[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20080235799A1 - Network Attack Signature Generation - Google Patents

Network Attack Signature Generation Download PDF

Info

Publication number
US20080235799A1
US20080235799A1 US12/131,327 US13132708A US2008235799A1 US 20080235799 A1 US20080235799 A1 US 20080235799A1 US 13132708 A US13132708 A US 13132708A US 2008235799 A1 US2008235799 A1 US 2008235799A1
Authority
US
United States
Prior art keywords
data
attack
signature
network
data traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/131,327
Inventor
Klaus Julisch
James F. Riordan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/131,327 priority Critical patent/US20080235799A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RIORDAN, JAMES F, JULISCH, KLAUS
Publication of US20080235799A1 publication Critical patent/US20080235799A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming

Definitions

  • the present invention generally relates to the generation of attack signatures for the use in detecting network attacks and particularly relates to methods, apparatus, and computer program elements for generating attack signatures on a data network.
  • the Internet is a wide area data network formed from a plurality of interconnected data networks.
  • the Internet facilitates data communication between a range of remotely situated data processing systems.
  • data processing systems each typically comprise a central processing unit (CPU), a memory subsystem, and input/output (I/O) subsystem, and computer program code stored in the memory subsystem for execution by the CPU.
  • CPU central processing unit
  • I/O input/output
  • end user data processing systems connected to the Internet are referred to as client data processing systems or simply clients.
  • server data processing systems or simply servers There is a client-server relationship established via the Internet between the end user data processing systems and the hosting data processing systems.
  • the Internet has become an important communication network for facilitating electronically effected commercial interactions between clients and servers. Access to the Internet is typically provided to such entities via an Internet Service Provider (ISP). Each ISP typically operates a network to which clients or servers subscribe. Each client is provided with an address on the network. Similarly, each server on the network is provided with an address.
  • the network operated by the ISP is connected to the Internet via dedicated data processing systems usually referred to as routers. In operation, the router directs inbound communication traffic from the Internet to specified addresses, such as IP addresses, cellphone addresses (telephone number) on the network. Similarly, the router directs outbound communication traffic from the network in the direction of specified addresses on the Internet.
  • a problem faced by many users of data networks is the increasing frequency of electronic attacks to the networks they operate. Such attacks include computer virus attacks, “worm” attacks and denial of service attacks (DOS attacks). Worms and DOS attacks typically introduce significant performance degradation in networks. Infected systems connected to the network typically attempt to spread the infection within the network. Many users do not recognize that their systems are infected. For infected systems, an intrusion detection followed by a subsequent disinfection can be performed in the interest of increasing network performance. To detect an intrusion, an intrusion detection system can make use of so-called attack signatures that have been derived from analyzing known attacks and that characterize those attacks. Some intrusion detection systems utilize a database that contains several attack signatures and compares data traffic against such attack signatures to determine whether the data traffic is likely to pertain to an attack.
  • US 2002/0143963 A1 describes an apparatus for enhancing the security of a web server from intrusive attacks in the form of HTTP requests. This is accomplished by comparing an incoming request with a predefined list of attack signatures which may comprise at least files, file categories and addresses of known hackers. Action is then taken to reject requests wherein a positive comparison is determined. Further the web server is notified of relevant data provided in connection with a rejected request of potential future action in accordance with the severity of potential damage and frequency of rejected requests from a given requester.
  • attack signatures A widely used solution for generating attack signatures is to monitor hacker mailing lists, and to manually craft attack signatures in response to the attacks that one desires to detect.
  • Wenke Lee and Salvatore J. Stolfo in “A Framework for Constructing Features and Models for Intrusion Detection Systems” in ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000 describe a method of learning attack signatures from attack examples. However, this work usually assumes that examples of attacks exist, so one can learn their characteristics. This is generally not the case and it is still desirable to obtain suitable attack examples.
  • a method for generating from requests on a first data network attack signatures for use in a second data network comprising a reception step for receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network; an inspection step for inspecting several incidents of the data traffic that has been received in the previous step, for a common data pattern, and upon finding a the data pattern, a determination step for determining from the corresponding data traffic the attack signature for use in detecting attacks on the second data network.
  • This attack signature generation method makes use of the idea that network traffic directed against an unassigned address is a priori suspicious, and does provide a higher likelihood of being an actual attack. This higher likelihood is exploited to generate one or more attack signatures that are supposed to lead to a more precise detection of attacks.
  • unassigned herein is meant as covering an address that is not assigned to a physical device other than an apparatus for detecting an intrusion or generating an attack signature.
  • the apparatus that is designed to execute the method according to the invention will be the device those “unassigned” addresses are actually assigned to in order to make use of the invention.
  • Those addresses are insofar unassigned as they are not assigned to any device that does have another functionality apart from signature generation or intrusion detection. Thereby data traffic that is addressed to such an unassigned address will be received by that apparatus and subjected to the claimed method.
  • the method comprises an answer step for spoofing an answer to a source that sent a request contained in the data traffic received. Thereby more information can be obtained from the source of the request.
  • the answer step above can be executed selectively, using a selection criterion that is dependent on the type of protocol used by the received data traffic.
  • the request received already contains enough information to be able to perform the inspection for the common data pattern. In such cases there is no need for sending a spoofed answer to the source.
  • the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and those sources that have not been subjected to the answer step, a reduction of the data used for generating an attack signature is achievable. This reduction is useful since it is deemed to concentrate the data on those incidents that have a higher likelihood of being real attacks and not innocent incidents of data traffic that at first sight look like attacks, also referred to as false positives.
  • the selection is a way of reducing the number of false positives in the signature generation method.
  • the inspection step comprises sorting the incidents according to a connection attribute that can be one of the source address, the source port, the protocol type and the destination port of the data traffic.
  • This clustering according to connection attribute values is a way of identifying data traffic as an attack, since the more incidents belong to a cluster the more likely it is that the data traffic is an actual attack.
  • the determination step comprises counting the number of incidents with a common data substring and defining as an attack signature those data substrings whose number exceeds a predetermined number.
  • the biggest clusters which represent the most frequently occurring data substrings are used to generate an attack signature.
  • the frequency of data substring is here used as another indicator of likelihood of an attack being a true attack and not a false positive.
  • the biggest clusters do represent those attacks which due to their frequency do represent a higher risk to system users.
  • the attack signature is sent to an intrusion detection system, also referred to herein as intrusion detector, assigned to the second data network.
  • intrusion detector can then integrate the attack signature into its signature library and use it to compare it against data traffic for attack identification and handling.
  • the first data network and the second data network are selected to be connected to each other, so that the data traffic that is used to generate the signature attack is at least part of the data traffic that goes to the second data network.
  • the two networks can be of unitary construction or even identical.
  • the third data network can be connected to the second data network, or it can be identical with it.
  • the first data network is connected to the third data network in a way that traffic can be directed from the first data network to addresses on the third data network.
  • Any of the aforementioned data networks can also be a super- or subnetwork of the other.
  • the method is combined with an attack identification procedure and also comprises steps of receiving data traffic on the second data network and addressed to an unassigned address; inspecting the data traffic received for data indicative of an attack; and, on detection of data indicative of an attack, generating an alert signal.
  • the attack signature generated is used for identifying attacks, wherein those data traffic incidents that are directed at an unassigned address are a priori seen as suspicious and subjected to a match test with the generated attack signature.
  • the procedure of utilizing data traffic directed at unassigned addresses can hence be exploited twice for the ultimate purpose of attack identification.
  • data traffic originating at the address assigned to the data processing system originating the data indicative of the attack is routed to a disinfection address on the network.
  • the source of the attack is marked as a generic attack source and traffic arriving from it is rerouted to the disinfection server.
  • the system originally targeted by that traffic is decoupled from that traffic and thereby protected.
  • an alert signal is sent to the disinfection address, and the alert signal preferably comprises data indicative of the attack detected.
  • the alert signal is of advantage since it can comprise further information for the disinfection server such as the type of attack, an instruction of how to handle this kind of attack.
  • the alert signal could also comprise the computer program code for handling the attack or disinfecting the system that is the source of the attack.
  • an apparatus for generating from requests from a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems comprises a signature generator for receiving data traffic from the first data network addressed to a umber of unassigned addresses in a third data network and arriving at an input interface, inspecting several incidents of the data traffic received for a common data pattern, and upon finding such a data pattern, determining from the corresponding data traffic the attack signature for use in detecting attacks for the second data network.
  • the apparatus comprises a memory for storing therein the attack signature at least temporarily.
  • the apparatus is preferably designed to spoof replies to sources sending requests contained in the data traffic received.
  • the replies can be sent via a first output interface to the first data network.
  • the first output interface can be preferably combined with the input interface connected to that network.
  • the apparatus selects the incidents of data traffic only from those of the sources replying to the spoofed answer and those sources that have not been subjected to the spoofed answer.
  • the apparatus is designed to sort the incidents according to a connection attribute such as the source address, source port, protocol type or destination port of the data traffic.
  • the attack signature is determinable by the apparatus comprising a counter for counting the number of incidents with a common data substring and defining as an attack signature those data substrings whose number exceeds a predetermined number.
  • the apparatus might preferably have a second output interface for sending the attack signature to an intrusion detection system assigned to the second data network.
  • the apparatus further comprises an intrusion detection sensor, also referred to as intrusion detector, for receiving data traffic from the first data network addressed to an unassigned address of the third data network, inspecting the data traffic received for data indicative of an attack, and, on detection of data indicative of an attack, generating an alert signal.
  • an intrusion detection sensor also referred to as intrusion detector
  • the apparatus further comprises a router connected to the intrusion detector for rerouting data traffic originating at the address assigned to the data processing system originating the data indicative of the attack, to a disinfection address on one of the data networks.
  • the apparatus further comprises a disinfection server assigned to the disinfection address.
  • the disinfection server is designed to send, on receipt of the alert signal, a warning message to the address assigned to the data processing system originating the data indicative of the attack.
  • the present invention further extends to a computer program element comprising computer program code means which, when loaded in a processor of a data processing system, configures the processor to perform a method for detecting attacks on a data network as herein before described.
  • the present invention further extends to a method of supporting an entity in the handling of a detected attack by providing instructions for use of, assistance in executing, or execution of disinfection program code. Since a network owner might not have the expertise and capacity to provide for themselves the service of protecting their resources connected to the second communication network from attacks, the method enables such an entity to receive the necessary functionality from outside, preferably remotely via a network connection.
  • the support steps can hence be executed via such a connection and in a preferred embodiment be executed by the attack identification apparatus or the signature generation apparatus that includes such functionality.
  • the present invention further extends to a method for providing a report to the entity containing information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack.
  • a report can be issued and transmitted by the intrusion detector or the signature generation apparatus via a network connection.
  • the present invention further extends to a method that combines the attack signature generation with billing an entity per attack signature generated.
  • the charge to be billed is calculated electronically, using as input technical parameters such as the amount of data traffic inspected, the size of the cluster used for the signature generation, the number of addresses monitored or other parameters indicative of the complexity of the attack signature generation.
  • the present invention further extends to a method that combines the attack signature generation and/or the attack identification with billing an entity for the execution of at least one of the steps in the attack signature generation or handling, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, or the turnover of the entity.
  • the signature generation method can in a preferred embodiment comprise a selection step that selects the entities according to a selection criterion preferably derived from a degree of similarity in utility of the generated signature. The more similar the infrastructural components of several entities with respect to attackability are, the more likely it is that those entities are prone to the same type of attack and the more similar are the needs to receive the same type of attack signature.
