Hi,
I have been reading papers about port scan detection and sync-attack
detection these days. I am trying to find an algorithm which can report
attack ASAP but not aimed at detecting the scanner/attacker. Is this the
right way?
I hope to design a new algorithm which servers the above purpose. Maybe we
can write a paper on this after the project =)
Since I am not quite familiar with the UMIT, is there some readymade
information in implementing the IDS? such as the port's time access
mentioned by João, or I will get these myself.
Thanks.
--Kay
On Fri, Mar 25, 2011 at 10:26 PM, Luis A. Bastiao Silva
<[email protected]>wrote:
> I was open the spectrum of the idea. You refer some experience with NIDS
> and João give some clues how you can do that.
>
> On Fri, Mar 25, 2011 at 1:34 PM, Kay <[email protected]> wrote:
>
>> I am not quite clear about what functions a personal IDS should have. What
>> about the followings:
>> 1) Port-scan detection(Includes lots of types, UDP/SYN/FIN,etc.),
>> 2) Syn-attack detection (can be implemented with a bitmap method I have
>> read in a paper)
>> 3) Ping flood detection
>> 4) What the attacker is looking for, I think I need time to study the
>> regular scan methods and the OS fingerprints so that I can evaluate the
>> workload
>>
>
>> Frankly speaking, I am a bit confused about what to do in the project. Can
>> you give some suggestions about it?
>>
>>
> There is a possibility to present a proposal with a IDS for Umit Project,
> indeed. The topics that you point out are a good start. And you can check
> material that João has shared with you. :)
>
>
>
>> Thanks.
>> --Kay
>>
>>
>>
>> On Fri, Mar 25, 2011 at 10:06 AM, Luis A. Bastiao Silva <
>> [email protected]> wrote:
>>
>>> Hi,
>>>
>>> On Fri, Mar 25, 2011 at 1:36 AM, Kay <[email protected]> wrote:
>>>
>>>> Thanks for your suggestion.
>>>>
>>>> About the port-scan, how about this way: Pick a few sets of ports
>>>> randomly at a certain interval(for instance, 30s), calculate their
>>>> access time difference. If most of the results are less than a certain
>>>> value(3s), and the access time are all within the latest interval
>>>> (current_time-interval ~ current_time). We can report this as an event of
>>>> port-scan which happens in the last interval.
>>>>
>>>
>>> It's a basic approach. Certainly, you're on the right way. Nevertheless,
>>> there are several papers discussing the subject. I'm going to point out one
>>> of them:
>>>
>>> http://www.aloul.net/Papers/faloul_iwcmc08.pdf
>>>
>>> @ignotus21 (João): Do you have any own theory for such feature?
>>>
>>>
>>>>
>>>> I have took a look at the UMPA, it's really a good work =) I think you
>>>> mean that I can use it to sniff packets and analysis the captured packets
>>>> to
>>>> detect intrusion.
>>>>
>>>
>>> Yes, also you can use Audit Framework. There are several passive audits.
>>> So IDS should be a new one. Take a look:
>>>
>>> http://trac.umitproject.org/wiki/AuditFramework
>>> and
>>> http://trac.umitproject.org/browser/packet-manipulator/trunk/audits <-
>>> Passive + Active
>>>
>>>
>>>
>>>
>>>>
>>>> I am not quite familiar with statistical analysis. What I have been
>>>> focused on is the multi-core architecture and how to accelerate network
>>>> processing on it. I'd like to know exactly what functions should have in a
>>>> personal NIDS so that I can evaluate if I have the ability to work on this
>>>> project. Port-scan detection, DDoS detection, or something else?
>>>>
>>>
>>> Indeed, it is a good idea.
>>> Port-scan detectiong and DDoS has a huge spectrum. For instance, detect
>>> malware on networks, software that polls servers, etc.
>>> It will be nice also to know what attacker is looking for:
>>> Services/Services Information/OS Fingerprints.
