SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
ANOMALY DETECTION
ANALYSIS AND EMULATION WITH
DETERLAB
MAJOR PROJECT 2013-14
SWATI JAIN - 10503851
PUJA AGRAWAL - 10503857
AKSHAY BANSAL - 10503878
BATCH - B11
PROBLEM STATEMENT
• This research-based project attempts to :
• analyze and emulate anomaly detection techniques.
• Use as Case study : low-rate (pulsating) TCP - targeted
Denial of Service attacks due to their ease of launch,
stealthy and damaging nature.
• Use DETER test-bed to emulate such attacks.
• Plans to design an extensive anomaly checkpoint detection
methodology for the same.
BACKGROUND STUDY
• DeterLab :
• Acronym for cyber Defense Technology Experimental
Research network lab.
• DeterLab provides an open, remotely accessible, shared
network research lab.
• Facilities include networking and computing resources, and
an expanding set of tools for using them to construct and
operate experiments.
• An emulation test-bed that allows researchers to evaluate
Internet security technologies.
BACKGROUND STUDY
• Changepoint Detection:
• Study of techniques to detect a change (“disorder”) in the
state of a time process, usually from “normal” to
“abnormal”.
• Time instance at which the state of the process changes is
referred to as the changepoint.
• Challenge : changepoint not known in advance.
NOVELTY
• This algorithm implemented on the DoS attacks (Feb, 2013), till
now, has not been tested on the case of Low - rate Denial of
Service attacks.
• We had to modify the algorithm in keeping with the case study
of the LDoS attack.
• The likelihood ratio based Shiryaev–Roberts procedure has
appealing optimality properties.
• DeterLab is used to simulate, analyze and emulate the whole
project, compared to network simulator – based analysis of
such attacks.
• This project has attempted to test the algorithm results in a real
- time scenario.
NEW TOOLS
• Deterlab:
• We use the resources and networking facilities provided by
DeterLab to simulate, analyze and emulate the attack. The
network topology is created in DeterLab, and the required
attack simulated on end - nodes.
• SEER :
• The SEER workbench contains a packet flooder module
which allows the user to manually introduce attack traffic
into a running experiment
NEW TOOLS
• PuTTY :
• PuTTY is a free and open-source terminal emulator, serial
console and network file transfer application.
• We use this software to ssh login to the users.isi.deterlab.net ,
so as to access the tcpdump (log) file of the victim's traffic.
• This way we analyze the ingress and egress traffic of the
target victim node.
• PSCP :
• PSCP is a freeware SCP (Secure CoPy) program for the
Windows command line processor.
• We use this software to secure copy from users.deterlab.net
to our local system.
NEW TOOLS
• Iperf :
• This tools is used to measure network performance. Iperf was
originally developed by NLANR/DAST as a modern alternative for
measuring TCP and UDP bandwidth performance.
• Iperf is a tool to measure maximum TCP bandwidth, allowing the
tuning of various parameters and UDP characteristics. Iperf
reports bandwidth and datagram loss.
• Cwnd_track :
• This tool is loosely based on tmeas(tool that records a number of
system level statistics). The purpose of the tool is pretty limited in
its current form. The main goal is to poll TCP congestion window
(Cwnd) values for a given IP. If there is no connection to the
provided IP address, the tool waits and logs nothing. Once the
connection appears, the tool logs the value along with the time
stamp.
NEW TOOLS
• TCPDump :
• Tcpdump, a powerful command-line packet analyzer; and
libpcap, a portable C/C++ library for network traffic
capture.
• Tcpdump prints out a description of the contents of packets
on a network interface that match the boolean expression.
It can also be run with the -w flag, which causes it to save
the packet data to a file for later analysis, and/or with the -r
flag, which causes it to read from a saved packet file rather
than to read packets from a network interface. It can also
be run with the -V flag, which causes it to read a list of
saved packet files. In all cases, only packets that match
expression will be processed by tcpdump.
PROPOSED ALGORITHM
• Divide traffic into groups of random observations
such that X1, X2,....., Xn, each distributed
according to a known probability density function
(pdf) f
• with pdf .
• : data changes statistical profile
at time instance v = k.
• : Null Hypothesis : No attack ever
occurs.
PROPOSED ALGORITHM
MODIFIED ALGORITHM
• Likelihood Statistic :
• Detection statistic :
• Log-likelihood ratio :
• Stopping Rule :
min
MODIFIED ALGORITHM
• There may be points, where the observed data
appears to be normal, but the detection statistic
shows it to be an anomaly, which surpasses the
threshold set for this test. This is an indication of a
false alarm, since no changepoint has been
detected in the observed data prior to this false
alarm.
• If the corresponding detection statistic graph shows
a peak after the checkpoint, which surpasses the
threshold, it confirms the presence of an anomaly in
the network flow. This time of detection, it calls as
the Detection Point.