  • the present invention further extends to a method for deploying a signature generation application to an entity, comprising a step of connecting a signature generator to a third data network for generating from requests from a thereto-connected first data network attack signatures for use in a second data network used by the entity and having a plurality of addresses assigned to data processing systems, a step of setting up the signature generator to generate an attack signature under use of the described signature generation method and a step of setting up the signature generator to send the generated attack signature to an attack identification device connected to the second data network.
  • the signature generator listens on the network for traffic directed toward the unassigned addresses. No such traffic should exist, since those addresses are unadvertized or unpublished. In the event that a request sent to one of the unassigned addresses is detected, the signature generator may spoof an answer to the request, unless the request uses a predetermined protocol type that already delivers the information necessary for the inspection.
  • the unassigned addresses are not in use by a device that has another functionality than signature generation or intrusion detection. Thus, an attempt to contact, for example, a server at such an address is a priori suspicious.
  • the signature generator then listens for a reply to the spoofed answer and uses the reply for the signature generation process.
  • FIG. 1 is a block diagram of a data processing system
  • FIG. 2 is a block diagram of a data processing network
  • FIG. 3 is a block diagram of an intrusion detector
  • FIG. 4 is a flow diagram associated with the intrusion detector
  • FIG. 5 is a block diagram of a signature generator
  • FIG. 6 is a flow diagram associated with the signature generator
  • FIG. 7 is a block diagram of a signature generator working for an intrusion detector.
  • a data processing system comprises a CPU 10 , an I/O subsystem 20 , and a memory subsystem 40 , all interconnected by a bus subsystem 30 .
  • the memory subsystem 40 may comprise random access memory (RAM), read only memory (ROM), and one or more data storage devices such as hard disk drives, optical disk drives, and the like.
  • the I/O subsystem 20 may comprise: a display; a printer; a keyboard; a pointing device such as a mouse, tracker ball, or the like; and one or more network connections permitting communication between the data processing system and one or more similar systems and/or peripheral devices via a data network.
  • the combination of such systems and devices interconnected by such a network may itself form a distributed data processing system. Such distributed systems may be themselves interconnected by additional data networks.
  • the memory subsystem 40 In the memory subsystem 40 is stored data 60 and computer program code 50 executable by the CPU 10 .
  • the program code 50 includes operating system software 90 and application software 80 .
  • the operating system software 90 when executed by the CPU 10 , provides a platform on which the application software 80 can be executed.
  • a data network 100 also referred to as third data network 100 , having a plurality of addresses 110 for assignment to data processing systems in the network.
  • the third data network 100 has a plurality of assignable Internet Protocol (IP) addresses 110 .
  • IP Internet Protocol
  • the third data network 100 is connected to the Internet 120 , also referred to as first data network 120 , via a router 130 .
  • the router 130 may be implemented in form of a data processing system as herein before described with reference to FIG. 1 dedicated by appropriate programming to the task to route communication traffic in the form of data packets between the Internet 120 and the third data network 100 based on address data specified in the data packets.
  • a first group 140 of the addresses 110 on the third data network 100 are assigned to systems 150 belonging to users of an Internet service. Each system 150 may be a data processing system as herein before described with reference to FIG. 1 .
  • a second group 160 of the addresses 110 on the third data network 100 are free, i.e. unassigned. More specifically, the second group 160 of addresses 110 is not assigned to user systems 150 , such as servers or clients.
  • An intrusion detection system (IDS) 170 is also connected to the third data network 100 .
  • the IDS 170 is also connected to the router 130 . Details of the IDS 170 will be provided further below.
  • the router 130 is connected to a disinfection server 180 .
  • the disinfection server 180 may be implemented by a data processing system as herein before described with reference to FIG. 1 .
  • a signature generator 190 is arranged, that is also connected to the intrusion detector 170 .
  • the IDS 170 comprises a data processing system as herein before described with reference to FIG. 1 .
  • the application software 80 of the IDS 170 includes intrusion detection code 200 .
  • the data 60 stored in the memory subsystem 40 of the IDS 170 includes attack identity data 210 and disinfection data 220 .
  • the data 60 also includes a record of which of the addresses on the third data network 100 are unassigned and belong to the second group 160 , and which of the addresses 110 on the third data network 100 are assigned to data processing systems 150 and belong to the first group 140 .
  • the record is updated each time another address is allocated or an existing address allocation is removed.
  • the attack identity data 210 contains data indicative of signatures identifying known attacks.
  • the disinfection data 220 contains data indicative of: the nature of each attack; how to disinfect a system infected with each attack; and how to resume normal network connectivity.
  • the attack identity data 210 and disinfection data 220 are cross referenced.
  • the intrusion detection code 200 when executed by the CPU 10 , configures the IDS 170 to operate in accordance with the flow diagram shown in FIG. 4 .
  • the IDS 170 receives data traffic on the third data network 100 originating at an assigned address 140 and addressed to an unassigned address 160 .
  • the IDS 170 inspects the data traffic received for data indicative of an attack. On detection of data indicative of attack, the IDS 170 generates an alert signal.
  • the data traffic originating at the address 140 assigned to the data processing system 150 originating the data indicative of the attack is rerouted to a disinfection address on the third data network 100 .
  • the IDS 170 listens on the third data network 100 and receives traffic directed toward the unassigned addresses 160 .
  • the IDS 170 examines requests sent from addresses 140 on the third data network 100 to determine, at block 310 , if the request specifies one of the unassigned addresses 160 as the destination address. If the request does not specify one of the unassigned addresses 160 , then, at block 320 , the IDS 170 waits for the next request to examine. If, however, the request specifies at least one of the unassigned addresses 160 , then, at block 330 , the IDS 170 spoofs an answer to the request.
  • the identification may also be realized by assigning the unassigned addresses to the IDS 170 , such that any traffic directed at an unassigned address automatically arrives at the IDS 170 .
  • the answer is sent to the source address on the third data network 100 .
  • the unassigned addresses 160 are not in use otherwise than being inspected for attacks. Thus, an attempt to contact, for example, a system at such an address is a priori suspicious.
  • the IDS 170 listens for a reply to the spoofed answer. The IDS 170 may time out if no reply is received within a predetermined period, in which case, at block 320 , the IDS 170 waits for the next request to examine. If a reply is however received, then, at block 350 , the IDS 170 compares the suspect request and reply with the attack identity data 210 stored in the memory subsystem 40 .
  • the IDS 170 waits for the next request to examine. If, however, the comparison at block 350 detects a diagnosable attack in the reply, then the IDS 170 determines that the source system 150 is infected. Accordingly, at block 360 , the IDS 170 generates the alert signal. The alert signal is sent to the router 130 . The alert signal instructs the router 130 to divert all traffic from the infected system 150 to the disinfection address. This is a rerouting step for rerouting the data traffic originating at the address assigned to the data processing system originating the data indicative of the attack to a disinfection address on the third data network 100 .
  • a disinfection server 180 is located at the disinfection address.
  • the IDS 170 on generation of the alert signal, sends an alert signal to the disinfection address.
  • the alert signal comprises data indicative of the attack detected.
  • an alert step is carried out for sending the alert signal to the disinfection address, the alert signal preferably comprising data indicative of the attack detected.
  • the IDS 170 retrieves the disinfection data 220 corresponding to the attack detected from the memory subsystem 40 .
  • the IDS 170 sends the alert signal containing retrieved disinfection data to the disinfection address at which the disinfection server 180 resides.
  • the IDS 170 waits for the next request to examine.
  • Each request, answer, and reply may be embodied in one or more packets of data traffic on the third data network 100 . Accordingly, the signature of each attack may span more than one packet.
  • the disinfection data 220 sent to the disinfection server 180 contains data indicative of: the nature of the attack detected; how to disinfect the system 150 infected with the attack; and how to resume normal network connectivity.
  • the disinfection server 180 sets about curing the infected system 150 and restoring the third data network 100 .
  • the disinfection data 220 contains only data indicative of the nature of the attack. The disinfection server then selects, based the nature of the attack, one of a plurality of prestored techniques for disinfecting the infected system 150 and/or restoring the third data network 100 and executes the selected technique.
  • the attacks may take many different forms. Accordingly, the corresponding techniques for disinfection and network restoration may vary widely from one attack to the next.
  • the disinfection server 180 on receipt the disinfection data, sends a warning message to the infected system 150 .
  • the warning message informs the user of the infected system 150 that their system 150 is infected.
  • the warning message may instruct the user to run anti-virus software prestored in the infected system 150 to eliminate or otherwise isolate the infection.
  • the warning message may contain disinfection program code for eliminating the attack from the infected system 150 , together with instructions to assist the user in executing the disinfection code on the infected system 150 .
  • the warning message may direct the user to another web site, at which appropriate disinfection program code is provided.
  • the warning message contains disinfection program code that, when loaded into the infected system, executes automatically, thus eliminating or otherwise isolating the infection in a manner which is transparent to the user. Other disinfection schemes are possible.
  • the disinfection server 180 is implemented in a single data processing system such as that herein before described with reference to FIG. 1 .
  • the disinfection server 180 may be implemented by multiple interconnected data processing systems. Such data processing may be distributed or located together in a “farm”. Each data processing system in the disinfection server may be dedicated to handling a different attack.
  • the IDS 170 may also be implemented by multiple integrated data processing systems. Alternatively, the IDS 170 and the disinfection server 180 may be integrated in a single data processing system.
  • the traffic on the third data network 100 sent from the infected system 150 and deflected by the router 130 to the disinfection server 180 may be logged and/or discarded by the disinfection server 180 .
  • the IDS 170 sends disinfection data to the disinfection server 220 .
  • the IDS 170 may simply instruct the router 130 to deflect traffic from the infected system 150 to the disinfection server 180 without the IDS 170 additionally supplying disinfection data 220 to the disinfection server 180 .
  • the disinfection server 180 may then simply act as a repository for traffic originating in the infected system 150 , logging and/or discarding traffic it receives from the infected system 150 .
  • the logging and discarding may be reported by the disinfection server 180 to an administrator of the third data network 100 .
  • Such reports may be delivered periodically or in real time. The reporting may be performed via, for example, an administration console. However, other reporting techniques, such as printed output for example, are possible. On receipt of such reports, administrators can take actions appropriate for eliminating or otherwise containing the infection of the third data network 100 .
  • the signature generator 190 has a structure that is to some extent similar to that of the IDS 170 .
  • the signature generator 190 comprises a data processing system as hereinbefore described with reference to FIG. 1 .
  • the application software 80 of the signature generator 190 includes signature generation code 230 .
  • the data 60 stored in the memory subsystem 40 of the signature generator 190 includes
  • the data 60 also includes a record of which of the addresses on the third data network 100 are unassigned and belong to the second group 160 , and which of the addresses 110 on the third data network 100 are assigned to data processing systems 150 and belong to the first group 140 .
  • the record is updated each time another address is allocated or an existing address allocation is removed.
  • the signature generation code 230 when executed by the CPU 10 , configures the signature generator 190 to operate in accordance with the flow diagram shown in FIG. 6 .
  • the signature generator 190 identifies data traffic originating from the first network 120 addressed to an unassigned address 160 of the third network 100 .
  • the signature generator 190 examines requests received from the Internet 120 to determine, at block 410 , if the request specifies one or more of the unassigned addresses 160 as the destination address. If the request does not specify at least one of the unassigned addresses 160 , then, at block 420 , the signature generator 190 waits for the next request to examine. The request passes through the signature generator 190 to the router 130 .
  • the above step sequence is referenced in FIG. 6 as path via 400 . 1 . In other words, a reception and identification step is performed that receives and identifies the data traffic on the first network 120 addressed to a number of unassigned addresses in the third data network 100 .
  • the signature generator 190 can skip this step if the signature generator 190 is per default assigned to the unassigned addresses 160 .
  • data traffic arriving at the signature generator 190 is by definition directed to an unassigned address 160 and the process jumps from block 400 directly to block 430 , referenced in FIG. 6 as path via 400 . 2 .
  • This is a reception step for receiving data traffic from the first data network 120 addressed to a number of unassigned addresses in the third data network 100 .
  • the signature generator 190 spoofs a answer to the request.
  • the answer is sent to the source address on the Internet 120 .
  • an answer step is executed for spoofing an answer to the source that sent the request contained in the received data traffic.
  • the unassigned addresses 160 are not in use by a device other than the signature generator 190 .
  • an attempt to contact, for example, a system at such an address is a priori suspicious.
  • the signature generator 190 listens for a reply to the spoofed answer.
  • the signature generator 190 may time out if no reply is received within a predetermined period, in which case, at block 420 , the signature generator 190 waits for the next request to examine. If a reply is however received, then, at block 450 , the signature generator 190 performs a signature generation algorithm.
  • a spoofing of an answer may not be necessary.
  • the signature generator 190 may skip the step of spoofing an answer in block 430 and the step of listening to a reply in block 440 .
  • the original response is used as a substitute for the reply to the spoofed answer.
  • the answer step is hence in that case executed selectively based on a selection criterion that is dependent on the type of protocol of the received data traffic,
