Network Forensics: Detection and Analysis of Stealth Port Scanning Attack
نویسندگان
چکیده
Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a targeted cyber-attack. Moreover in recent times, port scanning techniques become highly distributed, composite, hybrid, and stealthy, therefore almost all current detection techniques are unfeasible. Stealth is considered to be a type of port scan which is undetected by available auditing tools such as firewall, routes, filters etc. A stealth port scan method does not produce any TCP sessions; hence, none of these scans should appear in any of the application logs. Therefore, it is of vital importance to research and adopt methods for the detection and attribution of stealth port scanning attack. In this work a network forensic architecture for detection and analysis of stealth port Scanning attack is proposed. It consist of two main modules, a capturing module that captures fine grained evidences from the network traffic and an analysis module that classifies each packet based on the predefined signature. A proof of concept prototype is implemented which utilize, operational network traffic data injected with crafted scans to test the system. It is reported that the proposed system correctly identifies crafted scans injected into real traffic.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملUpdating snort with a customized controller to thwart port scanning
Wired and wireless networks are being attacked and hacked on continuous basis. One of the critical pieces of information the attacker needs to know is the open ports on the victim’s machine, thus the attacker does what is called port scanning. Port scanning is considered one of the dangerous attacks that intrusion detection tries to detect. Snort, a famous network intrusion detection system (NI...
متن کاملNetwork Attack Detection at Flow Level
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers’ IP-addresses. Therefore, this method can be applied in intrusion detection systems, a...
متن کاملA Probabilistic Network Forensic Model for Evidence Analysis
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection systems (IDS) and forensic analysis tools, the evidence can be a false positive or missing. Besides, the number of security events is so large that finding an attack pattern is like finding a needle i...
متن کامل