+ All Categories
Home > Documents > Network Security Situation Awareness

Network Security Situation Awareness

Date post: 07-Oct-2015
Category:
Upload: himanshu-rai
View: 43 times
Download: 0 times
Share this document with a friend
Description:
A project report on Network Security Situation Awareness
Popular Tags:

of 60

Transcript
  • A Project Report on

    Network Security Situation Awareness based on Network Simulation

    Submitted in partial fulfillment of the requirements for the award of the degree of

    Bachelor of Technology

    in Computer Science and Engineering

    by Himanshu Rai

    1209710908

    Utkarsh Sagar

    1109710119

    Vikas Gupta

    1109710121

    (Semester-VII)

    Under the Supervision of Mr. Manish Kumar Sharma

    Galgotias College of Engineering & Technology

    Greater Noida 201306

    Affiliated to

    Uttar Pradesh Technical University

    Lucknow

  • GALGOTIAS COLLEGE OF ENGINEERING & TECHNOLOGY

    GREATER NOIDA - 201306, UTTAR PRADESH, INDIA.

    CERTIFICATE

    This is to certify that the project report entitled Network Security Situation Awareness

    Based on Network Simulation submitted by Himanshu Rai, Utkarsh Sagar and Vikas

    Gupta to the UPTU, Uttar Pradesh in partial fulfillment for the award of Degree of

    Bachelor of Technology in Computer science & Engineering is a bonafide record of the

    project work carried out by them under my supervision during the year 2014-2015.

    Dr. Bhawna Mallick

    Professor and Head

    Dept. of CSE

    Mrs. Sarita Bharti

    Assistant Professor

    Dept. of CSE

  • CONTENTS

    Title Page

    ACKNOWLEDGEMENTS i

    ABSTRACT ii

    LIST OF TABLES iii

    LIST OF FIGURES iv

    ABBREVIATIONS v

    NOMENCLATURE vi

    CHAPTER 1 INTRODUCTION 1

    1.1 Introductory Chapter 1

    1.2 Background 3

    1.3 Steps in Network Security 6

    1.3.1 Situation Awareness 6

    1.3.2 Situation Evaluation 7

    1.3.3 Situation Forecast 7

    CHAPTER 2 LITERATURE SURVEY 9

    2.1 Introduction 9

    2.2 Basics of simulation 11

    2.3 Dimensions of simulation performance 12

    2.3.1 Execution speed 12

    2.3.2 Scalability 12

    2.3.3 Fidelity 13

    2.3.4 Cost 13

    2.4 Types of simulation 14

    2.4.1 Time driven Simulation 14

    2.4.2 Event driven simulation 15

  • 2.5 Network Simulation tools 16

    2.5.1 NS2 (Network Simulator version2) 17

    2.5.2 OPNET (Optimized Network Engineering Tools) 18

    2.5.3 NETSIM 19

    2.5.4 OMNET++ 19

    2.5.5 QualNet 20

    2.6 Framework for network security situation awareness 22

    2.7 Old Experimental Setup and Results 23

    CHAPTER 3 PROPOSED WORK 26

    3.1 Important element construction 27

    3.1.1 Firewall and IDS 27

    3.1.2 Node Performance 30

    3.2 Abstract Packet Forwarding 31

    3.2.1 Computing Queue 32

    3.2.2 Continuous Multi-hop Processing 34

    3.3 Network Security Situation Awareness 35

    3.3.1 Event Extraction 35

    3.3.2 Performance Correction Method 36

    3.3.3 Network Security Situation Value 37

    3.4 Overall Description 39

    3.4.1 Product Perspective 39

    3.4.2 Product Functions 39

    3.4.3 Requirements 39

    3.4.4 Design and implementation constraint 39

    3.4.5 User Characterstics 40

    3.4.6 Assumptions and Dependencies 40

  • 3.5 External Interface Requirments 40

    3.5.1 User Interfaces 40

    3.5.2 Hardware Interfaces 40

    3.5.3 Software Interface 40

    3.5.4 Performance Requirements 40

    3.6 Other Non-Functional Requirements 41

    3.6.1 Safety Requirements 41

    3.6.2 Security 41

    3.6.3 Maintenance 41

    3.7 Milestone Chart 41

    3.7.1 Problem Statement 41

    3.7.2 Outline 41

    3.7.3 Survey 41

    3.7.4 Design 42

    3.7.5 Coding 42

    3.7.6 Testing 42

    3.8 Data Flow Diagram 43

    3.8.1 0-level DFD 43

    3.8.2 1-level DFD 44

    3.8.3 Flow Diagram of Project 45

    CHAPTER 5 CONCLUSION AND FUTURE SCOPE 46

    REFERENCE 47

    4

  • i

    ACKNOWLEDGEMENT

    We would like to express our deepest appreciation to all those who provided us the

    possibility to complete this report. A special gratitude we give to our project guide, Mrs.

    Sarita Bharti and our project coordinator whose contribution in stimulating suggestions and

    encouragement helped us to coordinate our project.