RESULT - DETECTION STATISTIC IN
CASE OF LEGIT TRAFFIC
RESULT - CONGESTION WINDOW IN
CASE OF LEGIT TRAFFIC
RESULT - DETECTION STATISTIC IN
CASE OF ATTACK TRAFFIC
RESULT - CONGESTION WINDOW IN
CASE OF LEGIT TRAFFIC
Fig. General flow diagram of Project Modules.
Fig. sequence diagram
Fig. Overall design/architecture
RISK AND MITIGATION
RISK AND MITIGATION
Figure: The Interrelationship Graph (IG)
RISK AND MITIGATION
Table : Risk Area Wise Total Weighting Factor:
TESTING
TESTING
CURRENT/OPEN PROBLEMS
• Detection delay time : To detect changes in the
statistical profile of network traffic as rapidly as
possible, while maintaining a tolerable level of the
risk of making a false detection.
• Our aim is to detect that the observations’ common
distribution has changed. The challenge is to do so
with as few observations as possible following the
changepoint.
CURRENT/OPEN PROBLEMS
• For a successful sequential analysis of anomalies in
a network traffic sample, we must :
• minimize the detection time given fixed false alarm and
misdetection rates
• balance the tradeoff between these three quantities (false
alarm, misdetection rate, detection time) effectively.
REFERENCES
1. Chertov ,R. Fahmy, S. Shroff, N. B. and Purdue University, Fidelity of Network
Simulation and Emulation: A Case Study of TCP - Targeted Denial of Service
Attacks, Journal ACM Transactions on Modeling and Computer Simulation
Volume 19 Issue 1 Article No. 4, December 2008.
2. Tartakovsky,A.G. Senior Member, IEEE, Polunchenko, A.S and Sokolov. G.
Efficient Computer Network Anomaly Detection by Changepoint Detection
Methods, IEEE journal of selected topics in signal processing, vol. 7, no. 1,
2013.
3. Chertov ,R. Fahmy, S. Shroff, N. B. High Fidelity Denial of Service (DoS)
Experimentation, Proceedings of the DETER Community Workshop on Cyber
Security Experimentation, 2006.
4. Tan, Z. Jamdagni, A. He, X. Nanda, P. and Liu, R.P. Triangle-Area-Based
Multivariate Correlation Analysis for Effective Denial-of-Service Attack
Detection, IEEE 11th International Conference on Trust, Security and Privacy
in Computing and Communications ISBN: 978-0-7695-4745-9, 2012.
5. Tamilarasan,A. Mukkamala, S. and Sung, A.H. Yendrapalli, K. Feature Ranking
and Selection for Intrusion Detection Using Artificial Neural Networks and
Statistical Methods, Proceeding CCNC'09 Proceedings of the 6th IEEE
Conference on Consumer Communications and Networking Conference
Pages 1066-1073 ISBN: 978-1-4244-2308-8, 2006.
REFERENCES
6. Mathew, R. and Katkar,V. Survey of Low Rate DoS Attack Detection
Mechanisms, ICWET '11 Proceedings of the International Conference &
Workshop on Emerging Trends in Technology Pages 955-958 ISBN: 978-1-4503-
0449-8, 2011.
7. Kuzmanovic, A. and Knightly, E.W. Senior Member, IEEE, Low-Rate TCP-
Targeted Denial of Service Attacks and Counter Strategies, IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, 2006.
8. Ektefa, M. Memar, S. and Sidi, F. Affendey, L. S. Intrusion Detection Using
Data Mining Techniques , Information Retrieval & Knowledge Management,
(CAMP), 2010 International Conference on 17-18 March 2010 Page(s):200 –
203 Print ISBN: 978-1-4244-5650-5, 2010.
9. Liu, Z. and Guan, L. Attack simulation and signature extraction of low-rate
DoS , Intelligent Information Technology and Security Informatics (IITSI), 2010
Third International Symposium on 2-4 April 2010 Page(s):544 – 548 Print ISBN:
978-1-4244-6730-3, 2010.
10. Efstathopoulos, P. Practical Study of a Defense Against Low-Rate TCP-
Targeted DoS Attack, Internet Technology and Secured Transactions, 2009.
ICITST 2009. International Conference form 9-12 Nov. 2009 Page(s):1 – 6 Print
ISBN:978-1-4244-5647-5, 2009.
REFERENCES
11. Thatte, G. Mitra, U. and Heidemann, J. Detection of Low-Rate Attacks in
Computer Networks, INFOCOM Workshops 2008, IEEE from 13-18 April 2008
Page(s): 1 – 6 Print ISBN:978-1-4244-2219-7 , 2008.
12. TSUNODA, H. KARA, A. Waizumi, Y. Ansari N. and NEMOTO, Y. Detecting
Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition,
Communications, 2008. ICC '08. IEEE International Conference on 19-23 May
2008 Page(s):1670 – 1674 Print ISBN 978-1-4244-2075-9, 2008.
13. Yu, Y. A Survey of anomaly intrusion detection techniques, Journal of
Computing Sciences in Colleges archive Volume 28 Issue 1, October 2012
Pages 9-17, 2012.
14. Mathew, R. and Katkar, V. Survey of Low Rate DoS Attack Detection
Mechanisms, ICWET '11 Proceedings of the International Conference &
Workshop on Emerging Trends in Technology Pages 955-958 ISBN: 978-1-
4503-0449-8, 2011.
REFERENCES
15. SEER & DeterLab
• http://seer.deterlab.net/v1.6/
• https://www.isi.deterlab.net/showosid_list.php
• https://education.deterlab.net/DETERintro/DETERintro.html
• https://trac.deterlab.net/wiki/Tutorial
16. TcpDump file
• http://seer.deterlab.net/v1.6/user/analysis.html
17. PUTTY
• http://en.wikipedia.org/wiki/Secure_Shell#File_transfer_protocols_using_SSH
• http://www-scf.usc.edu/~csci530l/instructions/lab-deter-winconnect.htm
18. SSH Logging
• https://education.deterlab.net/DETERintro/ssh.html
• https://trac.deterlab.net/wiki/DETERSSH
19. PSCP
• http://en.wikipedia.org/wiki/Network_File_System_%28protocol%29