  • the selection criterion may also include additional criteria besides the type of protocol, e.g. the criterion of repetition, i.e. whether the received data traffic has been identified as identical with previously received data traffic.
  • the signature generation algorithm comprises an inspection step in which several incidents of data traffic that are addressed to a number of unassigned addresses in the third data network are inspected for ocurrence of a common data pattern.
  • the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and sources that have not been subjected to the answer step.
  • the requests from the non-replying sources are not used for the signature generation. This reduces the data that is used for the inspection step.
  • the inspection step may comprise sorting the incidents according to a connection attribute such as one of source address, source port, protocol type and destination port of the data traffic.
  • the determination step comprises counting the number of incidents of the data traffic with a common data substring and defining as the attack signature those data substrings whose number exceeds a predetermined number.
  • substring clusters are built with the cluster size being the number of incidents that contain the corresponding data substring. As soon as the cluster size exceeds the predetermined number, that cluster's substring is defined as attack signature.
  • the destination port is also referred to as service type dpt i .
  • a method is performed in the signature generator 190 that has the following two functionalities:
  • the Find-per service signatures algorithm monitors the requests that occur and are directed to a specific port and analyzes them for frequent common substrings of the predetermined minimum length.
  • the substrings are the piece of the request that characterize it as an attack. Requests with common substrings are assumed to represent the same type of attack.
  • the port-specific handling makes use of the fact that typically attacks that are directed at different ports are too different to be captured by the same signature. A common substring occurring in requests directed at different ports is therefore likely to be coincidental and hence with a higher likelihood not part of an attack.
  • the port-specific handling hence leads to signatures that reduce the likelihood of false positives, i.e. the erroneous identification and handling of a request as an attack, the request factually being innocent.
  • the Find attack-tool signatures part of the algorithm uses a grouping per source and analyzes requests coming from that source, regardless of the port they are directed to. This method makes use of the fact that some attacks show a changing pattern of ports to outsmart intrusion detectors. In this case the signature of an attack would provide an identification of an attack by its source together with a certain substring.
  • this algorithm might be modified in that dynamic weighting of the sources according to the number of different contacted destination addresses is applied.
  • the predetermined number of data substrings that is to be exceeded to define those data substrings as an attack signature can be adapted. That number may be selected to be lower for sources that direct data traffic to more than one destination address. In particular, that number may be selected reciprocally dependent on the number of destination addresses. This takes into account the fact that the more addresses a data traffic is directed to, the more suspicious the source is and the more likely it is that the data traffic is an actual attack.
  • timing information can be included. Attacks are often performed by packaged hacker tools. Such tools do not generally randomize the attack sequence so that time sequence analysis can determine not only the attack but also the tool running the attack.
  • the output of the signature generation algorithm is an attack signature that can be used by the intrusion detector 170 to recognize requests as attacks.
  • the signature generator 190 uses the received responses to spoofed replies to requests directed at unassigned addresses 160 , the signature generator 190 derives patterns that are translated into attack signatures. Those attack signatures are in block 460 forwarded to the intrusion detector 170 where the attack signatures are integrated into the attack identification data 210 . Hence, by sending the attack signature to the intrusion detector 170 that is assigned to the second data network the signature generator 190 updates the attack identification data 210 that is used by the IDS 170 .
  • the described method is not only useful for improving attack identification in the third data network 100 , but can be more generally applied for a second network.
  • attack signature has been generated by listening to requests coming from the first data network and being directed to unassigned addresses in the third data network, those same attack signatures are sendable to a second data network for use in an intrusion detection method therein.
  • all three networks can be distinct, the described method works with any combination thereof, such as any of the networks being one of seamlessly connected to, integrated in, connected to, a part of, a subnet of, a supernet of, partially identical with, of unitary construction with, partially connected to partially integrated in one or more of the other networks.
  • the second network and the third network 100 are identical.
  • the generation of the signature in block 450 is in a preferred way executed based on a multitude of received requests and/or replies to spoofed answers. For requests that do not need a sequence of spoofing an answer and listening to a reply, the receipt of those requests in block 400 is performed for a multitude of requests, referenced in FIG. 6 as loop 401 . For requests that are subjected to a sequence of spoofing an answer (block 430 ) and listening to a reply (block 440 ), the sequence of blocks 400 , 430 , 440 is performed for a multitude of requests, referenced in FIG. 6 as loop 441 .
  • Another preferred embodiment comprises an execution of the signature generation algorithm in block 450 and is followed by a reexecution of that algorithm using additional input of examined requests and/or replies. Thereby the outcome of the signature generation algorithm is updated over time.
  • the signature generator In a preferred deployment of the signature generator, it is placed on a direct link to the Internet. In that way, it is subjected to a maximum amount of hostile attack activity and the above algorithm can derive a larger number of attack signatures. Once derived, the attack signatures can be deployed to an IDS. Such an IDS can also reside in a different network configuration, e.g. behind a firewall.
  • a data network comprising: a router for connecting a plurality of data processing systems to the Internet; an intrusion detection system (IDS) connected to the router and connected to the signature generator; and a disinfection server also connected to the router.
  • IDS intrusion detection system
  • the IDS instructs the router to deflect all network traffic from that attack to the disinfection server.
  • the IDS in addition supplies disinfection data to the disinfection server.
  • the disinfection data is indicative of the nature of the infection, how to disinfect the infecting system, and how to resume normal network connectivity.
  • the first data network 120 is connected to the third data network 100 and to the second data network 70 via the router 130 .
  • the third data network comprises the assigned addresses 140 and allocated to the unassigned addresses the signature generator 190 which is connected to the intrusion detector 170 .
  • the router 130 is connected to the intrusion detector 170 and the disinfection server 180 .
  • the intrusion detector 170 is allocated to the unassigned addresses of the second data network 70 which also has assigned addresses 71 .
  • the connection of any of the aforementioned can be realized directly or indirectly, e.g. via any of the network connections available.
  • the data traffic directed towards the unassigned addresses 160 in the third data network arrives automatically at the signature generator 190 which, using its signature generation algorithm, generates an attack signature therefrom.
  • the data traffic arriving at the signature generator 190 can originate in the first network 120 but also come from within the third data network 100 .
  • the generated attack signature is sent by the signature generator 190 to the IDS 170 which can make use of the attack signature to identify incidents of arriving data traffic as attacks.
  • the signature generator 170 is allocated to the unassigned addresses in the second network 70 , data traffic that is directed towards the unassigned addresses in the second network 70 is automatically subjected to an attack identification process by the IDS 170 using the attack signature received.
  • the data traffic arriving at the IDS 170 can originate in the first network 120 but also come from within the second data network 100 .
  • the intrusion detector 170 alerts the router 130 of the existence of an attack.
  • the router 130 can then redirect the data traffic that arrives from the identified source of the attacks to the disinfection server 180 . If the attacking source resides within the third data network 170 , it can be subjected to a disinfection process.
  • a signature generation application to an entity, comprising the following steps: connecting the signature generator to the first data network for generating from requests thereon attack signatures for use in the second data network used by said entity and having a plurality of addresses assigned to data processing systems, setting up the signature generator to generate an attack signature under use of the aforedescribed method, and setting up the signature generator to send the generated attack signature to an intrusion detector connected to the second data network.
  • a signature generator is in a preferred embodiment a “server with no services”. More precisely, it is characterized by two properties: First, it is a security-hardened host that, while offering no real services, listens on all security-relevant ports and logs all incoming requests. Second, it is not advertised in any way, i.e. there are no DNS entries, web links, or other pointers to it. Because it is not advertised, a machine that contacts a signature generator is with near certainty a hacker or worm looking for a target to exploit. As the signature generator logs all incoming requests, it gets hold of the attacks that the hacker or worm is using. Hence, the signature generator is an advantageous source of actual attacks, from which then automatically attack signatures are derived.
  • the functionality described for the signature generator 190 can in a preferred embodiment also be integrated into the IDS 170 , such that the IDS 170 derives from the replies to its spoofed answers attack signatures that are added to its attack identification data 210 .
  • the IDS 170 , router 130 , and disinfection server 180 are implemented by data processing systems programmed with appropriate program code.
  • one or more of the functions described herein as being implemented in software may be implemented at least partially in hardwired logic circuitry.
  • attack detection methods described herein may be implemented by the service provider responsible for the third data network 100 , or at least partially by a third party in the form of a service to the service provider.
  • a service may differentiate the service offered by the service provider from the services provided by it competitors.
  • differentiated services may be optionally supplied to end users of the network service provided in exchange for an additional premium.
  • the method described can be completed by providing a report to an entity, wherein the report contains information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack.
  • the service of generating attack signatures for networks used by an entity other than the service provider may in a preferred embodiment comprise billing for the service delivered.
  • the charge to be billed may therein be determined in dependence of one or more of a number of factors that typically are indicative of the complexity or workload experienced by the service provider.
  • factors indicative of volume and time-consumption of the service provided may include the size of the third data network, the number of unassigned addresses therein, the number of assigned addresses therein, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated using the attack signature, the volume of rerouted data traffic.
  • Factors identifying a level of increased complexity can be the signature of the identified attack, the degree of network security achieved.
  • the method hence may comprise billing the entity for the execution of at least one of the steps performed for the entity, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, the turnover of the entity.
  • the billing can be automated in that the charge is sent together with the warning message or any other information sent in the attack detection process, This advantageously combines the use of the messaging for the attack-handling purpose together with its use for the billing purpose.
  • the double use of the warning message or another information message provides the technical advantage of reducing the traffic flow generated through the attack detection and billing process. At the same time this method can be used to guarantee that the serviced entity is only billed for exactly the service provided.
  • Another preferred solution for billing is offering the entity a subscription to the attack signature generation and/or attack detection service that allows the serviced entity to profit from the process for a predetermined time, volume of traffic, number of systems or the like.
  • the service provider may offer his own disinfection server as a hosting unit to be used in combination with the network used by the serviced entity, but it is also possible that the disinfection server is held, maintained, hosted or leased by the serviced entity.
  • the method can furthermore be used for supporting an entity in the handling of the detected attack by one of providing instructions for use of, assistance in executing, and execution of disinfection program code.
  • the service provider may utilize a synergistic effect by providing the attack signature generation and/or attack detection service to several entities, and sharing the resources, such as the signature generator 190 , the router 130 , the intrusion detector 170 or the disinfection server 180 among the several services.
  • the resources such as the signature generator 190 , the router 130 , the intrusion detector 170 or the disinfection server 180 among the several services.
  • attack-related information between the different networks can be shared and could be utilized to improve the detection quality on the serviced networks. For instance the detection of an attack on one network could lead to a quicker detection on another network since the process of determining an attack signature can be shortened or even eliminated.
  • the disinfection mechanism can be shared between the serviced entities thereby reducing their effort and costs related to updating and maintaining the disinfection mechanism.
  • the technical advantage of sharing technical data that is derived from the handling of attacks to the network of one entity to improve the attack handling of another serviced entity will provide an incentive for entities to join a pool of several entities being serviced by the same service provider for intrusion detection.
  • the billing model could in a preferred embodiment be adapted to motivate the participation of entities in a group of entities sharing the signature generation or attack detection resources and employing the same service provider.
  • the described method can be coded in form of a computer program element comprising computer program code means which, when loaded in a processor of a data processing system, configures the processor to perform a method for generating attack signatures.
  • the present invention can be realized in hardware, software, or a combination of hardware and software.
  • the method according to the present invention can be realized in a centralized fashion in one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited.
  • a typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
  • the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which—when loaded in a computer system—is able to carry out these methods.
  • a computer program or computer program means in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a device having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.

