Hi Kay,

On Sun, Mar 27, 2011 at 2:57 PM, Kay <[email protected]> wrote:

> Hi,
>
> I have been reading papers about port scan detection and sync-attack
> detection these days. I am trying to find an algorithm which can report
> attack ASAP but not aimed at detecting the scanner/attacker. Is this the
> right way?
>

Yes, of course. It is a good way to start.



> I hope to design a new algorithm which servers the above purpose. Maybe we
> can write a paper on this after the project =)
>
>
I'm impressive that you are looking for scientific paper. It will be awesome
of course.


> Since I am not quite familiar with the UMIT, is there some readymade
> information in implementing the IDS? such as the port's time access
> mentioned by João, or I will get these myself.
>

Well, Umit Project does not have this kind of documentation, yet. However
João in his presentations use neural networks to "learn" about this. Did you
get this in his slides? :)

I think he fit algorithm in real-time. João, is it right?


>
> Thanks.
> --Kay
>
>
>
> On Fri, Mar 25, 2011 at 10:26 PM, Luis A. Bastiao Silva <
> [email protected]> wrote:
>
>> I was open the spectrum of the idea. You refer some experience with NIDS
>> and João give some clues how you can do that.
>>
>> On Fri, Mar 25, 2011 at 1:34 PM, Kay <[email protected]> wrote:
>>
>>> I am not quite clear about what functions a personal IDS should have.
>>> What about the followings:
>>> 1) Port-scan detection(Includes lots of types, UDP/SYN/FIN,etc.),
>>> 2) Syn-attack detection (can be implemented with a bitmap method I have
>>> read in a paper)
>>> 3) Ping flood detection
>>> 4) What the attacker is looking for, I think I need time to study the
>>> regular scan methods and the OS fingerprints so that I can evaluate the
>>> workload
>>>
>>
>>> Frankly speaking, I am a bit confused about what to do in the project.
>>> Can you give some suggestions about it?
>>>
>>>
>> There is a possibility to present a proposal with a IDS for Umit Project,
>> indeed. The topics that you point out are a good start. And you can check
>> material that João has shared with you. :)
>>
>>
>>
>>> Thanks.
>>> --Kay
>>>
>>>
>>>
>>> On Fri, Mar 25, 2011 at 10:06 AM, Luis A. Bastiao Silva <
>>> [email protected]> wrote:
>>>
>>>> Hi,
>>>>
>>>> On Fri, Mar 25, 2011 at 1:36 AM, Kay <[email protected]> wrote:
>>>>
>>>>> Thanks for your suggestion.
>>>>>
>>>>> About the port-scan, how about this way: Pick a few sets of ports
>>>>> randomly at a certain interval(for instance, 30s), calculate their
>>>>> access time difference. If most of the results are less than a certain
>>>>> value(3s), and the access time are all within the latest interval
>>>>> (current_time-interval ~ current_time). We can report this as an event of
>>>>> port-scan which happens in the last interval.
>>>>>
>>>>
>>>> It's a basic approach. Certainly, you're on the right way. Nevertheless,
>>>> there are several papers discussing the subject. I'm going to point out one
>>>> of them:
>>>>
>>>>  http://www.aloul.net/Papers/faloul_iwcmc08.pdf
>>>>
>>>> @ignotus21 (João): Do you have any own theory for such feature?
>>>>
>>>>
>>>>>
>>>>> I have took a look at the UMPA, it's really a good work =) I think you
>>>>> mean that I can use it to sniff packets and analysis the captured packets 
>>>>> to
>>>>> detect intrusion.
>>>>>
>>>>
>>>> Yes, also you can use Audit Framework. There are several passive audits.
>>>> So IDS should be a new one. Take a look:
>>>>
>>>> http://trac.umitproject.org/wiki/AuditFramework
>>>> and
>>>> http://trac.umitproject.org/browser/packet-manipulator/trunk/audits <-
>>>> Passive + Active
>>>>
>>>>
>>>>
>>>>
>>>>>
>>>>> I am not quite familiar with statistical analysis. What I have been
>>>>> focused on is the multi-core architecture and how to accelerate network
