首页> 外文会议>International Conference on Information Security for South Africa >Adaptable exploit detection through scalable NetFlow analysis
【24h】

Adaptable exploit detection through scalable NetFlow analysis

机译:可调节Netflow分析可适应的利用检测

获取原文

摘要

Full packet analysis on firewalls and intrusion detection, although effective, has been found in recent times to be detrimental to the overall performance of networks that receive large volumes of throughput. For this reason partial packet analysis technologies such as the NetFlow protocol have emerged to better mitigate these bottlenecks through log generation. This paper researches the use of log files generated by NetFlow version 9 and IPFIX to identify successful and unsuccessful exploit attacks commonly used by automated systems. These malicious communications include but are not limited to exploits that attack Microsoft RPC, Samba, NTP (Network Time Protocol) and IRC (Internet Relay Chat). These attacks are recreated through existing exploit implementations on Metasploit and through hand-crafted reconstructions of exploits via known documentation of vulnerabilities. These attacks are then monitored through a preconfigured virtual testbed containing gateways and network connections commonly found on the Internet. This common attack identification system is intended for insertion as a parallel module for Bolvedere in order to further the increase the Bolvedere system's attack detection capability.
机译:对防火墙和入侵检测的完整数据包分析虽然有效,但近一次发现对接收大量吞吐量的网络的整体性能有害。因此,部分数据包分析技术(如Netflow协议)出现了通过日志生成更好地减轻这些瓶颈。本文研究了NetFlow版本9和IPFIX生成的日志文件的使用,以确定自动系统通常使用的成功和不成功的利用攻击。这些恶意通信包括但不限于攻击Microsoft RPC,Samba,NTP(网络时间协议)和IRC(Internet Relay Chat)的攻击。这些攻击通过Metasploit上的现有利用实施以及通过通过已知文档的漏洞进行漏洞利用的手工制作的重建来重新创建。然后通过包含网关的预配置虚拟测试平台和网络上常用于Internet上的网络连接来监视这些攻击。该常见的攻击识别系统旨在作为Bolvedere的并行模块插入,以进一步增加Bolvedere系统的攻击检测能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号