Description

    TECHNICAL FIELD
  • The present invention generally relates to the generation of attack signatures for the use in detecting network attacks and particularly relates to methods, apparatus, and computer program elements for generating attack signatures on a data network.
  • BACKGROUND OF THE INVENTION
  • The Internet is a wide area data network formed from a plurality of interconnected data networks. In operation, the Internet facilitates data communication between a range of remotely situated data processing systems. Such data processing systems each typically comprise a central processing unit (CPU), a memory subsystem, and input/output (I/O) subsystem, and computer program code stored in the memory subsystem for execution by the CPU. Typically, end user data processing systems connected to the Internet are referred to as client data processing systems or simply clients. Similarly, data processing systems hosting web sites and services for access by clients via the Internet are referred to as server data processing systems or simply servers. There is a client-server relationship established via the Internet between the end user data processing systems and the hosting data processing systems.
  • The Internet has become an important communication network for facilitating electronically effected commercial interactions between clients and servers. Access to the Internet is typically provided to such entities via an Internet Service Provider (ISP). Each ISP typically operates a network to which clients or servers subscribe. Each client is provided with an address on the network. Similarly, each server on the network is provided with an address. The network operated by the ISP is connected to the Internet via dedicated data processing systems usually referred to as routers. In operation, the router directs inbound communication traffic from the Internet to specified addresses, such as IP addresses, cellphone addresses (telephone number) on the network. Similarly, the router directs outbound communication traffic from the network in the direction of specified addresses on the Internet.
  • A problem faced by many users of data networks is the increasing frequency of electronic attacks to the networks they operate. Such attacks include computer virus attacks, “worm” attacks and denial of service attacks (DOS attacks). Worms and DOS attacks typically introduce significant performance degradation in networks. Infected systems connected to the network typically attempt to spread the infection within the network. Many users do not recognize that their systems are infected. For infected systems, an intrusion detection followed by a subsequent disinfection can be performed in the interest of increasing network performance. To detect an intrusion, an intrusion detection system can make use of so-called attack signatures that have been derived from analyzing known attacks and that characterize those attacks. Some intrusion detection systems utilize a database that contains several attack signatures and compares data traffic against such attack signatures to determine whether the data traffic is likely to pertain to an attack.
  • US 2002/0143963 A1 describes an apparatus for enhancing the security of a web server from intrusive attacks in the form of HTTP requests. This is accomplished by comparing an incoming request with a predefined list of attack signatures which may comprise at least files, file categories and addresses of known hackers. Action is then taken to reject requests wherein a positive comparison is determined. Further the web server is notified of relevant data provided in connection with a rejected request of potential future action in accordance with the severity of potential damage and frequency of rejected requests from a given requester.
  • A widely used solution for generating attack signatures is to monitor hacker mailing lists, and to manually craft attack signatures in response to the attacks that one desires to detect. Wenke Lee and Salvatore J. Stolfo in “A Framework for Constructing Features and Models for Intrusion Detection Systems” in ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000 describe a method of learning attack signatures from attack examples. However, this work usually assumes that examples of attacks exist, so one can learn their characteristics. This is generally not the case and it is still desirable to obtain suitable attack examples.
  • SUMMARY OF THE INVENTION
  • In accordance with the present invention, there is now provided a method for generating from requests on a first data network attack signatures for use in a second data network, the method comprising a reception step for receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network; an inspection step for inspecting several incidents of the data traffic that has been received in the previous step, for a common data pattern, and upon finding a the data pattern, a determination step for determining from the corresponding data traffic the attack signature for use in detecting attacks on the second data network. This attack signature generation method makes use of the idea that network traffic directed against an unassigned address is a priori suspicious, and does provide a higher likelihood of being an actual attack. This higher likelihood is exploited to generate one or more attack signatures that are supposed to lead to a more precise detection of attacks.
  • The term “unassigned” herein is meant as covering an address that is not assigned to a physical device other than an apparatus for detecting an intrusion or generating an attack signature. The apparatus that is designed to execute the method according to the invention will be the device those “unassigned” addresses are actually assigned to in order to make use of the invention. Those addresses are insofar unassigned as they are not assigned to any device that does have another functionality apart from signature generation or intrusion detection. Thereby data traffic that is addressed to such an unassigned address will be received by that apparatus and subjected to the claimed method.
  • In a preferred embodiment of the invention the method comprises an answer step for spoofing an answer to a source that sent a request contained in the data traffic received. Thereby more information can be obtained from the source of the request.
  • The answer step above can be executed selectively, using a selection criterion that is dependent on the type of protocol used by the received data traffic. In some protocols the request received already contains enough information to be able to perform the inspection for the common data pattern. In such cases there is no need for sending a spoofed answer to the source.
  • If the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and those sources that have not been subjected to the answer step, a reduction of the data used for generating an attack signature is achievable. This reduction is useful since it is deemed to concentrate the data on those incidents that have a higher likelihood of being real attacks and not innocent incidents of data traffic that at first sight look like attacks, also referred to as false positives. The selection is a way of reducing the number of false positives in the signature generation method.
  • In a preferred embodiment of the invention the inspection step comprises sorting the incidents according to a connection attribute that can be one of the source address, the source port, the protocol type and the destination port of the data traffic. This clustering according to connection attribute values is a way of identifying data traffic as an attack, since the more incidents belong to a cluster the more likely it is that the data traffic is an actual attack.
  • In a preferred embodiment of the invention the determination step comprises counting the number of incidents with a common data substring and defining as an attack signature those data substrings whose number exceeds a predetermined number. Hence, the biggest clusters which represent the most frequently occurring data substrings are used to generate an attack signature. The frequency of data substring is here used as another indicator of likelihood of an attack being a true attack and not a false positive. At the same time, the biggest clusters do represent those attacks which due to their frequency do represent a higher risk to system users.
  • In a preferred embodiment of the invention the attack signature is sent to an intrusion detection system, also referred to herein as intrusion detector, assigned to the second data network. Such intrusion detector can then integrate the attack signature into its signature library and use it to compare it against data traffic for attack identification and handling.
  • In a preferred embodiment of the invention the first data network and the second data network are selected to be connected to each other, so that the data traffic that is used to generate the signature attack is at least part of the data traffic that goes to the second data network. In a preferred embodiment of the invention the two networks can be of unitary construction or even identical. Also the third data network can be connected to the second data network, or it can be identical with it. The first data network is connected to the third data network in a way that traffic can be directed from the first data network to addresses on the third data network. Any of the aforementioned data networks can also be a super- or subnetwork of the other.
  • In a preferred embodiment of the invention the method is combined with an attack identification procedure and also comprises steps of receiving data traffic on the second data network and addressed to an unassigned address; inspecting the data traffic received for data indicative of an attack; and, on detection of data indicative of an attack, generating an alert signal. Thereby, the attack signature generated is used for identifying attacks, wherein those data traffic incidents that are directed at an unassigned address are a priori seen as suspicious and subjected to a match test with the generated attack signature. The procedure of utilizing data traffic directed at unassigned addresses can hence be exploited twice for the ultimate purpose of attack identification.
  • In a preferred embodiment of the invention, on generation of the alert signal, data traffic originating at the address assigned to the data processing system originating the data indicative of the attack is routed to a disinfection address on the network. Therefor, the source of the attack is marked as a generic attack source and traffic arriving from it is rerouted to the disinfection server. The system originally targeted by that traffic is decoupled from that traffic and thereby protected.
  • In a preferred embodiment of the invention on generation of the alert signal, an alert signal is sent to the disinfection address, and the alert signal preferably comprises data indicative of the attack detected. The alert signal is of advantage since it can comprise further information for the disinfection server such as the type of attack, an instruction of how to handle this kind of attack. The alert signal could also comprise the computer program code for handling the attack or disinfecting the system that is the source of the attack.
  • Viewing the present invention from another aspect, there is now provided an apparatus for generating from requests from a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems. The apparatus comprises a signature generator for receiving data traffic from the first data network addressed to a umber of unassigned addresses in a third data network and arriving at an input interface, inspecting several incidents of the data traffic received for a common data pattern, and upon finding such a data pattern, determining from the corresponding data traffic the attack signature for use in detecting attacks for the second data network.
  • In a preferred embodiment the apparatus comprises a memory for storing therein the attack signature at least temporarily. The apparatus is preferably designed to spoof replies to sources sending requests contained in the data traffic received. The replies can be sent via a first output interface to the first data network. The first output interface can be preferably combined with the input interface connected to that network.
  • In a preferred way the apparatus selects the incidents of data traffic only from those of the sources replying to the spoofed answer and those sources that have not been subjected to the spoofed answer. In a preferred embodiment of the invention, the apparatus is designed to sort the incidents according to a connection attribute such as the source address, source port, protocol type or destination port of the data traffic. In an even more preferred embodiment of the invention the attack signature is determinable by the apparatus comprising a counter for counting the number of incidents with a common data substring and defining as an attack signature those data substrings whose number exceeds a predetermined number. The apparatus might preferably have a second output interface for sending the attack signature to an intrusion detection system assigned to the second data network.
  • In a preferred embodiment of the invention, the apparatus further comprises an intrusion detection sensor, also referred to as intrusion detector, for receiving data traffic from the first data network addressed to an unassigned address of the third data network, inspecting the data traffic received for data indicative of an attack, and, on detection of data indicative of an attack, generating an alert signal.
  • In a preferred embodiment of the invention, the apparatus further comprises a router connected to the intrusion detector for rerouting data traffic originating at the address assigned to the data processing system originating the data indicative of the attack, to a disinfection address on one of the data networks.
  • In a preferred embodiment of the invention, the apparatus further comprises a disinfection server assigned to the disinfection address. The disinfection server is designed to send, on receipt of the alert signal, a warning message to the address assigned to the data processing system originating the data indicative of the attack.
  • The present invention further extends to a computer program element comprising computer program code means which, when loaded in a processor of a data processing system, configures the processor to perform a method for detecting attacks on a data network as herein before described.
  • The present invention further extends to a method of supporting an entity in the handling of a detected attack by providing instructions for use of, assistance in executing, or execution of disinfection program code. Since a network owner might not have the expertise and capacity to provide for themselves the service of protecting their resources connected to the second communication network from attacks, the method enables such an entity to receive the necessary functionality from outside, preferably remotely via a network connection. The support steps can hence be executed via such a connection and in a preferred embodiment be executed by the attack identification apparatus or the signature generation apparatus that includes such functionality.
  • The present invention further extends to a method for providing a report to the entity containing information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack. Again, in a preferred embodiment such report can be issued and transmitted by the intrusion detector or the signature generation apparatus via a network connection.
  • The present invention further extends to a method that combines the attack signature generation with billing an entity per attack signature generated. In a preferred embodiment thereof, the charge to be billed is calculated electronically, using as input technical parameters such as the amount of data traffic inspected, the size of the cluster used for the signature generation, the number of addresses monitored or other parameters indicative of the complexity of the attack signature generation.
  • The present invention further extends to a method that combines the attack signature generation and/or the attack identification with billing an entity for the execution of at least one of the steps in the attack signature generation or handling, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, or the turnover of the entity.
  • It is particularly advantageous to provide the signature generation, forwarding of a signature and the attack identification for several entities and using technical data derived from the execution of the method for one of the entities for the execution of the same method for another of the entities. There is a significant saving in resources expectable, if the signature is generated not only for the use by a specific entity, such as the owner of the second network, but for a multitude of entities, especially if the networks of those entities are connected to the same or a substantially identical portion of the first, second, or third data network. The signature generation method can in a preferred embodiment comprise a selection step that selects the entities according to a selection criterion preferably derived from a degree of similarity in utility of the generated signature. The more similar the infrastructural components of several entities with respect to attackability are, the more likely it is that those entities are prone to the same type of attack and the more similar are the needs to receive the same type of attack signature.
  • The present invention further extends to a method for deploying a signature generation application to an entity, comprising a step of connecting a signature generator to a third data network for generating from requests from a thereto-connected first data network attack signatures for use in a second data network used by the entity and having a plurality of addresses assigned to data processing systems, a step of setting up the signature generator to generate an attack signature under use of the described signature generation method and a step of setting up the signature generator to send the generated attack signature to an attack identification device connected to the second data network.
  • There can be a large number of unassigned addresses on a given network. In a particularly preferred embodiment of the present invention, the signature generator listens on the network for traffic directed toward the unassigned addresses. No such traffic should exist, since those addresses are unadvertized or unpublished. In the event that a request sent to one of the unassigned addresses is detected, the signature generator may spoof an answer to the request, unless the request uses a predetermined protocol type that already delivers the information necessary for the inspection. The unassigned addresses are not in use by a device that has another functionality than signature generation or intrusion detection. Thus, an attempt to contact, for example, a server at such an address is a priori suspicious. The signature generator then listens for a reply to the spoofed answer and uses the reply for the signature generation process.