>>>>> processing on it. I'd like to know exactly what functions should have in a
>>>>> personal NIDS so that I can evaluate if I have the ability to work on this
>>>>> project. Port-scan detection, DDoS detection, or something else?
>>>>>
>>>>
>>>> Indeed, it is a good idea.
>>>> Port-scan detectiong and DDoS has a huge spectrum. For instance, detect
>>>> malware on networks, software that polls servers, etc.
>>>> It will be nice also to know what attacker is looking for:
>>>> Services/Services Information/OS Fingerprints.
>>>>
>>>>
>>>>>
>>>>> Best regards,
>>>>> --Kay
>>>>>
>>>>>
>>>>>
>>>>> On Thu, Mar 24, 2011 at 7:49 PM, [email protected] <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> Dear Kay,
>>>>>>
>>>>>> When I was reading your e-mail I have some ideas that I wish to share
>>>>>> with you...
>>>>>>
>>>>>> On Thu, Mar 24, 2011 at 6:45 AM, Luis A. Bastiao Silva
>>>>>> <[email protected]> wrote:
>>>>>> > Hello Kay,
>>>>>> > On Thu, Mar 24, 2011 at 7:08 AM, Kay <[email protected]> wrote:
>>>>>> >>
>>>>>> >> Hi, all
>>>>>> >> I am a master student of computer science in University of Science
>>>>>> and
>>>>>> >> Technology of China and want to participate in GSoC 2011.  The
>>>>>> focus of my
>>>>>> >> lab program lies in building parallel NIDS on multi-core platforms,
>>>>>> and
>>>>>> >> based on the lab experimens I built a high-performance parallel
>>>>>> HTTP parser
>>>>>> >> which can achieve at least 5Gbps line rate in a harsh environment.
>>>>>> >
>>>>>> > Thanks for introduce yourself. It should be a cool research area,
>>>>>> for sure!
>>>>>>
>>>>>> It sounds someone is able to write a possible new Umit application...
>>>>>> What you guys think about a personal NIDS (using UMPA)?
>>>>>>
>>>>>> >> The HTTP parser I built is aimed at measuring network
>>>>>> latencies(match the
>>>>>> >> request and response to get the time difference). I am experienced
>>>>>> with C
>>>>>> >> and specialized in network domain knowledge. Frankly speaking, I
>>>>>> know Python
>>>>>> >> a little and only wrote a few small programs with it. But I think I
>>>>>> can
>>>>>> >> learn it quickly and use it in the development.
>>>>>>
>>>>>> It seems you are friend of statistical analysis. So, let me point out
>>>>>> one idea:
>>>>>>    - It is possible to that my machine is being attacked by a
>>>>>> port-scan?
>>>>>>    - Even if the only information I have is the port's time access?
>>>>>>
>>>>>> > Indeed. If you already know C, enhance Python will not be an issue.
>>>>>> >
>>>>>> >>
>>>>>> >> So I want to do some work in the network domain and found the
>>>>>> "5. Packet
>>>>>> >> Tracker Platform" suitable for me. The "Jitter based"  and
>>>>>> >> "Dipacket Inspection: inspect packet contents (e.g. HTTP contents)"
>>>>>> is
>>>>>> >> related to my previous project.
>>>>>> >
>>>>>> > Sure. This idea is over network-domain, mainly focuses into
>>>>>> > packet analyses.
>>>>>> >
>>>>>> >>
>>>>>> >> However, I found this idea is not that specific. Maybe because my
>>>>>> lack of
>>>>>> >> domain knowledge or poor in English, I don't quite understand the
>>>>>> "Detect
>>>>>> >> packets with debit (e.g. more/less than 100Kb/s)"
>>>>>> >>
>>>>>> >> Can someone give me detailed information about this idea and where
>>>>>> I
>>>>>> >> should begin with to learn something or make some contributions
>>>>>> now?
>>>>>> >
>>>>>> > Yes, of course.
>>>>>> >
>>>>>> > Read http://trac.umitproject.org/wiki/PacketManipulator
>>>>>> > Checkout source of PacketManipulator
>>>>>> >
>>>>>> > svn co
>>>>>> http://svn.umitproject.org/svnroot/umit/packet-manipulator/trunk
>>>>>> > PacketManipulator
>>>>>> >
>>>>>> > Read http://trac.umitproject.org/wiki/AuditFramework and related
>>>>>> links
>>>>>> >
>>>>>> > In this idea, it expected to has a real-time statistic depend on the