    We would like to express our deep sense of gratitude to Prof. Bhawna Mallick (H.O.D),

    Computer Science & Engineering Department and all our faculty members for their support

    whenever required. We have to appreciate the guidance given by other supervisors as well as

    the panels especially in our project presentation that has improved our presentation skills,

    thanks to their comments and advices. A special thanks to all our teammates and last but not

    the least our parents for their encouragement and every possible support.

  • ii

    ABSTRACT

    KEYWORDS: network security situation, network simulation, abstract packet-

    forwarding, situation awareness.

    Network Security Situation Awareness is a comprehensive technology which can obtain

    and process the information of security, and it plays an important role in the field of

    network security. As the traditional network security situation awareness methods

    mainly forecast the situation value based on mathematical models, which will result in

    the ignorance of the dynamic changes of network security situation elements, this paper

    presents a method of network security situation awareness based on network simulation.

    This method firstly constructs various simulation elements models; secondly it constructs

    a network security situation awareness simulation scenario based on these constructed

    models; thirdly it uses abstract packet-forwarding method to quickly infer network

    security behaviors in simulation scenario meanwhile recording important log

    information; finally it evaluates the value of network security situation based on the

    log information and forecasts the network security situation. Experiment proves that

    this method can reduce the network security stimulation time effectively and evaluate the

    network security situation value accurately.

  • iii

    List of Tables

    Table Title Page

    2.1 Languages Used By Simulator 21

    2.2 Simulation Experiment Data and Calculation Result 25

  • iv

    LISTOF FIGURES

    Figure Title Page

    1.1 Traditional method of situation awareness 4

    1.2 Steps in situation awareness 8

    2.1 The information gap 11

    2.2 Simple simulator block diagram 12

    2.3 Typical discontinuities in Time versus State trajectories of continuous 16

    2.4 Architecture of NS2 17

    2.5 Architecture of OPNET 18

    2.6 Architecture of NETSIM 19

    2.7 Architecture of OMNET++ 20

    2.8 Architecture of QualNet 21

    2.9 Framework of Network Security Situation Awareness 22

    2.10 Experimental Setup 23

    3.1 Experimental Setup 22

    3.1 Firewall and IDS 28

    3.2 Structure of Node Performance 31

    3.3 Traditional Packet Transmit Simulation Process 32

    3.4 Computing Queue 32

    3.5 Network Security Situation Assessment Based on log files 35

    3.6 Milestone Chart 42

    3.7 0-level DFD 43

    3.8 1-level DFD 44

    3.9 Flow Diagram 45

  • v

    ABBREVIATIONS

    IDS Intrusion Detection System

    AIMS Active Intrusion Monitoring System

    NSSA Network Security Situation Awareness

    NSS Network Simulation Software

    TTL Time to Live

    API Application Program Interface

    VoT Value of Threat

    SYN Synchronization

    UDP User Datagram Protocol

    SQL Structured Query Language

    SA Security Awareness

    FTP File Transfer Protocol

  • vi

    NOMENCLATURE

    English Symbols

    l Length

    t Time taken by packet getting to Queue

    C(t) Number of packets in queue at time t

    L(t) Length of Packets in queue at time t

    t+ Moment after packet reached to queue

    L Link

    B Bandwidth of link L

    dq Queuing Delay

    dt Send Delay

    D Propagation Delay

    idh Host ID

    timep Time from beginning to present

    Number of packets processed

    Amount of memory used

    Number of connections

    Sum of packets length which are processed

    number of packets dropped

    Correction Parameter

    s Weight of Service

    h Nodes weight

    P Performance Variation

  • CHAPTER 1

    INTRODUCTION

    1.1 INTRODUCTORY CHAPTER

    Traditional network security devices such as Intrusion Detection Systems (IDS),

    firewalls, and security scanners operate independently of one another, with virtually no

    knowledge of the network assets they are defending. This lack of information results in

    numerous ambiguities when interpreting alerts and making decisions on adequate

    responses. Network systems are suffering from various security threats including network

    worms, large scale network attacks etc. and network security situation awareness is an

    effective way to solve these problems. The general process is to perceive the network

    security events happened in a certain time period and cyberspace environment,

    synthetically manipulate the security data, analyze the attack behaviors systems suffered,

    provide the global view of network security, and assess the whole security situation and

    predict the future security trends of the network.

    With the development of computer and communication technology, the growing number

    of web user and more kinds of web service needed make the scale of computer network

    larger and applications more complex. At the same time, network security incidents occur

    much more frequently, and computer network information security is facing a severe

    situation. The traditional single defense and detection equipment have been unable to

    meet the demand of network security.

    In 1988, Endsley defined situation awareness as "the perception of the elements in the

    environment within a volume of time and space, the comprehension of their meaning, and

    the projection of their status in the near future". Network Security Situation Awareness

    can integrate all reasons of security, reflect an overall network security situation

    dynamically, predict the development of the security situation early, make the insecurity

    risk and loss to minimum, and provide reliable reference bases for enhancing the network

    security. Therefore, network security situation awareness has become a hot topic in the

    field of network security.