  • BRIEF DESCRIPTION OF THE FIGURES
  • Preferred embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
  • FIG. 1 is a block diagram of a data processing system;
  • FIG. 2 is a block diagram of a data processing network;
  • FIG. 3 is a block diagram of an intrusion detector,
  • FIG. 4 is a flow diagram associated with the intrusion detector,
  • FIG. 5 is a block diagram of a signature generator,
  • FIG. 6 is a flow diagram associated with the signature generator,
  • FIG. 7 is a block diagram of a signature generator working for an intrusion detector.
  • DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Referring first to FIG. 1, a data processing system comprises a CPU 10, an I/O subsystem 20, and a memory subsystem 40, all interconnected by a bus subsystem 30. The memory subsystem 40 may comprise random access memory (RAM), read only memory (ROM), and one or more data storage devices such as hard disk drives, optical disk drives, and the like. The I/O subsystem 20 may comprise: a display; a printer; a keyboard; a pointing device such as a mouse, tracker ball, or the like; and one or more network connections permitting communication between the data processing system and one or more similar systems and/or peripheral devices via a data network. The combination of such systems and devices interconnected by such a network may itself form a distributed data processing system. Such distributed systems may be themselves interconnected by additional data networks.
  • In the memory subsystem 40 is stored data 60 and computer program code 50 executable by the CPU 10. The program code 50 includes operating system software 90 and application software 80. The operating system software 90, when executed by the CPU 10, provides a platform on which the application software 80 can be executed.
  • Referring now to FIG. 2, in a preferred embodiment of the present invention, there is provided a data network 100, also referred to as third data network 100, having a plurality of addresses 110 for assignment to data processing systems in the network. The third data network 100 has a plurality of assignable Internet Protocol (IP) addresses 110. The third data network 100 is connected to the Internet 120, also referred to as first data network 120, via a router 130. The router 130 may be implemented in form of a data processing system as herein before described with reference to FIG. 1 dedicated by appropriate programming to the task to route communication traffic in the form of data packets between the Internet 120 and the third data network 100 based on address data specified in the data packets. A first group 140 of the addresses 110 on the third data network 100 are assigned to systems 150 belonging to users of an Internet service. Each system 150 may be a data processing system as herein before described with reference to FIG. 1. A second group 160 of the addresses 110 on the third data network 100 are free, i.e. unassigned. More specifically, the second group 160 of addresses 110 is not assigned to user systems 150, such as servers or clients. An intrusion detection system (IDS) 170 is also connected to the third data network 100. The IDS 170 is also connected to the router 130. Details of the IDS 170 will be provided further below. The router 130 is connected to a disinfection server 180. The disinfection server 180 may be implemented by a data processing system as herein before described with reference to FIG. 1. Connected to the router 130 and the Internet 120, a signature generator 190 is arranged, that is also connected to the intrusion detector 170.
  • With reference to FIG. 3, in a particularly preferred embodiment of the present invention, the IDS 170 comprises a data processing system as herein before described with reference to FIG. 1. The application software 80 of the IDS 170 includes intrusion detection code 200. The data 60 stored in the memory subsystem 40 of the IDS 170 includes attack identity data 210 and disinfection data 220. The data 60 also includes a record of which of the addresses on the third data network 100 are unassigned and belong to the second group 160, and which of the addresses 110 on the third data network 100 are assigned to data processing systems 150 and belong to the first group 140. The record is updated each time another address is allocated or an existing address allocation is removed. The attack identity data 210 contains data indicative of signatures identifying known attacks. The disinfection data 220 contains data indicative of: the nature of each attack; how to disinfect a system infected with each attack; and how to resume normal network connectivity. The attack identity data 210 and disinfection data 220 are cross referenced. The intrusion detection code 200, when executed by the CPU 10, configures the IDS 170 to operate in accordance with the flow diagram shown in FIG. 4.
  • Referring now to an exemplary embodiment depicted in FIG. 4, in operation, the IDS 170 receives data traffic on the third data network 100 originating at an assigned address 140 and addressed to an unassigned address 160. The IDS 170 inspects the data traffic received for data indicative of an attack. On detection of data indicative of attack, the IDS 170 generates an alert signal. In a preferred embodiment of the present invention, on generation of the alert signal, the data traffic originating at the address 140 assigned to the data processing system 150 originating the data indicative of the attack is rerouted to a disinfection address on the third data network 100. In a particularly preferred embodiment of the present invention, the IDS 170 listens on the third data network 100 and receives traffic directed toward the unassigned addresses 160. Specifically, at block 300, the IDS 170 examines requests sent from addresses 140 on the third data network 100 to determine, at block 310, if the request specifies one of the unassigned addresses 160 as the destination address. If the request does not specify one of the unassigned addresses 160, then, at block 320, the IDS 170 waits for the next request to examine. If, however, the request specifies at least one of the unassigned addresses 160, then, at block 330, the IDS 170 spoofs an answer to the request.
  • The identification may also be realized by assigning the unassigned addresses to the IDS 170, such that any traffic directed at an unassigned address automatically arrives at the IDS 170.
  • The answer is sent to the source address on the third data network 100. The unassigned addresses 160 are not in use otherwise than being inspected for attacks. Thus, an attempt to contact, for example, a system at such an address is a priori suspicious. At block 340, the IDS 170 listens for a reply to the spoofed answer. The IDS 170 may time out if no reply is received within a predetermined period, in which case, at block 320, the IDS 170 waits for the next request to examine. If a reply is however received, then, at block 350, the IDS 170 compares the suspect request and reply with the attack identity data 210 stored in the memory subsystem 40. If, at block 350, the comparison fails to identify an attack, then, at block 320, the IDS 170 waits for the next request to examine. If, however, the comparison at block 350 detects a diagnosable attack in the reply, then the IDS 170 determines that the source system 150 is infected. Accordingly, at block 360, the IDS 170 generates the alert signal. The alert signal is sent to the router 130. The alert signal instructs the router 130 to divert all traffic from the infected system 150 to the disinfection address. This is a rerouting step for rerouting the data traffic originating at the address assigned to the data processing system originating the data indicative of the attack to a disinfection address on the third data network 100.
  • Referring back to FIG. 1, in a particularly preferred embodiment of the present invention, a disinfection server 180 is located at the disinfection address. In a preferred embodiment of the present invention, on generation of the alert signal, the IDS 170 sends an alert signal to the disinfection address. Preferably, the alert signal comprises data indicative of the attack detected. Hence, on generation of the alert signal, an alert step is carried out for sending the alert signal to the disinfection address, the alert signal preferably comprising data indicative of the attack detected.
  • Accordingly, in a particularly preferred embodiment of the present invention, the IDS 170 retrieves the disinfection data 220 corresponding to the attack detected from the memory subsystem 40. At block 370, the IDS 170 sends the alert signal containing retrieved disinfection data to the disinfection address at which the disinfection server 180 resides. Then, at block 320, the IDS 170 waits for the next request to examine. Each request, answer, and reply may be embodied in one or more packets of data traffic on the third data network 100. Accordingly, the signature of each attack may span more than one packet.
  • In a preferred embodiment of the present invention, the disinfection data 220 sent to the disinfection server 180 contains data indicative of: the nature of the attack detected; how to disinfect the system 150 infected with the attack; and how to resume normal network connectivity. On receipt of the disinfection data 220 from the IDS 170, the disinfection server 180 sets about curing the infected system 150 and restoring the third data network 100. In another preferred embodiment of the present invention, the disinfection data 220 contains only data indicative of the nature of the attack. The disinfection server then selects, based the nature of the attack, one of a plurality of prestored techniques for disinfecting the infected system 150 and/or restoring the third data network 100 and executes the selected technique. The attacks may take many different forms. Accordingly, the corresponding techniques for disinfection and network restoration may vary widely from one attack to the next.
  • In a preferred embodiment of the present invention, on receipt the disinfection data, the disinfection server 180 sends a warning message to the infected system 150. The warning message informs the user of the infected system 150 that their system 150 is infected. The warning message may instruct the user to run anti-virus software prestored in the infected system 150 to eliminate or otherwise isolate the infection. Alternatively, the warning message may contain disinfection program code for eliminating the attack from the infected system 150, together with instructions to assist the user in executing the disinfection code on the infected system 150. In another alternative, the warning message may direct the user to another web site, at which appropriate disinfection program code is provided. In another preferred embodiment of the present invention, the warning message contains disinfection program code that, when loaded into the infected system, executes automatically, thus eliminating or otherwise isolating the infection in a manner which is transparent to the user. Other disinfection schemes are possible.
  • In the embodiments of the present invention herein before described, the disinfection server 180 is implemented in a single data processing system such as that herein before described with reference to FIG. 1. However, in other embodiments of the present invention, the disinfection server 180 may be implemented by multiple interconnected data processing systems. Such data processing may be distributed or located together in a “farm”. Each data processing system in the disinfection server may be dedicated to handling a different attack. The IDS 170 may also be implemented by multiple integrated data processing systems. Alternatively, the IDS 170 and the disinfection server 180 may be integrated in a single data processing system.
  • The traffic on the third data network 100 sent from the infected system 150 and deflected by the router 130 to the disinfection server 180 may be logged and/or discarded by the disinfection server 180. In the embodiments of the present invention herein before described, the IDS 170 sends disinfection data to the disinfection server 220. However, in other embodiments of the present invention, once an infection is detected, the IDS 170 may simply instruct the router 130 to deflect traffic from the infected system 150 to the disinfection server 180 without the IDS 170 additionally supplying disinfection data 220 to the disinfection server 180. The disinfection server 180 may then simply act as a repository for traffic originating in the infected system 150, logging and/or discarding traffic it receives from the infected system 150. The logging and discarding may be reported by the disinfection server 180 to an administrator of the third data network 100. Such reports may be delivered periodically or in real time. The reporting may be performed via, for example, an administration console. However, other reporting techniques, such as printed output for example, are possible. On receipt of such reports, administrators can take actions appropriate for eliminating or otherwise containing the infection of the third data network 100.
  • Referring to FIG. 5, the signature generator 190 has a structure that is to some extent similar to that of the IDS 170. The signature generator 190 comprises a data processing system as hereinbefore described with reference to FIG. 1. The application software 80 of the signature generator 190 includes signature generation code 230.
  • The data 60 stored in the memory subsystem 40 of the signature generator 190 includes
      • request data, that the IDS has captured, that is data that arrives with a request
      • reply data, that is data that specifies to which type of request which type of reply can be spoofed
      • response data, that is data that arrives in response to spoofed replies.
  • The data 60 also includes a record of which of the addresses on the third data network 100 are unassigned and belong to the second group 160, and which of the addresses 110 on the third data network 100 are assigned to data processing systems 150 and belong to the first group 140. The record is updated each time another address is allocated or an existing address allocation is removed.
  • The signature generation code 230, when executed by the CPU 10, configures the signature generator 190 to operate in accordance with the flow diagram shown in FIG. 6.
  • Referring now to FIG. 6, in operation, the signature generator 190 identifies data traffic originating from the first network 120 addressed to an unassigned address 160 of the third network 100. Specifically, at block 400, the signature generator 190 examines requests received from the Internet 120 to determine, at block 410, if the request specifies one or more of the unassigned addresses 160 as the destination address. If the request does not specify at least one of the unassigned addresses 160, then, at block 420, the signature generator 190 waits for the next request to examine. The request passes through the signature generator 190 to the router 130. The above step sequence is referenced in FIG. 6 as path via 400.1. In other words, a reception and identification step is performed that receives and identifies the data traffic on the first network 120 addressed to a number of unassigned addresses in the third data network 100.
  • As an alternative to the above described reception and identification step in block 410, the signature generator 190 can skip this step if the signature generator 190 is per default assigned to the unassigned addresses 160. In this case data traffic arriving at the signature generator 190 is by definition directed to an unassigned address 160 and the process jumps from block 400 directly to block 430, referenced in FIG. 6 as path via 400.2. This is a reception step for receiving data traffic from the first data network 120 addressed to a number of unassigned addresses in the third data network 100.
  • If the request specifies one of the unassigned addresses 160, then, at block 430, the signature generator 190 spoofs a answer to the request. The answer is sent to the source address on the Internet 120. Hence an answer step is executed for spoofing an answer to the source that sent the request contained in the received data traffic. The unassigned addresses 160 are not in use by a device other than the signature generator 190. Thus, an attempt to contact, for example, a system at such an address is a priori suspicious. At block 440, the signature generator 190 listens for a reply to the spoofed answer. The signature generator 190 may time out if no reply is received within a predetermined period, in which case, at block 420, the signature generator 190 waits for the next request to examine. If a reply is however received, then, at block 450, the signature generator 190 performs a signature generation algorithm.
  • Dependent on the protocol that is used by a request, a spoofing of an answer may not be necessary. In such a case the signature generator 190 may skip the step of spoofing an answer in block 430 and the step of listening to a reply in block 440. For those requests, the original response is used as a substitute for the reply to the spoofed answer. The answer step is hence in that case executed selectively based on a selection criterion that is dependent on the type of protocol of the received data traffic, The selection criterion may also include additional criteria besides the type of protocol, e.g. the criterion of repetition, i.e. whether the received data traffic has been identified as identical with previously received data traffic.
  • The signature generation algorithm comprises an inspection step in which several incidents of data traffic that are addressed to a number of unassigned addresses in the third data network are inspected for ocurrence of a common data pattern.
  • In a preferred embodiment thereof, the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and sources that have not been subjected to the answer step. With other words, the requests from the non-replying sources are not used for the signature generation. This reduces the data that is used for the inspection step.
  • The inspection step may comprise sorting the incidents according to a connection attribute such as one of source address, source port, protocol type and destination port of the data traffic.
  • Thereafter follows a determination step for, upon finding such a common data pattern, determining from the corresponding data traffic an attack signature for use in detecting attacks for the second data network. The determination step, in a preferred embodiment, comprises counting the number of incidents of the data traffic with a common data substring and defining as the attack signature those data substrings whose number exceeds a predetermined number. Hence substring clusters are built with the cluster size being the number of incidents that contain the corresponding data substring. As soon as the cluster size exceeds the predetermined number, that cluster's substring is defined as attack signature.
  • In the following paragraphs a preferred embodiment of such a signature generation algorithm is explained.
  • The received reply is defined as input wherein a set S={I<srci, dsti, dpti, requesti>iε1} of tuples, and wherein srci is the source address, dsti is the destination address, dpti is the destination port, that is typically associated with a particular service, and request is the request that the source sent to one of the unassigned addresses, but that eventually arrives at the signature generator 190. The destination port is also referred to as service type dpti. A method is performed in the signature generator 190 that has the following two functionalities:
  • 1. Find per-service signatures:
  • 1.1 Group the tuples in S by destination port, and associate each destination port p with the set R(p)={request j | <*, *, p, request j> in S} of requests that were issued against this port p.
  • 1.2 For each port p, find all frequent substrings in R(p) that have a predetermined minimum length. These frequent substrings are the per-service signatures for the service that runs on port p.
  • The Find-per service signatures algorithm monitors the requests that occur and are directed to a specific port and analyzes them for frequent common substrings of the predetermined minimum length. The substrings are the piece of the request that characterize it as an attack. Requests with common substrings are assumed to represent the same type of attack. The port-specific handling makes use of the fact that typically attacks that are directed at different ports are too different to be captured by the same signature. A common substring occurring in requests directed at different ports is therefore likely to be coincidental and hence with a higher likelihood not part of an attack. The port-specific handling hence leads to signatures that reduce the likelihood of false positives, i.e. the erroneous identification and handling of a request as an attack, the request factually being innocent.
  • The above algorithm for finding per-service signatures can in a preferred embodiment be complemented by a second algorithm:
  • 2. Find attack-tool signatures:
  • 2.1 Group the tuples in S by source, and associate each source s with the set R′(s)=(request j | <s, *, *, request j> in S} of requests it made. 2.2 For each R′(s), replace all requests in R′(s) by the per-service signatures they match (see 1). The resulting set R*(s) of per-service signatures is the attack-tool signature.
  • The Find attack-tool signatures part of the algorithm uses a grouping per source and analyzes requests coming from that source, regardless of the port they are directed to. This method makes use of the fact that some attacks show a changing pattern of ports to outsmart intrusion detectors. In this case the signature of an attack would provide an identification of an attack by its source together with a certain substring.
  • In a preferred embodiment this algorithm might be modified in that dynamic weighting of the sources according to the number of different contacted destination addresses is applied.
  • For instance, the predetermined number of data substrings that is to be exceeded to define those data substrings as an attack signature can be adapted. That number may be selected to be lower for sources that direct data traffic to more than one destination address. In particular, that number may be selected reciprocally dependent on the number of destination addresses. This takes into account the fact that the more addresses a data traffic is directed to, the more suspicious the source is and the more likely it is that the data traffic is an actual attack.
  • Also, dynamic weighting of the accuracy of the signatures according to related known properties of a source is possible. In particular, if a given source is known to be an attacker, based upon other previously known signatures, then it is probable that a consistent but unknown activity from that same source is also an attack.
  • Furthermore, timing information can be included. Attacks are often performed by packaged hacker tools. Such tools do not generally randomize the attack sequence so that time sequence analysis can determine not only the attack but also the tool running the attack.
  • The output of the signature generation algorithm is an attack signature that can be used by the intrusion detector 170 to recognize requests as attacks. Hence, using the received responses to spoofed replies to requests directed at unassigned addresses 160, the signature generator 190 derives patterns that are translated into attack signatures. Those attack signatures are in block 460 forwarded to the intrusion detector 170 where the attack signatures are integrated into the attack identification data 210. Hence, by sending the attack signature to the intrusion detector 170 that is assigned to the second data network the signature generator 190 updates the attack identification data 210 that is used by the IDS 170. The described method is not only useful for improving attack identification in the third data network 100, but can be more generally applied for a second network. This means that although the attack signature has been generated by listening to requests coming from the first data network and being directed to unassigned addresses in the third data network, those same attack signatures are sendable to a second data network for use in an intrusion detection method therein. Whereas all three networks can be distinct, the described method works with any combination thereof, such as any of the networks being one of seamlessly connected to, integrated in, connected to, a part of, a subnet of, a supernet of, partially identical with, of unitary construction with, partially connected to partially integrated in one or more of the other networks. In the embodiment depicted in FIG. 2, the second network and the third network 100 are identical.
  • The generation of the signature in block 450 is in a preferred way executed based on a multitude of received requests and/or replies to spoofed answers. For requests that do not need a sequence of spoofing an answer and listening to a reply, the receipt of those requests in block 400 is performed for a multitude of requests, referenced in FIG. 6 as loop 401. For requests that are subjected to a sequence of spoofing an answer (block 430) and listening to a reply (block 440), the sequence of blocks 400, 430, 440 is performed for a multitude of requests, referenced in FIG. 6 as loop 441.
  • Another preferred embodiment comprises an execution of the signature generation algorithm in block 450 and is followed by a reexecution of that algorithm using additional input of examined requests and/or replies. Thereby the outcome of the signature generation algorithm is updated over time.
  • In a preferred deployment of the signature generator, it is placed on a direct link to the Internet. In that way, it is subjected to a maximum amount of hostile attack activity and the above algorithm can derive a larger number of attack signatures. Once derived, the attack signatures can be deployed to an IDS. Such an IDS can also reside in a different network configuration, e.g. behind a firewall.
  • In a preferred embodiment of the present invention, there is furthermore provided a data network comprising: a router for connecting a plurality of data processing systems to the Internet; an intrusion detection system (IDS) connected to the router and connected to the signature generator; and a disinfection server also connected to the router. In response to the IDS detecting, using attack signatures that have been generated by the signature generator, that one of the data processing systems is infected by an attack, the IDS instructs the router to deflect all network traffic from that attack to the disinfection server. The IDS in addition supplies disinfection data to the disinfection server. The disinfection data is indicative of the nature of the infection, how to disinfect the infecting system, and how to resume normal network connectivity.
  • In FIG. 7, an arrangement of three networks is shown. The first data network 120 is connected to the third data network 100 and to the second data network 70 via the router 130. The third data network comprises the assigned addresses 140 and allocated to the unassigned addresses the signature generator 190 which is connected to the intrusion detector 170. The router 130 is connected to the intrusion detector 170 and the disinfection server 180. The intrusion detector 170 is allocated to the unassigned addresses of the second data network 70 which also has assigned addresses 71. The connection of any of the aforementioned can be realized directly or indirectly, e.g. via any of the network connections available.
  • In this embodiment, the data traffic directed towards the unassigned addresses 160 in the third data network arrives automatically at the signature generator 190 which, using its signature generation algorithm, generates an attack signature therefrom. The data traffic arriving at the signature generator 190 can originate in the first network 120 but also come from within the third data network 100.
  • The generated attack signature is sent by the signature generator 190 to the IDS 170 which can make use of the attack signature to identify incidents of arriving data traffic as attacks. Again, since the signature generator 170 is allocated to the unassigned addresses in the second network 70, data traffic that is directed towards the unassigned addresses in the second network 70 is automatically subjected to an attack identification process by the IDS 170 using the attack signature received. Also here, the data traffic arriving at the IDS 170 can originate in the first network 120 but also come from within the second data network 100.
  • Once an attack has been identified as such, the intrusion detector 170 alerts the router 130 of the existence of an attack. The router 130 can then redirect the data traffic that arrives from the identified source of the attacks to the disinfection server 180. If the attacking source resides within the third data network 170, it can be subjected to a disinfection process.
  • It is furthermore possible to deploy a signature generation application to an entity, comprising the following steps: connecting the signature generator to the first data network for generating from requests thereon attack signatures for use in the second data network used by said entity and having a plurality of addresses assigned to data processing systems, setting up the signature generator to generate an attack signature under use of the aforedescribed method, and setting up the signature generator to send the generated attack signature to an intrusion detector connected to the second data network.
  • A signature generator is in a preferred embodiment a “server with no services”. More precisely, it is characterized by two properties: First, it is a security-hardened host that, while offering no real services, listens on all security-relevant ports and logs all incoming requests. Second, it is not advertised in any way, i.e. there are no DNS entries, web links, or other pointers to it. Because it is not advertised, a machine that contacts a signature generator is with near certainty a hacker or worm looking for a target to exploit. As the signature generator logs all incoming requests, it gets hold of the attacks that the hacker or worm is using. Hence, the signature generator is an advantageous source of actual attacks, from which then automatically attack signatures are derived.
  • The functionality described for the signature generator 190 can in a preferred embodiment also be integrated into the IDS 170, such that the IDS 170 derives from the replies to its spoofed answers attack signatures that are added to its attack identification data 210. In the embodiments of the present invention herein before described, the IDS 170, router 130, and disinfection server 180 are implemented by data processing systems programmed with appropriate program code. However, it will be appreciated that, in other embodiments of the present invention, one or more of the functions described herein as being implemented in software may be implemented at least partially in hardwired logic circuitry.
  • It will also be appreciated that the attack detection methods described herein may be implemented by the service provider responsible for the third data network 100, or at least partially by a third party in the form of a service to the service provider. Such a service may differentiate the service offered by the service provider from the services provided by it competitors. Such differentiated services may be optionally supplied to end users of the network service provided in exchange for an additional premium.
  • The method described can be completed by providing a report to an entity, wherein the report contains information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack.
  • The service of generating attack signatures for networks used by an entity other than the service provider, may in a preferred embodiment comprise billing for the service delivered. The charge to be billed may therein be determined in dependence of one or more of a number of factors that typically are indicative of the complexity or workload experienced by the service provider. Such factors indicative of volume and time-consumption of the service provided may include the size of the third data network, the number of unassigned addresses therein, the number of assigned addresses therein, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated using the attack signature, the volume of rerouted data traffic. Factors identifying a level of increased complexity can be the signature of the identified attack, the degree of network security achieved. Also factors identifying the value of the service provided to the serviced entity may be used such as the turnover of the entity, the field of business of the entity, or the like. In general the method hence may comprise billing the entity for the execution of at least one of the steps performed for the entity, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, the turnover of the entity.
  • Of course, any combination of the previously mentioned factors is possible, in particular being differently weighed to determine a final charge. The billing can be automated in that the charge is sent together with the warning message or any other information sent in the attack detection process, This advantageously combines the use of the messaging for the attack-handling purpose together with its use for the billing purpose. The double use of the warning message or another information message provides the technical advantage of reducing the traffic flow generated through the attack detection and billing process. At the same time this method can be used to guarantee that the serviced entity is only billed for exactly the service provided.
  • Another preferred solution for billing is offering the entity a subscription to the attack signature generation and/or attack detection service that allows the serviced entity to profit from the process for a predetermined time, volume of traffic, number of systems or the like.
  • The service provider may offer his own disinfection server as a hosting unit to be used in combination with the network used by the serviced entity, but it is also possible that the disinfection server is held, maintained, hosted or leased by the serviced entity.
  • The method can furthermore be used for supporting an entity in the handling of the detected attack by one of providing instructions for use of, assistance in executing, and execution of disinfection program code.
  • In a further preferred embodiment the service provider may utilize a synergistic effect by providing the attack signature generation and/or attack detection service to several entities, and sharing the resources, such as the signature generator 190, the router 130, the intrusion detector 170 or the disinfection server 180 among the several services. Thereby not only more efficient use of the employed resources can be obtained but also attack-related information between the different networks can be shared and could be utilized to improve the detection quality on the serviced networks. For instance the detection of an attack on one network could lead to a quicker detection on another network since the process of determining an attack signature can be shortened or even eliminated. Also the disinfection mechanism can be shared between the serviced entities thereby reducing their effort and costs related to updating and maintaining the disinfection mechanism. The technical advantage of sharing technical data that is derived from the handling of attacks to the network of one entity to improve the attack handling of another serviced entity will provide an incentive for entities to join a pool of several entities being serviced by the same service provider for intrusion detection. The billing model could in a preferred embodiment be adapted to motivate the participation of entities in a group of entities sharing the signature generation or attack detection resources and employing the same service provider. Hence there is an advantage in providing the method for several entities and using technical data derived from the attack-handling for one of the entities for the attack-handling for another of the entities.
  • The described method can be coded in form of a computer program element comprising computer program code means which, when loaded in a processor of a data processing system, configures the processor to perform a method for generating attack signatures.
  • Furthermore the present invention can be realized in hardware, software, or a combination of hardware and software. The method according to the present invention can be realized in a centralized fashion in one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which—when loaded in a computer system—is able to carry out these methods.
  • A computer program or computer program means in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a device having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.