>>>>>> amount
>>>>>> > of sniffed packets.
>>>>>> >
>>>>>> > Packets
>>>>>> > Multicast/Broadcast packets
>>>>>> > IPv4/IPv6
>>>>>> > Bytes
>>>>>> > Fragments
>>>>>> > Detect retransmissions/error packets
>>>>>> > Count of packets by protocol
>>>>>> > etc.
>>>>>> >
>>>>>> > Such information should presented in the GUI of PacketManipulator
>>>>>> (for
>>>>>> > instance, expand Host Table into Packet Manipulator GUI).
>>>>>> > Also, the end-user should be able to configure an alarm/event, e.g.
>>>>>> when
>>>>>> > detect a specific packet from/to a destination. Such details, should
>>>>>> be
>>>>>> > exploit into the proposal. More tips:
>>>>>> >
>>>>>> > Define a threshold of utilization
>>>>>> > Define latency threshold
>>>>>> >
>>>>>> > Finally, to present a GSoC proposal take a look:
>>>>>> >
>>>>>> > http://www.umitproject.org/?active=gsoc&mode=ideas&lang=en
>>>>>> > http://www.umitproject.org/?active=gsoc&mode=tips&lang=en
>>>>>> > http://www.google-melange.com/gsoc/org/show/google/gsoc2011/umit
>>>>>> >
>>>>>> > I'm look forward to discussing more details about this proposal. If
>>>>>> you have
>>>>>> > any doubts, do not hesitate to contact us for further details.
>>>>>> >
>>>>>> >
>>>>>> >> Thanks a lot!
>>>>>> >> --Kay
>>>>>> >>
>>>>>> >>
>>>>>> >>
>>>>>> ------------------------------------------------------------------------------
>>>>>> >> Enable your software for Intel(R) Active Management Technology to
>>>>>> meet the
>>>>>> >> growing manageability and security demands of your customers.
>>>>>> Businesses
>>>>>> >> are taking advantage of Intel(R) vPro (TM) technology - will your
>>>>>> software
>>>>>> >> be a part of the solution? Download the Intel(R) Manageability
>>>>>> Checker
>>>>>> >> today! http://p.sf.net/sfu/intel-dev2devmar
>>>>>> >> _______________________________________________
>>>>>> >> Umit-devel mailing list
>>>>>> >> [email protected]
>>>>>> >> https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>>> >>
>>>>>> >
>>>>>> >
>>>>>> > Best Regards,
>>>>>> > --
>>>>>> > Luís A. Bastião Silva
>>>>>> > Skype: koplabs
>>>>>> > http://www.bastiao.org
>>>>>> >
>>>>>> >
>>>>>> ------------------------------------------------------------------------------
>>>>>> > Enable your software for Intel(R) Active Management Technology to
>>>>>> meet the
>>>>>> > growing manageability and security demands of your customers.
>>>>>> Businesses
>>>>>> > are taking advantage of Intel(R) vPro (TM) technology - will your
>>>>>> software
>>>>>> > be a part of the solution? Download the Intel(R) Manageability
>>>>>> Checker
>>>>>> > today! http://p.sf.net/sfu/intel-dev2devmar
>>>>>> > _______________________________________________
>>>>>> > Umit-devel mailing list
>>>>>> > [email protected]
>>>>>> > https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>>>
>>>>>> --
>>>>>> Att, João Medeiros
>>>>>>
>>>>>
>>>>>
>>>> if you have any doubts, let us know. I'm look forward to know more
>>>> details about your proposal
>>>>
>>>>
>>>> Best Regards,
>>>> --
>>>> Luís A. Bastião Silva
>>>> Skype: koplabs
>>>> http://www.bastiao.org
>>>>
>>>>
>>>
>>
>> Keep in touch.
>>
>>
>> Best Regards,
>> --
>> Luís A. Bastião Silva
>> Skype: koplabs
>> http://www.bastiao.org
>>
>>
>

Best Regards,
-- 
Luís A. Bastião Silva
Skype: koplabs
http://www.bastiao.org
------------------------------------------------------------------------------
Enable your software for Intel(R) Active Management Technology to meet the
growing manageability and security demands of your customers. Businesses
are taking advantage of Intel(R) vPro (TM) technology - will your software 
be a part of the solution? Download the Intel(R) Manageability Checker 
today! http://p.sf.net/sfu/intel-dev2devmar
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel

Reply via email to