>>>
>>>
>>>>
>>>> Best regards,
>>>> --Kay
>>>>
>>>>
>>>>
>>>> On Thu, Mar 24, 2011 at 7:49 PM, [email protected] <
>>>> [email protected]> wrote:
>>>>
>>>>> Dear Kay,
>>>>>
>>>>> When I was reading your e-mail I have some ideas that I wish to share
>>>>> with you...
>>>>>
>>>>> On Thu, Mar 24, 2011 at 6:45 AM, Luis A. Bastiao Silva
>>>>> <[email protected]> wrote:
>>>>> > Hello Kay,
>>>>> > On Thu, Mar 24, 2011 at 7:08 AM, Kay <[email protected]> wrote:
>>>>> >>
>>>>> >> Hi, all
>>>>> >> I am a master student of computer science in University of Science
>>>>> and
>>>>> >> Technology of China and want to participate in GSoC 2011. The focus
>>>>> of my
>>>>> >> lab program lies in building parallel NIDS on multi-core platforms,
>>>>> and
>>>>> >> based on the lab experimens I built a high-performance parallel HTTP
>>>>> parser
>>>>> >> which can achieve at least 5Gbps line rate in a harsh environment.
>>>>> >
>>>>> > Thanks for introduce yourself. It should be a cool research area, for
>>>>> sure!
>>>>>
>>>>> It sounds someone is able to write a possible new Umit application...
>>>>> What you guys think about a personal NIDS (using UMPA)?
>>>>>
>>>>> >> The HTTP parser I built is aimed at measuring network
>>>>> latencies(match the
>>>>> >> request and response to get the time difference). I am experienced
>>>>> with C
>>>>> >> and specialized in network domain knowledge. Frankly speaking, I
>>>>> know Python
>>>>> >> a little and only wrote a few small programs with it. But I think I
>>>>> can
>>>>> >> learn it quickly and use it in the development.
>>>>>
>>>>> It seems you are friend of statistical analysis. So, let me point out
>>>>> one idea:
>>>>> - It is possible to that my machine is being attacked by a
>>>>> port-scan?
>>>>> - Even if the only information I have is the port's time access?
>>>>>
>>>>> > Indeed. If you already know C, enhance Python will not be an issue.
>>>>> >
>>>>> >>
>>>>> >> So I want to do some work in the network domain and found the
>>>>> "5. Packet
>>>>> >> Tracker Platform" suitable for me. The "Jitter based" and
>>>>> >> "Dipacket Inspection: inspect packet contents (e.g. HTTP contents)"
>>>>> is
>>>>> >> related to my previous project.
>>>>> >
>>>>> > Sure. This idea is over network-domain, mainly focuses into
>>>>> > packet analyses.
>>>>> >
>>>>> >>
>>>>> >> However, I found this idea is not that specific. Maybe because my
>>>>> lack of
>>>>> >> domain knowledge or poor in English, I don't quite understand the
>>>>> "Detect
>>>>> >> packets with debit (e.g. more/less than 100Kb/s)"
>>>>> >>
>>>>> >> Can someone give me detailed information about this idea and where I
>>>>> >> should begin with to learn something or make some contributions now?
>>>>> >
>>>>> > Yes, of course.
>>>>> >
>>>>> > Read http://trac.umitproject.org/wiki/PacketManipulator
>>>>> > Checkout source of PacketManipulator
>>>>> >
>>>>> > svn co
>>>>> http://svn.umitproject.org/svnroot/umit/packet-manipulator/trunk
>>>>> > PacketManipulator
>>>>> >
>>>>> > Read http://trac.umitproject.org/wiki/AuditFramework and related
>>>>> links
>>>>> >
>>>>> > In this idea, it expected to has a real-time statistic depend on the
>>>>> amount
>>>>> > of sniffed packets.