Claims (27)

1. A method for generating attack signatures from requests from a first data network, said attack signatures being usable in a second data network, the method comprising:
a reception step for receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network;
an inspection step for inspecting several incidents of said received data traffic for a common data pattern,
a determination step for, upon finding a said common data pattern, determining from the corresponding data traffic said attack signature for use in detecting attacks for said second data network, wherein the determination step comprises counting the number of incidents with a common data substring that has a predetermined minimum length and defining as a said attack signature those data substrings whose number exceeds a predetermined number.
2. A method as claimed in claim 1, wherein the inspection step is preceded by an answer step for spoofing an answer to a said source that sent a request contained in the received data traffic.
3. A method as claimed in claim 2, wherein said answer step is executed selectively based on a selection criterion that is dependent on the type of protocol of said received data traffic.
4. A method as claimed in claim 2, wherein for the inspection step the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and sources that have not been subjected to the answer step.
5. A method as claimed in one of claim 1, wherein the inspection step comprises sorting the incidents according to a connection attribute such as one of source address, source port, protocol type and destination port of the data traffic.
6. A method as claimed in one of claim 1, further comprising sending said attack signature to an intrusion detector assigned to said second data network.
7. A method as claimed in one of claim 1, wherein two or all of the first data network, the second data network, and the third data network are selected to be identical, partially identical, connected to each other, or of unitary construction.
8. A method as claimed in one of claim 1, further comprising a reception step for receiving on the second data network data traffic addressed to an unassigned address therein; inspecting the received data traffic for data indicative of an attack, using therefor a said attack signature; and, on detection of data indicative of an attack, generating an alert signal.
9. A method as claimed in claim 8, comprising, on generation of the alert signal, a rerouting step for rerouting the data traffic originating at the address assigned to the data processing system originating the data indicative of the attack to a disinfection address.
10. A method as claimed in claim 8, comprising, on generation of the alert signal, an alert step for sending an alert signal to the disinfection address, said alert signal preferably comprising data indicative of the attack detected.
11. A method as claimed claim 8, further comprising supporting an entity in the handling of the detected attack by one of providing instructions for use of, assistance in executing, and execution of disinfection program code.
12. A method as claimed in claim 8, further comprising providing a report to said entity containing information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack.
13. A method as claimed in claim 1, further comprising billing said entity for the execution of at least one of the steps, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, the turnover of said entity.
14. A method as claimed in claim 1, further comprising providing said method for several entities and using technical data derived from the attack-handling for one of said entities for the attack-handling for another of said entities.
15. A method for deploying a signature generation application to an entity, comprising
connecting a signature generator to a first data network for generating from requests thereon attack signatures for use in a second data network used by said entity and having a plurality of addresses assigned to data processing systems,
setting up said signature generator to generate an attack signature under use of the method claimed in claim 1,
setting up said signature generator to send the generated attack signature to an intrusion detector connected to said second data network.
16. A computer program element comprising computer program code means which, when loaded in a processor of a data processing system, configures the processor to perform a method for generating attack signatures as claimed in claim 1.
17. An apparatus for generating attack signatures from requests on a first data network, said attack signatures being usable in a second data network, the apparatus comprising:
a signature generator for receiving data traffic on the first data network addressed to a number of unassigned address in a third data network, inspecting several incidents of said data traffic received for a common data pattern, and upon finding a said data pattern, determining from the corresponding data traffic said attack signature for use in detecting attacks for said second data network, wherein the signature generator is designed to determine the attack signature by counting the number of incidents with a common data substring and defining as a said attack signature those data substrings whose number exceeds a predetermined number.
18. An apparatus as claimed in claim 17, wherein the signature generator is designed to inspect the received data traffic by spoofing an answer to a said sources that sent a said request contained in the data traffic received.
19. An apparatus as claimed in claim 18, wherein the signature generator is designed to select the incidents of data traffic only from those of the sources replying to the spoofed answer and those sources that have not been subjected to a said spoofed answer.
20. An apparatus as claimed in claim 17, wherein the signature generator is designed to sort the incidents according to a connection attribute such as one of source address, source port, protocol type, and destination port of the data traffic.
21. An apparatus as claimed in claim 17, wherein the signature generator is designed to send said attack signature to an intrusion detector assigned to said second data network.
22. An apparatus as claimed in claim 17, further comprising an intrusion detector for receiving data traffic on the first data network addressed to a number of unassigned address in said second data network, inspecting the received data traffic for data indicative of an attack, using a said attack signature, and, on detection of data indicative of an attack, generating an alert signal.
23. An apparatus as claimed in claim 17, further comprising a router connected to the intrusion detector for rerouting data traffic originating at the address assigned to the data processing system originating the data indicative of the attack to a disinfection address on said third data network.
24. An apparatus as claimed in claim 23, further comprising a disinfection server assigned to the disinfection address, the disinfection server being equipped for sending, on receipt of the alert signal, a warning message to the address assigned to the data processing system originating the data indicative of the attack.
25. A method as claimed in claim 1,
wherein the inspection step is preceded by an answer step for spoofing an answer to a said source that sent a request contained in the received data traffic;
wherein said answer step is executed selectively based on a selection criterion that is dependent on the type of protocol of said received data traffic;
wherein for the inspection step the incidents of data traffic are selected only from those of the sources replying to the spoofed answer and sources that have not been subjected to the answer step;
wherein the inspection step comprises sorting the incidents according to a connection attribute such as one of source address, source port, protocol type and destination port of the data traffic;
further comprising sending said attack signature to an intrusion detector assigned to said second data network;
wherein two or all of the first data network, the second data network, and the third data network are selected to be identical, partially identical, connected to each other, or of unitary construction;
further comprising a reception step for receiving on the second data network data traffic addressed to an unassigned address therein; inspecting the received data traffic for data indicative of an attack, using therefor a said attack signature; and, on detection of data indicative of an attack, generating an alert signal;
further comprising, on generation of the alert signal, a rerouting step for rerouting the data traffic originating at the address assigned to the data processing system originating the data indicative of the attack to a disinfection address;
further comprising, on generation of the alert signal, an alert step for sending an alert signal to the disinfection address, said alert signal preferably comprising data indicative of the attack detected;
further comprising supporting an entity in the handling of the detected attack by one of providing instructions for use of, assistance in executing, and execution of disinfection program code;
further comprising providing a report to said entity containing information related to one of alert, disinfection, rerouting, logging, discarding of data traffic in the context of a detected attack;
further comprising billing said entity for the execution of at least one of the steps, the charge being billed preferably being determined in dependence of one of the size of the network, the number of unassigned addresses monitored, the number of assigned addresses monitored, the volume of data traffic inspected, the number of attacks identified, the number of alerts generated, the signature of the identified attack, the volume of rerouted data traffic, the degree of network security achieved, the turnover of said entity; and
further comprising providing said method for several entities and using technical data derived from the attack-handling for one of said entities for the attack-handling for another of said entities.
26. An article of manufacture comprising a computer usable medium having computer readable program code means embodied therein for causing generation of attack signatures from requests from a first data network, said attack signatures being usable in a second data network, the computer readable program code means in said article of manufacture comprising computer readable program code means for causing a computer to effect:
a reception step for receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network;
an inspection step for inspecting several incidents of said received data traffic for a common data pattern,
a determination step for, upon finding a said common data pattern, determining from the corresponding data traffic said attack signature for use in detecting attacks for said second data network, wherein the determination step comprises counting the number of incidents with a common data substring that has a predetermined minimum length and defining as a said attack signature those data substrings whose number exceeds a predetermined number.
27. A computer program product comprising a computer usable medium having computer readable program code means embodied therein for causing generation of attack signatures from requests from a first data network, the computer readable program code means in said computer program product comprising computer readable program code means for causing a computer to effect the functions of claim 17.
US12/131,327 2003-05-30 2008-06-02 Network Attack Signature Generation Abandoned US20080235799A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/131,327 US20080235799A1 (en) 2003-05-30 2008-06-02 Network Attack Signature Generation

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
EPEP03405393.4 2003-05-30
EP03405393 2003-05-30
US10/558,853 US20070094728A1 (en) 2003-05-30 2003-11-24 Attack signature generation
PCT/IB2003/005453 WO2004107707A1 (en) 2003-05-30 2003-11-24 Network attack signature generation
US12/131,327 US20080235799A1 (en) 2003-05-30 2008-06-02 Network Attack Signature Generation

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/IB2003/005453 Continuation WO2004107707A1 (en) 2003-05-30 2003-11-24 Network attack signature generation
US11/558,853 Continuation US8070609B2 (en) 2006-11-10 2006-11-10 Flexibly configurable button panels for gaming machines

Publications (1)

Publication Number Publication Date
US20080235799A1 true US20080235799A1 (en) 2008-09-25

Family

ID=33484075

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/558,848 Abandoned US20070094722A1 (en) 2003-05-30 2003-11-20 Detecting networks attacks
US10/558,853 Abandoned US20070094728A1 (en) 2003-05-30 2003-11-24 Attack signature generation
US12/128,834 Expired - Fee Related US8261346B2 (en) 2003-05-30 2008-05-29 Detecting attacks on a data communication network
US12/131,327 Abandoned US20080235799A1 (en) 2003-05-30 2008-06-02 Network Attack Signature Generation

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US10/558,848 Abandoned US20070094722A1 (en) 2003-05-30 2003-11-20 Detecting networks attacks
US10/558,853 Abandoned US20070094728A1 (en) 2003-05-30 2003-11-24 Attack signature generation
US12/128,834 Expired - Fee Related US8261346B2 (en) 2003-05-30 2008-05-29 Detecting attacks on a data communication network

Country Status (7)

Country Link
US (4) US20070094722A1 (en)
EP (2) EP1629651A1 (en)
KR (2) KR100877664B1 (en)
CN (2) CN1771708A (en)
AU (2) AU2003280126A1 (en)
TW (1) TWI333613B (en)
WO (2) WO2004107706A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8732296B1 (en) * 2009-05-06 2014-05-20 Mcafee, Inc. System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware
US20140259141A1 (en) * 2005-08-24 2014-09-11 Fortinet, Inc. Systems and methods for detecting undesirable network traffic content
EP3051767A1 (en) * 2015-01-27 2016-08-03 Electronics and Telecommunications Research Institute Method and apparatus for automatically identifying signature of malicious traffic using latent dirichlet allocation
US20170149830A1 (en) * 2015-11-24 2017-05-25 Electronics And Telecommunications Research Institute Apparatus and method for automatically generating detection rule