Más contenido relacionado

La actualidad más candente

Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...Pavel Popa
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanismibnu mubarok
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Valentin Thirion
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...ijsrd.com
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorIJECEIAES
 
Replay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsReplay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsDETER-Project
 
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...I3E Technologies
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsUltraUploader
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualizationamiable_indian
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsjpstudcorner
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Pvrtechnologies Nellore
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploitsamiable_indian
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 

La actualidad más candente (20)

Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
 
Replay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsReplay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network Testbeds
 
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKS...
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flows
 
Qualifying exam-2015-final
Qualifying exam-2015-finalQualifying exam-2015-final
Qualifying exam-2015-final
 
Mitm
MitmMitm
Mitm
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
714 728
714 728714 728
714 728
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 

Destacado

Additional themes of data mining for Msc CS
Additional themes of data mining for Msc CSAdditional themes of data mining for Msc CS
Additional themes of data mining for Msc CSThanveen
 
The definition of normal - An introduction and guide to anomaly detection.
The definition of normal - An introduction and guide to anomaly detection. The definition of normal - An introduction and guide to anomaly detection.
The definition of normal - An introduction and guide to anomaly detection. Alois Reitbauer
 
Which Algorithms Really Matter
Which Algorithms Really MatterWhich Algorithms Really Matter
Which Algorithms Really MatterTed Dunning
 
ULIS in "Smart Buildings"
ULIS in "Smart Buildings" ULIS in "Smart Buildings"
ULIS in "Smart Buildings" ULIS
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceJason Trost
 
Real time-hadoop
Real time-hadoopReal time-hadoop
Real time-hadoopTed Dunning
 
Strata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionStrata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionTed Dunning
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Data analysis trend 2015 2016 v071
Data analysis trend 2015 2016 v071Data analysis trend 2015 2016 v071
Data analysis trend 2015 2016 v071Chun Myung Kyu
 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsBigPanda
 
Anomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine LearningAnomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine LearningTed Dunning
 
Energy and Smart Building technologies 2014
Energy and Smart Building technologies 2014Energy and Smart Building technologies 2014
Energy and Smart Building technologies 2014BSRIA
 