>>>>> >
>>>>> > Packets
>>>>> > Multicast/Broadcast packets
>>>>> > IPv4/IPv6
>>>>> > Bytes
>>>>> > Fragments
>>>>> > Detect retransmissions/error packets
>>>>> > Count of packets by protocol
>>>>> > etc.
>>>>> >
>>>>> > Such information should presented in the GUI of PacketManipulator
>>>>> (for
>>>>> > instance, expand Host Table into Packet Manipulator GUI).
>>>>> > Also, the end-user should be able to configure an alarm/event, e.g.
>>>>> when
>>>>> > detect a specific packet from/to a destination. Such details, should
>>>>> be
>>>>> > exploit into the proposal. More tips:
>>>>> >
>>>>> > Define a threshold of utilization
>>>>> > Define latency threshold
>>>>> >
>>>>> > Finally, to present a GSoC proposal take a look:
>>>>> >
>>>>> > http://www.umitproject.org/?active=gsoc&mode=ideas&lang=en
>>>>> > http://www.umitproject.org/?active=gsoc&mode=tips&lang=en
>>>>> > http://www.google-melange.com/gsoc/org/show/google/gsoc2011/umit
>>>>> >
>>>>> > I'm look forward to discussing more details about this proposal. If
>>>>> you have
>>>>> > any doubts, do not hesitate to contact us for further details.
>>>>> >
>>>>> >
>>>>> >> Thanks a lot!
>>>>> >> --Kay
>>>>> >>
>>>>> >>
>>>>> >>
>>>>> ------------------------------------------------------------------------------
>>>>> >> Enable your software for Intel(R) Active Management Technology to
>>>>> meet the
>>>>> >> growing manageability and security demands of your customers.
>>>>> Businesses
>>>>> >> are taking advantage of Intel(R) vPro (TM) technology - will your
>>>>> software
>>>>> >> be a part of the solution? Download the Intel(R) Manageability
>>>>> Checker
>>>>> >> today! http://p.sf.net/sfu/intel-dev2devmar
>>>>> >> _______________________________________________
>>>>> >> Umit-devel mailing list
>>>>> >> [email protected]
>>>>> >> https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>> >>
>>>>> >
>>>>> >
>>>>> > Best Regards,
>>>>> > --
>>>>> > Luís A. Bastião Silva
>>>>> > Skype: koplabs
>>>>> > http://www.bastiao.org
>>>>> >
>>>>> >
>>>>> ------------------------------------------------------------------------------
>>>>> > Enable your software for Intel(R) Active Management Technology to
>>>>> meet the
>>>>> > growing manageability and security demands of your customers.
>>>>> Businesses
>>>>> > are taking advantage of Intel(R) vPro (TM) technology - will your
>>>>> software
>>>>> > be a part of the solution? Download the Intel(R) Manageability
>>>>> Checker
>>>>> > today! http://p.sf.net/sfu/intel-dev2devmar
>>>>> > _______________________________________________
>>>>> > Umit-devel mailing list
>>>>> > [email protected]
>>>>> > https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>>
>>>>> --
>>>>> Att, João Medeiros
>>>>>
>>>>
>>>>
>>> if you have any doubts, let us know. I'm look forward to know more
>>> details about your proposal
>>>
>>>
>>> Best Regards,
>>> --
>>> Luís A. Bastião Silva
>>> Skype: koplabs
>>> http://www.bastiao.org
>>>
>>>
>>
>
> Keep in touch.
>
>
> Best Regards,
> --
> Luís A. Bastião Silva
> Skype: koplabs
> http://www.bastiao.org
>
>
------------------------------------------------------------------------------
Enable your software for Intel(R) Active Management Technology to meet the
growing manageability and security demands of your customers. Businesses
are taking advantage of Intel(R) vPro (TM) technology - will your software
be a part of the solution? Download the Intel(R) Manageability Checker
today! http://p.sf.net/sfu/intel-dev2devmar
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel