scispace - formally typeset
Open AccessProceedings ArticleDOI

A network security monitor

Reads0
Chats0
TLDR
Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated.
Abstract: 
This study concentrates on the security-related issues in a single broadcast LAN (local area network) such as Ethernet. The authors formalize various possible network attacks. Their basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, the work is similar to the host-based intrusion-detection systems. Different from such systems, however, is the use of a hierarchical model to refine the focus of the intrusion-detection mechanism. The authors also report on the development of an experimental LAN monitor currently under implementation. Several network attacks have been simulated, and results on how the monitor has been able to detect these attacks are analyzed. Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated. >

read more

Content maybe subject to copyright    Report

UCRL-CR-105095
B055743
/_eC_!:tT.:'_,/t
¢ f£o 0 6 199l
A NETWORKSECURITYMONITOR
",___ _.
L.Todd Hebeflein
Gihan V. Dias
Karl N. Levitt
Biswanath Mukherjee
Jeff Wood
David Wolber
Division of Computer Science
Department of Electrical Engineering & Computer Science
University of California
Davis, CA 95616
November 1989
DISTRIBUTION OF THIS DOOUMENT IS UNLIMITED

DISCLAIMER
Work I_rt"ormedundertheauspicesof the U.S. Depart-
sent of Energy by LawrenceLivermoreNttiomtl Labora-
tory undercontractnumber W-740._ENG.48.
This document was prepared as sn account of work
sponsored by en agency of the United States Government.
Neither the United States Government nor the University of
Calit_omis nor any of their employees, makes any warranty,
express or implied, or Jumumesany legalliability or respon-
sibility for the accuracy,completeness,or usefulnessof any
information, apparatus,product, or processdisclosed,or
representsthat its usewouldnot infringe privately owned
rights. Referenceherein li: any specificcommercial prod-
acts,process,or servicebytradename,trudemutrkqmanufac-
turer,or otherwise,doesnot necessarilyconstituteor imply
its endorsement, recommendttlon0 or favoring by the United
S_.ates Government or the University of California. The
views and opinions of authors exprem_ herein do not neces-
sarily sate or reflect those of the United States Government
or the University of California, and shall not be used for
advertising or product endorsement purposes.

ce
A NETWORK SECURITY MONITOR
L. Todd Heberle,'n
G,'han V. Dias
Karl N. Levitt UCRL-CR--105095
Biswanath Mukherjee DE91 007139
Jeff Wood
David Wolber
• Division of Computer Science,
Department of Electrical Engineering & Computer Science
" University of California
Davis, CA 95616
I
November 1989
....,...,,_,,-nt%NOF THIS DooUMENT tSUNLIMITED
I_)ID I I-liil,,t_-. ..... L.1.%,4.-

- 2 -
,lr
A NETWORK SECURITY MONITOR
4,
ABSTRACT
The study of security in computer networks is a rapidly growing area of interest because
of the proliferation of networks and the paucity of security measures in most current neb
works. Since most networks consist of a collection of inter-connected local area networks
(LANs), this paper concentrates on the security-related issues in a single broadcast tAN
• such as Ethernet. Specifically, we formalize various possible network attacks and outline
methods of detecting them. Our basic strategy is to develop profiles of usage of network
resources and then compare current usage patterns with the historical profile to deter-
mine possible security violations. Thus, our work is similar to the hosbbased intrusion-
detection systems such as SRI's IDES [LUNT88a]. Different from such systems, however,
is our use of a hierarchical model to refine the focus of the intrusi6n-detection mechan-
ism. We also report on the development of our experimental LAiN monitor currently
under implementation. Several network attacks have been simulated and results on how
the monitor has beeu able to detect these attacks are also analyzed. Initial results
demonstrate that many network attacks are detectable with our monitor, although it can
surely be defeated. Current work is focusing on the integration of network monitoring
with host,-based techniques.

I. INTRODUCTION
The study of security in computer networks is a rapidly growing area of interest
[NETW87, JSAC89, WALK89]. This activity has been fueled by several recent network
. attacks (or network intrusions). The task of providing and maintaining security in a
network is particularly challenging one because of the following facts. First, there is a
proliferation of local area networks (LANs) in academic, business, and research institu-
tions, and these LANs are in turn interconnected with the "outside world" via gateways
and wide area networks (WANs). Second, these networks and their associated equipment
(including LANs, WANs, and gateways), when they were developed, were don e so with
trusted users in mind; the issue was to solve the networking problem and very few, if
any, security measures were instituted. Consequently, network attacks or intrusions
such as eavesdropping on information meant for someone else, illegally accessing informa-
tion remotely, breaking into computers remotely, and flooding the network thereby
reducing its effective channel capacity are not uncommon (see, for example, [STOL88]).
To overcome these problems, several proposals suggest the deployment of new,
secure, and possibly closed systems by using methods that can prevent network attacks,
e.g., by using eucryption techniques [NE_,A,gcI87, NESH78, VOKE85, RUHO86, TENS87].
. But we recognize that these solutions will not work because of the tremendous invest-
ment already made in the existing infrastructure of open data networks, however
.J
insecure the latter might be. Furthermore, encryption techniques cannot protect against
stolen keys or legitimate users misusing their privileges. Hence, we approach the problem
from a different angle. Specifically, our goal is to develop monitoring techniques that
will enable us to maintain information of normal network activity (including those of the
network's individual nodes, their users, their offered services, etc.) The monitor will be
capable of observing current network activity, which, when compared with historical
behavior, will enable it to detect in real-time possible security violation on the network -

Citations
More filters
Journal ArticleDOI

Intrusion detection using sequences of system calls

TL;DR: Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs.
Journal ArticleDOI

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory

TL;DR: The purpose of this article is to attempt to identify the shortcomings of the Lincoln Lab effort in the hope that future efforts of this kind will be placed on a sounder footing.
Journal ArticleDOI

Network intrusion detection

TL;DR: In this paper, a survey of host-based and network-based intrusion detection systems is presented, and the characteristics of the corresponding systems are identified, and an outline of a statistical anomaly detection algorithm employed in a typical IDS is also included.
Journal ArticleDOI

Architecture for an Artificial Immune System

TL;DR: In this paper, ARTIS is applied to computer security in the form of a network intrusion detection system called LISYS, which is shown to be effective at detecting intrusions, while maintaining low false positive rates.
Journal ArticleDOI

Towards a taxonomy of intrusion-detection systems

TL;DR: A taxonomy of intrusion-detection systems is introduced that highlights the various aspects of this area and is illustrated by numerous examples from past and current projects.
References
More filters
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI

Ethernet: distributed packet switching for local computer networks

TL;DR: The design principles and implementation are described, based on experience with an operating Ethernet of 100 nodes along a kilometer of coaxial cable, of a model for estimating performance under heavy loads and a packet protocol for error controlled communication.