際際滷

際際滷Share a Scribd company logo
IP Flow based intrusion detection


    Arangamanikkannan Manickam
IP Flow based Intrusion Detection


                Presented by
         Arangamanikkannan Manickam
Section Title
Overview
Issues with payload based NIDS
IP flow based intrusion detection
Sampling

    State information kept for each active flow

    Flow look-up for each incoming packet puts heavy
    demand on CPU and memory resources

    IETF PSAMP working group creating standards for
    sampling

    Makes intrusion detection harder

    Two categories:
         Packet sampling
         Flow Sampling
Sampling...

    Packet Sampling
          Systematic Sampling
             
                 Time-driven sampling
             
                 Event-driven sampling
          Random Sampling
             
                 Probability distribution function is used
                       n-inN sampling
                       Probabilistic sampling
Sampling...

    Flow Sampling
          Similar to random packet sampling
          Sample and hold method
             
                 A new incoming packet that does not
                 belong to existing flow leads to the creation
                 of new flow entry with probability p.
          Smart Sampling
             
                 Dynamically controls the size of sampled
                 data
             
                 Threshold sampling and priority
                 sampling
          Flow sampling probability depending on
Attack Classification

    Physical attacks

    Buffer overflow attacks

    Password attacks

    (Distributed) Denial of Service attacks

    Information gathering attacks

    Trojan horses

    Worms

    Viruses
Attack classification...

    Botnets
           Group of computers infected with
            malicious programs that cause them to
            operate against their owners' intentions
            and without their knowledge
           Remotely controlled by bot-masters
           Perfect for performing distributed attacks
Flow based Intrusion detection

    As it relies only the header information it
    addresses the following attacks
           Denial of service
           Scans
           Worms
           Botnets
IP flow based intrusion detection
Ad

Recommended

Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
IOSR Journals
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
IJECEIAES
DDOS
DDOS
Maulik Kotak
Stock Motion/Gambit and deadpool part 2
Stock Motion/Gambit and deadpool part 2
maggotmatt676
Stock Motion/Gambit and deadpool 3
Stock Motion/Gambit and deadpool 3
maggotmatt676
Question 1 Updated
Question 1 Updated
maggotmatt676
Evalution: Question 1
Evalution: Question 1
maggotmatt676
Question 4
Question 4
maggotmatt676
Network forensics1
Network forensics1
Santosh Khadsare
Malware Analysis and Prediction System
Malware Analysis and Prediction System
Azri Hafiz
System hijacking using rat
System hijacking using rat
n|u - The Open Security Community
Intrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
antoniomorancardenas
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
Rineri1
Entropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
Antiy Labs
ids.ppt
ids.ppt
Agostinho9
Intrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma

More Related Content

Similar to IP flow based intrusion detection (9)

Network forensics1
Network forensics1
Santosh Khadsare
Malware Analysis and Prediction System
Malware Analysis and Prediction System
Azri Hafiz
System hijacking using rat
System hijacking using rat
n|u - The Open Security Community
Intrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
antoniomorancardenas
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
Rineri1
Entropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
Antiy Labs
ids.ppt
ids.ppt
Agostinho9
Intrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
Malware Analysis and Prediction System
Malware Analysis and Prediction System
Azri Hafiz
Intrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
antoniomorancardenas
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
Rineri1
Entropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
Antiy Labs
Intrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma

IP flow based intrusion detection

  • 1. IP Flow based intrusion detection Arangamanikkannan Manickam
  • 2. IP Flow based Intrusion Detection Presented by Arangamanikkannan Manickam
  • 5. Issues with payload based NIDS
  • 7. Sampling State information kept for each active flow Flow look-up for each incoming packet puts heavy demand on CPU and memory resources IETF PSAMP working group creating standards for sampling Makes intrusion detection harder Two categories: Packet sampling Flow Sampling
  • 8. Sampling... Packet Sampling Systematic Sampling Time-driven sampling Event-driven sampling Random Sampling Probability distribution function is used n-inN sampling Probabilistic sampling
  • 9. Sampling... Flow Sampling Similar to random packet sampling Sample and hold method A new incoming packet that does not belong to existing flow leads to the creation of new flow entry with probability p. Smart Sampling Dynamically controls the size of sampled data Threshold sampling and priority sampling Flow sampling probability depending on
  • 10. Attack Classification Physical attacks Buffer overflow attacks Password attacks (Distributed) Denial of Service attacks Information gathering attacks Trojan horses Worms Viruses
  • 11. Attack classification... Botnets Group of computers infected with malicious programs that cause them to operate against their owners' intentions and without their knowledge Remotely controlled by bot-masters Perfect for performing distributed attacks
  • 12. Flow based Intrusion detection As it relies only the header information it addresses the following attacks Denial of service Scans Worms Botnets