Machine Learning Summer School 2016
Machine Learning Summer School 2016Machine Learning Summer School 2016
Machine Learning Summer School 2016chris wiggins
 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAdam Gibson
 
data science: past present & future [American Statistical Association (ASA) C...
data science: past present & future [American Statistical Association (ASA) C...data science: past present & future [American Statistical Association (ASA) C...
data science: past present & future [American Statistical Association (ASA) C...chris wiggins
 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Adam Gibson
 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learningAdam Gibson
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Smart Homes and Buildings
Smart Homes and Buildings Smart Homes and Buildings
Smart Homes and Buildings BSRIA
 

Destacado (20)

Additional themes of data mining for Msc CS
Additional themes of data mining for Msc CSAdditional themes of data mining for Msc CS
Additional themes of data mining for Msc CS
 
The definition of normal - An introduction and guide to anomaly detection.
The definition of normal - An introduction and guide to anomaly detection. The definition of normal - An introduction and guide to anomaly detection.
The definition of normal - An introduction and guide to anomaly detection.
 
Which Algorithms Really Matter
Which Algorithms Really MatterWhich Algorithms Really Matter
Which Algorithms Really Matter
 
ULIS in "Smart Buildings"
ULIS in "Smart Buildings" ULIS in "Smart Buildings"
ULIS in "Smart Buildings"
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
Real time-hadoop
Real time-hadoopReal time-hadoop
Real time-hadoop
 
Strata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionStrata 2014 Anomaly Detection
Strata 2014 Anomaly Detection
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Data analysis trend 2015 2016 v071
Data analysis trend 2015 2016 v071Data analysis trend 2015 2016 v071
Data analysis trend 2015 2016 v071
 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOps
 
Anomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine LearningAnomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine Learning
 
Energy and Smart Building technologies 2014
Energy and Smart Building technologies 2014Energy and Smart Building technologies 2014
Energy and Smart Building technologies 2014
 
Smart Buildings & IoT
Smart Buildings & IoTSmart Buildings & IoT
Smart Buildings & IoT
 
Machine Learning Summer School 2016
Machine Learning Summer School 2016Machine Learning Summer School 2016
Machine Learning Summer School 2016
 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) English
 
data science: past present & future [American Statistical Association (ASA) C...
data science: past present & future [American Statistical Association (ASA) C...data science: past present & future [American Statistical Association (ASA) C...
data science: past present & future [American Statistical Association (ASA) C...
 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)
 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learning
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Smart Homes and Buildings
Smart Homes and Buildings Smart Homes and Buildings
Smart Homes and Buildings
 

Similar a Anomaly detection final

Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersJoshua Gorinson
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...IJECEIAES
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...IRJET Journal
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and DesingMd Khaza Main Uddin
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJuanita McConnell
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Critical analysis of radar data signal de noising by implementation of haar w...
Critical analysis of radar data signal de noising by implementation of haar w...Critical analysis of radar data signal de noising by implementation of haar w...
Critical analysis of radar data signal de noising by implementation of haar w...eSAT Journals
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
Network forensics
Network forensicsNetwork forensics
Network forensicsArthyR3
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 

Similar a Anomaly detection final (20)

Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Critical analysis of radar data signal de noising by implementation of haar w...
Critical analysis of radar data signal de noising by implementation of haar w...Critical analysis of radar data signal de noising by implementation of haar w...
Critical analysis of radar data signal de noising by implementation of haar w...
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 

Último

Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxPoonam60376
 
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Amil baba
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptxAdityaGoogle
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 

Último (20)

Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptx
 
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 

Anomaly detection final

  • 1. ANOMALY DETECTION ANALYSIS AND EMULATION WITH DETERLAB MAJOR PROJECT 2013-14 SWATI JAIN - 10503851 PUJA AGRAWAL - 10503857 AKSHAY BANSAL - 10503878 BATCH - B11
  • 2. PROBLEM STATEMENT • This research-based project attempts to : • analyze and emulate anomaly detection techniques. • Use as Case study : low-rate (pulsating) TCP - targeted Denial of Service attacks due to their ease of launch, stealthy and damaging nature. • Use DETER test-bed to emulate such attacks. • Plans to design an extensive anomaly checkpoint detection methodology for the same.
  • 3. BACKGROUND STUDY • DeterLab : • Acronym for cyber Defense Technology Experimental Research network lab. • DeterLab provides an open, remotely accessible, shared network research lab. • Facilities include networking and computing resources, and an expanding set of tools for using them to construct and operate experiments. • An emulation test-bed that allows researchers to evaluate Internet security technologies.
  • 4. BACKGROUND STUDY • Changepoint Detection: • Study of techniques to detect a change (“disorder”) in the state of a time process, usually from “normal” to “abnormal”. • Time instance at which the state of the process changes is referred to as the changepoint. • Challenge : changepoint not known in advance.
  • 5. NOVELTY • This algorithm implemented on the DoS attacks (Feb, 2013), till now, has not been tested on the case of Low - rate Denial of Service attacks. • We had to modify the algorithm in keeping with the case study of the LDoS attack. • The likelihood ratio based Shiryaev–Roberts procedure has appealing optimality properties. • DeterLab is used to simulate, analyze and emulate the whole project, compared to network simulator – based analysis of such attacks. • This project has attempted to test the algorithm results in a real - time scenario.
  • 6. NEW TOOLS • Deterlab: • We use the resources and networking facilities provided by DeterLab to simulate, analyze and emulate the attack. The network topology is created in DeterLab, and the required attack simulated on end - nodes. • SEER : • The SEER workbench contains a packet flooder module which allows the user to manually introduce attack traffic into a running experiment
  • 7. NEW TOOLS • PuTTY : • PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. • We use this software to ssh login to the users.isi.deterlab.net , so as to access the tcpdump (log) file of the victim's traffic. • This way we analyze the ingress and egress traffic of the target victim node. • PSCP : • PSCP is a freeware SCP (Secure CoPy) program for the Windows command line processor. • We use this software to secure copy from users.deterlab.net to our local system.
  • 8. NEW TOOLS • Iperf : • This tools is used to measure network performance. Iperf was originally developed by NLANR/DAST as a modern alternative for measuring TCP and UDP bandwidth performance. • Iperf is a tool to measure maximum TCP bandwidth, allowing the tuning of various parameters and UDP characteristics. Iperf reports bandwidth and datagram loss. • Cwnd_track : • This tool is loosely based on tmeas(tool that records a number of system level statistics). The purpose of the tool is pretty limited in its current form. The main goal is to poll TCP congestion window (Cwnd) values for a given IP. If there is no connection to the provided IP address, the tool waits and logs nothing. Once the connection appears, the tool logs the value along with the time stamp.
  • 9. NEW TOOLS • TCPDump : • Tcpdump, a powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture. • Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -r flag, which causes it to read from a saved packet file rather than to read packets from a network interface. It can also be run with the -V flag, which causes it to read a list of saved packet files. In all cases, only packets that match expression will be processed by tcpdump.
  • 10. PROPOSED ALGORITHM • Divide traffic into groups of random observations such that X1, X2,....., Xn, each distributed according to a known probability density function (pdf) f • with pdf . • : data changes statistical profile at time instance v = k. • : Null Hypothesis : No attack ever occurs.
  • 12. MODIFIED ALGORITHM • Likelihood Statistic : • Detection statistic : • Log-likelihood ratio : • Stopping Rule : min
  • 13. MODIFIED ALGORITHM • There may be points, where the observed data appears to be normal, but the detection statistic shows it to be an anomaly, which surpasses the threshold set for this test. This is an indication of a false alarm, since no changepoint has been detected in the observed data prior to this false alarm. • If the corresponding detection statistic graph shows a peak after the checkpoint, which surpasses the threshold, it confirms the presence of an anomaly in the network flow. This time of detection, it calls as the Detection Point.
