Network Forensics and Next Generation Internet Attacks
Recommend Documents
Network Monitoring (recap). â« Post-Mortem Analysis .... Identifies the worm entry point(s) to a local network or ....
Network: connecting servers and clients (Similar to bus in traditional ... Appliance, Dedicated. Clients ... such as Linux, Windows, etc. â ... Low Costï¼about $100.
2007 IBM Corporation. Emerging Business. IBM Property. Sandra Kearney.
Global Director 3D Internet and v-business. July - 2007. Next Generation. Internet
: Fit ...
The Next Generation Network (NGN) enables the convergence of separate networks such as telephone and computer networks (Internet) in the single network.
June 29, 2007: Apple announced iPhone. â Birth of Mobile Internet, Mobile Apps ... 4. Trend: Content Distribution Networks. (CDN) to Distributed Computation.
experience as a professional engineer and consultant. Invited Speaker at FECS'10 - The 2010 International. Conference on Frontiers in Education: Computer.
Multi-circuit WAN VPN Solutions versus Traditional MPLS .... MultiLink Connect can also provide additional monitoring se
the third person shooter Gears of War (GoW, the most active title in Xbox Live at the time of writing [2]), the racing game Project Gotham Racing 3 (PGR3) and the.
Next-Generation Wireless. Network Bandwidth and Capacity Enabled by
Heterogeneous and. Distributed Networks. Barry Stern. Product Marketing
Manager ...
network neutrality seek to differentiate service, in terms of quality, price and features .... Even now the largest Tier-1 ISPs agree to make their networks and global ...
Europe's. Next Generation. Networks: The Essential Role of Pro-Competitive ...... gen/2016/160616_Vectoring.pdf?__blob=publicationFile&v=2). 87 Plum ...
Platforms. Skype. SIP. POTS. BitTorrent. eDonkey. KaZaA. Networks. Wired. Sensors. UMTS .... Packet sent times depend on codec, independent on packet loss.
âThe new electronic interdependence re-creates the world in the image of a ... What are the implications of the next generation of the Internet on national policies.
We are particularly grateful for the financial support of OxIS 2011 by the Nominet Trust .... as with Apple's successful introduction of the iPad. The very notion of a ...
... Infosecurity. Page 3 of 339. digital-forensics-for-network-internet-and-cloud-comp ... e-for-moving-targets-and-data
... you design Internet today? Clean slate design. .... April 2005, pp. 34 â 41. Slide taken from Jon Turner's presentation at Cisco Routing Research Symposium ...
Keywords : IP Mutimedia System ; Web Service ; Session Initiated Protocols .... For example, âMake Callâ can be related to SIP, âSend emailâ can be related to ...
Defending Against Next Generation through ... current defense mechanisms. To achieve ... computer can be used to steal private data and facilitate identity theft.
solution is using the wavelength division multiplexing PON (CWDM-PON) technology to achieve high ... is centred on the 10G time division multiplexing (TDM).
tion for next-generation wireless metropolitan-area broadband access. Due to the ... nized that IEEE 802.16 standard-based WiMAX networks and Ethernet ...
deployed IPv6 services it is necessary to fine tune tools to demonstrate that the IPv6 network is not ... monitoring solution architecture comprises high capacity network probes (NetWarrior 301, .... Academic, but also Commercial networks.
Jun 5, 2010 - HUAWEI core network Soft Switches, HLRs and MGWs products. He attended many training courses related to telecom fields in different ...
2020 was forecast still to include personal vehicles, downsized and utilising ..... Grey import/European import market â traditional manufacturer-controlled dealer.
Network Forensics and Next Generation Internet Attacks
Trace the attack back to its origin(s) Identifying
patient zero Identifying the hit-list (if any) Reconstructing the infection tree 14
Worm Evolution Tracking Realms
Graph Reconstruction
Reverse Engineering
Timing Analysis 15
Infection Graph Reconstruction Xie et al, “Worm Origin Identification Using Random Moonwalks” IEEE Symposium on Security and Privacy, 2005
Proposed a random walk algorithm on the hosts contact graph Provides
who infected whom tree Identifies the worm entry point(s) to a local network or administrative domain.
16
Random Moonwalks
A random moonwalk on the host contact graph: Start with an arbitrarily chosen flow Pick a next step flow randomly to walk backward in time Observation: epidemic attacks have a tree structure Initial causal flows emerge as high frequency flows
Δt J I H G F E D C B A
Δt
Δt
Δt
Δt
8 2
18
10
8
15
9
30 28
30
1 50 15
45 3
40
1
10
8
41
C
20
31
38
t1
2
1
1 161
B
t4 G
t2 F
t5
t3 1 9 22
E
D
t6 H
T Slide by: Ed Knightly
17
Random Moonwalk (Limitations)
Host Contact graph is known.
requires extensive logging of host contacts throughout the network
Only able to reconstruct infection history on a local scale
Careful selection of parameters to guarantee the convergence of the algorithms How
to address this is left as open problem 18
Outwitting the Witty Kumar et al, “Exploiting Underlying Structure for Detailed Reconstruction of an Internetscale Event”, IMC 2005
Exploits the structure of the random number generator used by the worm
Careful analysis of the worm payload allows us to reconstruct the infection series
19
Witty Code ! srand(seed) { X ← seed } rand() { X ← X*214013 + 2531011; return X } main() 1. srand(get_tick_count()); 2. for(i=0;i