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100877664B1 (en) * 2003-05-30 2009-01-12 인터내셔널 비지네스 머신즈 코포레이션 Detecting network attacks
US7406714B1 (en) 2003-07-01 2008-07-29 Symantec Corporation Computer code intrusion detection system based on acceptable retrievals
US7568229B1 (en) 2003-07-01 2009-07-28 Symantec Corporation Real-time training for a computer code intrusion detection system
US8266177B1 (en) 2004-03-16 2012-09-11 Symantec Corporation Empirical database access adjustment
US7966658B2 (en) * 2004-04-08 2011-06-21 The Regents Of The University Of California Detecting public network attacks using signatures and fast content analysis
US7936682B2 (en) * 2004-11-09 2011-05-03 Cisco Technology, Inc. Detecting malicious attacks using network behavior and header analysis
US8010685B2 (en) * 2004-11-09 2011-08-30 Cisco Technology, Inc. Method and apparatus for content classification
KR100622670B1 (en) * 2004-12-07 2006-09-19 한국전자통신연구원 Real-time network attack pattern detection system for unknown network attack and method thereof
US7765596B2 (en) 2005-02-09 2010-07-27 Intrinsic Security, Inc. Intrusion handling system and method for a packet network with dynamic network address utilization
US7444331B1 (en) 2005-03-02 2008-10-28 Symantec Corporation Detecting code injection attacks against databases
US8095983B2 (en) 2005-03-15 2012-01-10 Mu Dynamics, Inc. Platform for analyzing the security of communication protocols and channels
US8095982B1 (en) 2005-03-15 2012-01-10 Mu Dynamics, Inc. Analyzing the security of communication protocols and channels for a pass-through device
ATE485552T1 (en) * 2005-03-24 2010-11-15 Ibm NETWORK ATTACK DETECTION
US8046374B1 (en) 2005-05-06 2011-10-25 Symantec Corporation Automatic training of a database intrusion detection system
US7558796B1 (en) 2005-05-19 2009-07-07 Symantec Corporation Determining origins of queries for a database intrusion detection system
US7774361B1 (en) * 2005-07-08 2010-08-10 Symantec Corporation Effective aggregation and presentation of database intrusion incidents
US7690037B1 (en) 2005-07-13 2010-03-30 Symantec Corporation Filtering training data for machine learning
US8161548B1 (en) 2005-08-15 2012-04-17 Trend Micro, Inc. Malware detection using pattern classification
US7840958B1 (en) * 2006-02-17 2010-11-23 Trend Micro, Inc. Preventing spyware installation
EP1994717A1 (en) 2006-02-28 2008-11-26 International Business Machines Corporation Detection and control of peer-to-peer communication
US7540766B2 (en) * 2006-06-14 2009-06-02 Itron, Inc. Printed circuit board connector for utility meters
US7881209B2 (en) * 2006-07-27 2011-02-01 Cisco Technology, Inc. Method and system for protecting communication networks from physically compromised communications
KR100809416B1 (en) * 2006-07-28 2008-03-05 한국전자통신연구원 Appatus and method of automatically generating signatures at network security systems
US9172611B2 (en) * 2006-09-01 2015-10-27 Spirent Communications, Inc. System and method for discovering assets and functional relationships in a network
US8316447B2 (en) * 2006-09-01 2012-11-20 Mu Dynamics, Inc. Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
US7954161B1 (en) 2007-06-08 2011-05-31 Mu Dynamics, Inc. Mechanism for characterizing soft failures in systems under attack
US7958230B2 (en) 2008-09-19 2011-06-07 Mu Dynamics, Inc. Test driven deployment and monitoring of heterogeneous network systems
US8510834B2 (en) * 2006-10-09 2013-08-13 Radware, Ltd. Automatic signature propagation network
US8065729B2 (en) 2006-12-01 2011-11-22 Electronics And Telecommunications Research Institute Method and apparatus for generating network attack signature
US8006078B2 (en) * 2007-04-13 2011-08-23 Samsung Electronics Co., Ltd. Central processing unit having branch instruction verification unit for secure program execution
US20080274725A1 (en) * 2007-05-02 2008-11-06 Ury George Tkachenko Wireless multifunction network device
CN101384079A (en) 2007-09-03 2009-03-11 华为技术有限公司 Method, system and apparatus for preventing degraded attack when terminal moving
US7774637B1 (en) 2007-09-05 2010-08-10 Mu Dynamics, Inc. Meta-instrumentation for security analysis
US8250658B2 (en) * 2007-09-20 2012-08-21 Mu Dynamics, Inc. Syntax-based security analysis using dynamically generated test cases
CN101222513B (en) * 2008-01-28 2012-06-20 杭州华三通信技术有限公司 Method and network appliance for preventing repeated address detection attack
US8463860B1 (en) 2010-05-05 2013-06-11 Spirent Communications, Inc. Scenario based scale testing
US8547974B1 (en) 2010-05-05 2013-10-01 Mu Dynamics Generating communication protocol test cases based on network traffic
US9106514B1 (en) 2010-12-30 2015-08-11 Spirent Communications, Inc. Hybrid network software provision
US8464219B1 (en) 2011-04-27 2013-06-11 Spirent Communications, Inc. Scalable control system for test execution and monitoring utilizing multiple processors
US8621278B2 (en) 2011-06-28 2013-12-31 Kaspersky Lab, Zao System and method for automated solution of functionality problems in computer systems
NL2007180C2 (en) * 2011-07-26 2013-01-29 Security Matters B V Method and system for classifying a protocol message in a data communication network.
US8776241B2 (en) 2011-08-29 2014-07-08 Kaspersky Lab Zao Automatic analysis of security related incidents in computer networks
US8972543B1 (en) 2012-04-11 2015-03-03 Spirent Communications, Inc. Managing clients utilizing reverse transactions
EP2785009A1 (en) 2013-03-29 2014-10-01 British Telecommunications public limited company Method and apparatus for detecting a multi-stage event
EP2785008A1 (en) * 2013-03-29 2014-10-01 British Telecommunications public limited company Method and apparatus for detecting a multi-stage event
EP3172691A4 (en) * 2014-07-21 2018-04-11 Hewlett-Packard Enterprise Development LP Security indicator linkage determination
US9641542B2 (en) 2014-07-21 2017-05-02 Cisco Technology, Inc. Dynamic tuning of attack detector performance
US9407646B2 (en) 2014-07-23 2016-08-02 Cisco Technology, Inc. Applying a mitigation specific attack detector using machine learning
US9450972B2 (en) 2014-07-23 2016-09-20 Cisco Technology, Inc. Network attack detection using combined probabilities
US20160164886A1 (en) 2014-10-17 2016-06-09 Computer Sciences Corporation Systems and methods for threat analysis of computer data
US9531750B2 (en) * 2015-05-19 2016-12-27 Ford Global Technologies, Llc Spoofing detection
US10609053B2 (en) * 2015-11-24 2020-03-31 Intel Corporation Suspicious network traffic identification method and apparatus
GB201603118D0 (en) 2016-02-23 2016-04-06 Eitc Holdings Ltd Reactive and pre-emptive security system based on choice theory
US10432652B1 (en) 2016-09-20 2019-10-01 F5 Networks, Inc. Methods for detecting and mitigating malicious network behavior and devices thereof
WO2018122049A1 (en) 2016-12-30 2018-07-05 British Telecommunications Public Limited Company Data breach detection
US11611570B2 (en) * 2016-12-30 2023-03-21 British Telecommunications Public Limited Company Attack signature generation
US11658996B2 (en) * 2016-12-30 2023-05-23 British Telecommunications Public Limited Company Historic data breach detection
CN108076038A (en) * 2017-06-16 2018-05-25 哈尔滨安天科技股份有限公司 A kind of C&C servers determination methods and system based on Service-Port
CA3108330A1 (en) * 2017-08-02 2019-02-07 CipherTooth, Inc. Detecting man in the middle attacks on a local area network
US20190098051A1 (en) * 2017-09-27 2019-03-28 Cox Communications, Inc. Systems and Methods of Virtual Honeypots
US10812509B2 (en) * 2017-10-30 2020-10-20 Micro Focus Llc Detecting anomolous network activity based on scheduled dark network addresses
US10855701B2 (en) * 2017-11-03 2020-12-01 F5 Networks, Inc. Methods and devices for automatically detecting attack signatures and generating attack signature identifications
CN110557355B (en) * 2018-05-31 2021-07-27 上海连尚网络科技有限公司 Method and equipment for detecting man-in-the-middle attack through user equipment
US11005868B2 (en) * 2018-09-21 2021-05-11 Mcafee, Llc Methods, systems, and media for detecting anomalous network activity
TWI707565B (en) * 2019-04-19 2020-10-11 國立中央大學 Network attacker identifying method and network system
US11444961B2 (en) * 2019-12-20 2022-09-13 Intel Corporation Active attack detection in autonomous vehicle networks
US11483318B2 (en) 2020-01-07 2022-10-25 International Business Machines Corporation Providing network security through autonomous simulated environments
CN111507262B (en) * 2020-04-17 2023-12-08 北京百度网讯科技有限公司 Method and apparatus for detecting living body
US11876834B1 (en) * 2021-08-11 2024-01-16 Rapid7, Inc. Secure verification of detection rules on test sensors

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020143963A1 (en) * 2001-03-15 2002-10-03 International Business Machines Corporation Web server intrusion detection method and apparatus
US20020166063A1 (en) * 2001-03-01 2002-11-07 Cyber Operations, Llc System and method for anti-network terrorism
US7210168B2 (en) * 2001-10-15 2007-04-24 Mcafee, Inc. Updating malware definition data for mobile data processing devices
US7743415B2 (en) * 2002-01-31 2010-06-22 Riverbed Technology, Inc. Denial of service attacks characterization

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69131527T2 (en) * 1990-04-23 2000-04-27 Matsushita Electric Industrial Co., Ltd. Data transmission system and method
US5440723A (en) * 1993-01-19 1995-08-08 International Business Machines Corporation Automatic immune system for computers and computer networks
US6275470B1 (en) * 1999-06-18 2001-08-14 Digital Island, Inc. On-demand overlay routing for computer-based communication networks
KR100331219B1 (en) * 2000-02-10 2002-04-06 이상원 Internet billing method and system
GB2362076B (en) * 2000-05-03 2002-08-14 3Com Corp Detection of an attack such as a pre-attack on a computer network
CA2410522C (en) * 2000-06-30 2010-01-26 Andrea Soppera Packet data communications
US20020162017A1 (en) * 2000-07-14 2002-10-31 Stephen Sorkin System and method for analyzing logfiles
AU2001281150A1 (en) * 2000-08-07 2002-02-18 Xacct Technologies Limited System, method and computer program product for processing network accounting information
US6381242B1 (en) * 2000-08-29 2002-04-30 Netrake Corporation Content processor
GB0022485D0 (en) * 2000-09-13 2000-11-01 Apl Financial Services Oversea Monitoring network activity
WO2003050644A2 (en) * 2001-08-14 2003-06-19 Riverhead Networks Inc. Protecting against malicious traffic
JP3461816B2 (en) * 2000-11-15 2003-10-27 株式会社ソニー・コンピュータエンタテインメント Information branch control method, notification signal generation method, program execution device, recording medium on which processing program is recorded, and processing program
KR100351306B1 (en) * 2001-01-19 2002-09-05 주식회사 정보보호기술 Intrusion Detection System using the Multi-Intrusion Detection Model and Method thereof
US7290283B2 (en) * 2001-01-31 2007-10-30 Lancope, Inc. Network port profiling
EP1358559A4 (en) * 2001-01-31 2009-04-29 Lancope Inc Network port profiling
US20020116639A1 (en) * 2001-02-21 2002-08-22 International Business Machines Corporation Method and apparatus for providing a business service for the detection, notification, and elimination of computer viruses
US6970920B2 (en) * 2001-04-11 2005-11-29 International Business Machines Corporation Methods, systems and computer program products for communicating with unconfigured network devices on remote networks
US8438241B2 (en) * 2001-08-14 2013-05-07 Cisco Technology, Inc. Detecting and protecting against worm traffic on a network
US20040148521A1 (en) * 2002-05-13 2004-07-29 Sandia National Laboratories Method and apparatus for invisible network responder
US20040162994A1 (en) * 2002-05-13 2004-08-19 Sandia National Laboratories Method and apparatus for configurable communication network defenses
KR20020075319A (en) * 2002-07-19 2002-10-04 주식회사 싸이버텍홀딩스 Intelligent Security Engine and Intelligent and Integrated Security System Employing the Same
US7017186B2 (en) * 2002-07-30 2006-03-21 Steelcloud, Inc. Intrusion detection system using self-organizing clusters
KR100877664B1 (en) * 2003-05-30 2009-01-12 인터내셔널 비지네스 머신즈 코포레이션 Detecting network attacks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020166063A1 (en) * 2001-03-01 2002-11-07 Cyber Operations, Llc System and method for anti-network terrorism
US20020143963A1 (en) * 2001-03-15 2002-10-03 International Business Machines Corporation Web server intrusion detection method and apparatus
US7210168B2 (en) * 2001-10-15 2007-04-24 Mcafee, Inc. Updating malware definition data for mobile data processing devices
US7743415B2 (en) * 2002-01-31 2010-06-22 Riverbed Technology, Inc. Denial of service attacks characterization

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140259141A1 (en) * 2005-08-24 2014-09-11 Fortinet, Inc. Systems and methods for detecting undesirable network traffic content
US9374338B2 (en) * 2005-08-24 2016-06-21 Fortinet, Inc. Remotely processing detection of undesirable network traffic content
US9461963B2 (en) 2005-08-24 2016-10-04 Fortinet, Inc. Systems and methods for detecting undesirable network traffic content
US9634989B2 (en) 2005-08-24 2017-04-25 Fortinet, Inc. Systems and methods for detecting undesirable network traffic content
US10068090B2 (en) 2005-08-24 2018-09-04 Fortinet, Inc. Systems and methods for detecting undesirable network traffic content
US8732296B1 (en) * 2009-05-06 2014-05-20 Mcafee, Inc. System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware
EP3051767A1 (en) * 2015-01-27 2016-08-03 Electronics and Telecommunications Research Institute Method and apparatus for automatically identifying signature of malicious traffic using latent dirichlet allocation
US20170149830A1 (en) * 2015-11-24 2017-05-25 Electronics And Telecommunications Research Institute Apparatus and method for automatically generating detection rule
EP3174264A1 (en) * 2015-11-24 2017-05-31 Electronics and Telecommunications Research Institute Apparatus and method for automatically generating detection rule

Also Published As

Publication number Publication date
KR100800370B1 (en) 2008-02-04
US8261346B2 (en) 2012-09-04
EP1629651A1 (en) 2006-03-01
AU2003280126A1 (en) 2005-01-21
WO2004107707A1 (en) 2004-12-09
CN1771709B (en) 2010-04-07
US20070094728A1 (en) 2007-04-26
EP1629652A1 (en) 2006-03-01
US20070094722A1 (en) 2007-04-26
CN1771709A (en) 2006-05-10
KR20060023952A (en) 2006-03-15
AU2003280190A1 (en) 2005-01-21
TWI333613B (en) 2010-11-21
WO2004107706A1 (en) 2004-12-09
KR20060013491A (en) 2006-02-10
CN1771708A (en) 2006-05-10
KR100877664B1 (en) 2009-01-12
TW200428203A (en) 2004-12-16
US20090070870A1 (en) 2009-03-12

Similar Documents

Publication Publication Date Title
US20080235799A1 (en) Network Attack Signature Generation
US12019745B2 (en) Cyberanalysis workflow acceleration
US9667589B2 (en) Logical / physical address state lifecycle management
US10686814B2 (en) Network anomaly detection
Ganesh Kumar et al. Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)
Bailey et al. Data reduction for the scalable automated analysis of distributed darknet traffic
US7469418B1 (en) Deterring network incursion
Prieto et al. Botnet detection based on DNS records and active probing
JP4753264B2 (en) Method, apparatus, and computer program for detecting network attacks (network attack detection)
Song et al. Collaborative defense mechanism using statistical detection method against DDoS attacks
US12126639B2 (en) System and method for locating DGA compromised IP addresses
Tayyebi et al. Cloud Security Framework: VM Features Based Intrusion Detection System
Konte Understanding and defending against internet infrastructures supporting cybecrime operations

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JULISCH, KLAUS;RIORDAN, JAMES F;REEL/FRAME:021434/0555;SIGNING DATES FROM 20060126 TO 20060216

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION