 8:00 9:00 10:00 11:00 12:00 13:00 14:00 15:00 16:00 17:00 18:00 19:00 20:00 21:00 22:00 23:00 0:00 1:00 2:00 3:00 4:00 5:00 6:00 7:00 Upper Threshold Normal Traffic (thousands) (Time of day) Design Plan – Bandwidth Threshold Detection
  • 20. Main Implementation – Bandwidth Threshold Detection Detection using Wireshark: 1) HTTP floods 2) SYN floods 3) UDP floods 4) ICMP floods HTTP GET - HTTP Response SYN ACK - SYN Percentage difference between nominal and current log file
  • 21. Main Implementation – Bandwidth Threshold Detection Filters: HTTP GET Response - (ip.src == 192.168.0.0/16 and http.request) HTTP Response - (ip.dst== 192.168.0.0/16 and http.response) SYN ACK- (tcp.flags.syn == 1 and tcp.flags.ack == 1 and ip.dst == 192.168.0.0/16) SYN - (tcp.flags.syn == 1 and tcp.flags.ack == 0 and ip.src == 192.168.0.0/16) UDP - (udp) ICMP - (icmp)
  • 22. Main Implementation – Bandwidth Threshold Detection 1) Wireshark > Statistics > IO Graphs After logging:
  • 23. Main Implementation – Bandwidth Threshold Detection Note: - HTTP and SYN •Contains 2 rules •‘HTTP GET Request’ exactly before ‘HTTP Response’, etc. 2) Input rules
  • 24. Main Implementation – Bandwidth Threshold Detection 3) ‘Copy’ 4) Open text editor 5) ‘Paste’ and save as a .csv file
  • 25. Main Implementation – Bandwidth Threshold Detection Outflow.java basic flowchart Read in arguments Check argument validity Read in nominal and current log files Compare data Output results
  • 26. Main Implementation – Bandwidth Threshold Detection Sample output
  • 27. Functionality Testing, Result Summary, Analysis, Limitations
  • 28. 1) FileNotFound Exception 2) ArrayIndexOutOfBounds Exception 3) Invalid Arguments Functionality Testing Change to invalid filename Remove column of data Entered invalid arguments
  • 29. •18 normal traffic logs •2 malicious traffic logs •88.89% accuracy Result Summary
  • 30. 88.89% accuracy relatively effective in detecting anomalous traffic Suitable to integrate with: 1) Intelligent Swarm Network 2) Firewall 3) CAPTCHA 4) Other detection algorithms Analysis
  • 31. 1) Compromised node 2) Perfect Nominal traffic log file Limitations – Assumptions
  • 32. 1) Manual log collection 2) Analysis after logging Limitations – Response Time
  • 33. 1) Irregular sample and capture time size 2) Small pulses of DDoS attacks may not be captured with high threshold Limitations – Logic Limitations
  • 35. Integration of: 1) Intelligent Swarm Network 2) Firewall 3) CAPTCHA 4) ‘Outflow.java’ Allows efficient three-pronged approach in detecting and mitigating botnets Three-pronged approach

Editor's Notes

  • #7: Spend 75% more for extra bandwidth. Furthermore, Bandwidth overprovisioning is not the cheapest nor most productive solution to the problem as it is only used to counter against the worst outcome possible
  • #19: Focus on the attack portion