Design and Implementation of Insider Threats Detection System Based on NetFlow
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/55583410806878010535 |
id |
ndltd-TW-104NCKU5652062 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NCKU56520622017-10-01T04:30:10Z http://ndltd.ncl.edu.tw/handle/55583410806878010535 Design and Implementation of Insider Threats Detection System Based on NetFlow 設計與實作基於NetFlow之內部網路威脅偵測系統 Chia-ChengTu 涂嘉成 碩士 國立成功大學 電腦與通信工程研究所 104 Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators. To prevent malicious utilization of network resource, it is important to design a system to find out the hosts in the net with abnormality. Though Intrusion Detection System and Firewall are both famous defensive ways to protect the network, there is still a great chance for hacker to invade the hosts. For example, APT usually uses social engineering focusing on humanity to invade, and the traffic of it seems like normal one. It is hard to defend it because if it is blocked, normal services such as web service and mail service are blocked, too. This situation also happens in virtual environment, and we should face it and resolve it. We may not be aware of the invasion, but we can discover the abnormal traffic made from these invaded hosts. It is no need to install agent on each host by observing the traffic. We just have to configure router or switch to export the flow data and then analyze it. It is also convenient to use open-source tools to make the traffic export in NetFlow format. The advantage of NetFlow is discarding the packet payload and just leaving the information of header. As a result, we can observe the traffic by flow not by packet reducing loading of system and promoting the efficiency. The system extracts the abnormal behavior patterns from traffic and then aggregates them to generate the IP address list with suspicious hosts. It is not only provided for users to check their hosts but also convenient for administrator to manage the net. Chu-Sing Yang 楊竹星 2016 學位論文 ; thesis 57 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === Internet technology grows faster with higher and higher bandwidth. More and more services are running in the Academic Network including entertainment and education not just for research. How to manage such a huge network becomes a big issue for administrators. To prevent malicious utilization of network resource, it is important to design a system to find out the hosts in the net with abnormality. Though Intrusion Detection System and Firewall are both famous defensive ways to protect the network, there is still a great chance for hacker to invade the hosts. For example, APT usually uses social engineering focusing on humanity to invade, and the traffic of it seems like normal one. It is hard to defend it because if it is blocked, normal services such as web service and mail service are blocked, too. This situation also happens in virtual environment, and we should face it and resolve it.
We may not be aware of the invasion, but we can discover the abnormal traffic made from these invaded hosts. It is no need to install agent on each host by observing the traffic. We just have to configure router or switch to export the flow data and then analyze it. It is also convenient to use open-source tools to make the traffic export in NetFlow format. The advantage of NetFlow is discarding the packet payload and just leaving the information of header. As a result, we can observe the traffic by flow not by packet reducing loading of system and promoting the efficiency.
The system extracts the abnormal behavior patterns from traffic and then aggregates them to generate the IP address list with suspicious hosts. It is not only provided for users to check their hosts but also convenient for administrator to manage the net.
|
author2 |
Chu-Sing Yang |
author_facet |
Chu-Sing Yang Chia-ChengTu 涂嘉成 |
author |
Chia-ChengTu 涂嘉成 |
spellingShingle |
Chia-ChengTu 涂嘉成 Design and Implementation of Insider Threats Detection System Based on NetFlow |
author_sort |
Chia-ChengTu |
title |
Design and Implementation of Insider Threats Detection System Based on NetFlow |
title_short |
Design and Implementation of Insider Threats Detection System Based on NetFlow |
title_full |
Design and Implementation of Insider Threats Detection System Based on NetFlow |
title_fullStr |
Design and Implementation of Insider Threats Detection System Based on NetFlow |
title_full_unstemmed |
Design and Implementation of Insider Threats Detection System Based on NetFlow |
title_sort |
design and implementation of insider threats detection system based on netflow |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/55583410806878010535 |
work_keys_str_mv |
AT chiachengtu designandimplementationofinsiderthreatsdetectionsystembasedonnetflow AT tújiāchéng designandimplementationofinsiderthreatsdetectionsystembasedonnetflow AT chiachengtu shèjìyǔshízuòjīyúnetflowzhīnèibùwǎnglùwēixiézhēncèxìtǒng AT tújiāchéng shèjìyǔshízuòjīyúnetflowzhīnèibùwǎnglùwēixiézhēncèxìtǒng |
_version_ |
1718542054962757632 |