Design and Implementation of Insider Threats Detection System Based on NetFlow

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators...

Full description

Bibliographic Details
Main Authors: Chia-ChengTu, 涂嘉成
Other Authors: Chu-Sing Yang
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/55583410806878010535
id ndltd-TW-104NCKU5652062
record_format oai_dc
spelling ndltd-TW-104NCKU56520622017-10-01T04:30:10Z http://ndltd.ncl.edu.tw/handle/55583410806878010535 Design and Implementation of Insider Threats Detection System Based on NetFlow 設計與實作基於NetFlow之內部網路威脅偵測系統 Chia-ChengTu 涂嘉成 碩士 國立成功大學 電腦與通信工程研究所 104 Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators. To prevent malicious utilization of network resource, it is important to design a system to find out the hosts in the net with abnormality. Though Intrusion Detection System and Firewall are both famous defensive ways to protect the network, there is still a great chance for hacker to invade the hosts. For example, APT usually uses social engineering focusing on humanity to invade, and the traffic of it seems like normal one. It is hard to defend it because if it is blocked, normal services such as web service and mail service are blocked, too. This situation also happens in virtual environment, and we should face it and resolve it. We may not be aware of the invasion, but we can discover the abnormal traffic made from these invaded hosts. It is no need to install agent on each host by observing the traffic. We just have to configure router or switch to export the flow data and then analyze it. It is also convenient to use open-source tools to make the traffic export in NetFlow format. The advantage of NetFlow is discarding the packet payload and just leaving the information of header. As a result, we can observe the traffic by flow not by packet reducing loading of system and promoting the efficiency. The system extracts the abnormal behavior patterns from traffic and then aggregates them to generate the IP address list with suspicious hosts. It is not only provided for users to check their hosts but also convenient for administrator to manage the net. Chu-Sing Yang 楊竹星 2016 學位論文 ; thesis 57 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators. To prevent malicious utilization of network resource, it is important to design a system to find out the hosts in the net with abnormality. Though Intrusion Detection System and Firewall are both famous defensive ways to protect the network, there is still a great chance for hacker to invade the hosts. For example, APT usually uses social engineering focusing on humanity to invade, and the traffic of it seems like normal one. It is hard to defend it because if it is blocked, normal services such as web service and mail service are blocked, too. This situation also happens in virtual environment, and we should face it and resolve it. We may not be aware of the invasion, but we can discover the abnormal traffic made from these invaded hosts. It is no need to install agent on each host by observing the traffic. We just have to configure router or switch to export the flow data and then analyze it. It is also convenient to use open-source tools to make the traffic export in NetFlow format. The advantage of NetFlow is discarding the packet payload and just leaving the information of header. As a result, we can observe the traffic by flow not by packet reducing loading of system and promoting the efficiency. The system extracts the abnormal behavior patterns from traffic and then aggregates them to generate the IP address list with suspicious hosts. It is not only provided for users to check their hosts but also convenient for administrator to manage the net.
author2 Chu-Sing Yang
author_facet Chu-Sing Yang
Chia-ChengTu
涂嘉成
author Chia-ChengTu
涂嘉成
spellingShingle Chia-ChengTu
涂嘉成
Design and Implementation of Insider Threats Detection System Based on NetFlow
author_sort Chia-ChengTu
title Design and Implementation of Insider Threats Detection System Based on NetFlow
title_short Design and Implementation of Insider Threats Detection System Based on NetFlow
title_full Design and Implementation of Insider Threats Detection System Based on NetFlow
title_fullStr Design and Implementation of Insider Threats Detection System Based on NetFlow
title_full_unstemmed Design and Implementation of Insider Threats Detection System Based on NetFlow
title_sort design and implementation of insider threats detection system based on netflow
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/55583410806878010535
work_keys_str_mv AT chiachengtu designandimplementationofinsiderthreatsdetectionsystembasedonnetflow
AT tújiāchéng designandimplementationofinsiderthreatsdetectionsystembasedonnetflow
AT chiachengtu shèjìyǔshízuòjīyúnetflowzhīnèibùwǎnglùwēixiézhēncèxìtǒng
AT tújiāchéng shèjìyǔshízuòjīyúnetflowzhīnèibùwǎnglùwēixiézhēncèxìtǒng
_version_ 1718542054962757632