  • 14. RESULT - DETECTION STATISTIC IN CASE OF LEGIT TRAFFIC
  • 15. RESULT - CONGESTION WINDOW IN CASE OF LEGIT TRAFFIC
  • 16. RESULT - DETECTION STATISTIC IN CASE OF ATTACK TRAFFIC
  • 17. RESULT - CONGESTION WINDOW IN CASE OF LEGIT TRAFFIC
  • 18. Fig. General flow diagram of Project Modules.
  • 22. RISK AND MITIGATION Figure: The Interrelationship Graph (IG)
  • 23. RISK AND MITIGATION Table : Risk Area Wise Total Weighting Factor:
  • 26. CURRENT/OPEN PROBLEMS • Detection delay time : To detect changes in the statistical profile of network traffic as rapidly as possible, while maintaining a tolerable level of the risk of making a false detection. • Our aim is to detect that the observations’ common distribution has changed. The challenge is to do so with as few observations as possible following the changepoint.
  • 27. CURRENT/OPEN PROBLEMS • For a successful sequential analysis of anomalies in a network traffic sample, we must : • minimize the detection time given fixed false alarm and misdetection rates • balance the tradeoff between these three quantities (false alarm, misdetection rate, detection time) effectively.
  • 28. REFERENCES 1. Chertov ,R. Fahmy, S. Shroff, N. B. and Purdue University, Fidelity of Network Simulation and Emulation: A Case Study of TCP - Targeted Denial of Service Attacks, Journal ACM Transactions on Modeling and Computer Simulation Volume 19 Issue 1 Article No. 4, December 2008. 2. Tartakovsky,A.G. Senior Member, IEEE, Polunchenko, A.S and Sokolov. G. Efficient Computer Network Anomaly Detection by Changepoint Detection Methods, IEEE journal of selected topics in signal processing, vol. 7, no. 1, 2013. 3. Chertov ,R. Fahmy, S. Shroff, N. B. High Fidelity Denial of Service (DoS) Experimentation, Proceedings of the DETER Community Workshop on Cyber Security Experimentation, 2006. 4. Tan, Z. Jamdagni, A. He, X. Nanda, P. and Liu, R.P. Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications ISBN: 978-0-7695-4745-9, 2012. 5. Tamilarasan,A. Mukkamala, S. and Sung, A.H. Yendrapalli, K. Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods, Proceeding CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference Pages 1066-1073 ISBN: 978-1-4244-2308-8, 2006.
  • 29. REFERENCES 6. Mathew, R. and Katkar,V. Survey of Low Rate DoS Attack Detection Mechanisms, ICWET '11 Proceedings of the International Conference & Workshop on Emerging Trends in Technology Pages 955-958 ISBN: 978-1-4503- 0449-8, 2011. 7. Kuzmanovic, A. and Knightly, E.W. Senior Member, IEEE, Low-Rate TCP- Targeted Denial of Service Attacks and Counter Strategies, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, 2006. 8. Ektefa, M. Memar, S. and Sidi, F. Affendey, L. S. Intrusion Detection Using Data Mining Techniques , Information Retrieval & Knowledge Management, (CAMP), 2010 International Conference on 17-18 March 2010 Page(s):200 – 203 Print ISBN: 978-1-4244-5650-5, 2010. 9. Liu, Z. and Guan, L. Attack simulation and signature extraction of low-rate DoS , Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on 2-4 April 2010 Page(s):544 – 548 Print ISBN: 978-1-4244-6730-3, 2010. 10. Efstathopoulos, P. Practical Study of a Defense Against Low-Rate TCP- Targeted DoS Attack, Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference form 9-12 Nov. 2009 Page(s):1 – 6 Print ISBN:978-1-4244-5647-5, 2009.
  • 30. REFERENCES 11. Thatte, G. Mitra, U. and Heidemann, J. Detection of Low-Rate Attacks in Computer Networks, INFOCOM Workshops 2008, IEEE from 13-18 April 2008 Page(s): 1 – 6 Print ISBN:978-1-4244-2219-7 , 2008. 12. TSUNODA, H. KARA, A. Waizumi, Y. Ansari N. and NEMOTO, Y. Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition, Communications, 2008. ICC '08. IEEE International Conference on 19-23 May 2008 Page(s):1670 – 1674 Print ISBN 978-1-4244-2075-9, 2008. 13. Yu, Y. A Survey of anomaly intrusion detection techniques, Journal of Computing Sciences in Colleges archive Volume 28 Issue 1, October 2012 Pages 9-17, 2012. 14. Mathew, R. and Katkar, V. Survey of Low Rate DoS Attack Detection Mechanisms, ICWET '11 Proceedings of the International Conference & Workshop on Emerging Trends in Technology Pages 955-958 ISBN: 978-1- 4503-0449-8, 2011.
  • 31. REFERENCES 15. SEER & DeterLab • http://seer.deterlab.net/v1.6/ • https://www.isi.deterlab.net/showosid_list.php • https://education.deterlab.net/DETERintro/DETERintro.html • https://trac.deterlab.net/wiki/Tutorial 16. TcpDump file • http://seer.deterlab.net/v1.6/user/analysis.html 17. PUTTY • http://en.wikipedia.org/wiki/Secure_Shell#File_transfer_protocols_using_SSH • http://www-scf.usc.edu/~csci530l/instructions/lab-deter-winconnect.htm 18. SSH Logging • https://education.deterlab.net/DETERintro/ssh.html • https://trac.deterlab.net/wiki/DETERSSH 19. PSCP • http://en.wikipedia.org/wiki/Network_File_System_%28protocol%29