    Threats against computer networks have never been greater, nor have they had a greater

  • 2

    impact on the use of computer and network resources The sophistication of network

    attacks has also been steadily increasing. First generation attacks propagated uniquely-

    named executables that could be easily stopped once discovered. Newer attacks use

    random names and execution patterns to throw off signature-based Intrusion Detection

    Systems (IDS). Similarly, Denial of Service (DoS) attacks have increased in

    sophistication from single computer attacks to distributed mobile attacks.

    With the size and complexity of networks continuously increasing, network security

    analysts face mounting challenges of securing and monitoring their network

    infrastructure for attacks. This task is generally aided by kinds of network security

    products, such as NetFlow, firewall and Host security system. As the number of security

    incidents continues to increase, this task will become ever more insure-mountable, and

    perhaps the main reason that the task of network security monitoring is so difficult is the

    lack of tools to provide a sense of network security situational awareness that defined by

    the Department of Homeland Security as the ability to effectively determine an overall

    computer network status based on relationships between security events in multiple

    dimensions.

    The fields of statistics, pattern recognition, machine learning, and data mining have been

    applied to the fields of network security situational awareness. Although new systems,

    protocols and algorithms have been developed and adopted to prevent and detect network

    intruders automatically. Even with these advancements, the central feature of Stolls story

    has not changed: humans are still crucial in the computer security process. Administrators

    must be willing to patiently observe and collect data on potential intruders. They need to

    think quickly and creatively.

    Unlike the traditional methods of analyzing network security textual log data, information

    visualization approach has been proven that it can increase the efficiency and

    effectiveness of network intrusion detection significantly by the reduction of human

    cognition process. Information visualization cannot only help analysts to deal with the

    large volume of analytical data by taking the advantage of computer graphics, but also

    help network administrators to detect anomalies through visual pattern recognition. It can

    even be used for discovering new types of attacks and forecasting the trend of unexpected

  • 3

    events. Current research in cyber security visualization has been growing and many

    visual design methods have been explored. Some of the developed systems are ID

    Graphs, IP Matrix, Visual Firewall and many others. Even with the aid of information

    visualization, there are still complex issues that network security situational awareness is

    difficult to describe, because the security events are hard to quantify, the terminology and

    concepts become too obscure to understand, and large number and scope of the available

    security multi-source data become a great challenge to the security analysts.

    In our project, a novel visualization system, NetSecRadar, is proposed which can monitor

    the network in real-time and perceive the overall view of security situation and find the

    correlation of dangerous events in logs generated by multi-source network security

    products using radial graph that is aesthetically pleasing and has a compact layout for

    user interaction. The system utilizes multi-source data to analyze the irregular behavioral

    patterns to identify and monitor the situational awareness, and synthesizes interactions,

    filtering and drill-down to detect the potential information.

    1.2 BACKGROUND

    Network security situation awareness is a comprehensive technology which can obtain

    and process the information of security, and it plays an important role in the field of

    network security. As the traditional network security situation awareness methods mainly

    forecast the situation value based on mathematical models, which will result in the

    ignorance of the dynamic changes of network security situation elements, The process of

    traditional situation awareness can be visually represented by three-level model in Fig.

    l.1. The contents of network security situation awareness can be summarized as 3 aspects:

    1. Network security situation elements extraction; 2. Network security situation

    assessment and 3.network security situation awareness. In network security situation

    elements extraction, Jajodia collected network vulnerability information to assess the

    network vulnerability situation, Ning collected network alerting information to assess the

    network threat situation[19]. The information collected from one single aspect can't

    obtain the network security situation accurately, thus obtaining comprehensive

    information and information's relevance is particularly important. In our project, we will

    obtain the comprehensive information and information's relevance by node performance

  • 4

    and log files to evaluate the network security situation. In network security situation

    assessment, Xiu-zhen Chen proposed a quantitative hierarchical network security threat

    evaluation method which has become the mainstream of network security situation

    assessment;[25] Yong Wei and Yifeng Lian proposed a network security situation

    assessment model based on log audit and performance correction algorithm on the basis

    of the hierarchical network security situation assessment method[26].

    In network security situation awareness, traditional network security situation awareness

    algorithm is based on Statistical Bayesian Techniques and Gray Relational Model. It only

    gives network managers the past and current state of network security situation, but can't

    forecast the network security situation. Abstract packet-forwarding method can process

    network behaviors in network simulation quickly. This method not only reduces the

    simulation time, but also ensures the result accuracy.

    Fig. 1.1 Traditional method of situation awareness [21]

    To deal with the increased information security threats, many kinds of security

    equipments have been used in the large scale network. These equipments produce lots of

    security events. Its very difficult to obtain the security state of the whole network

    precisely when facing too much warning information. To settle this problem, many

    researches had introduced the concept of situation awareness into internet security

    system. Bass was the first who introduced this concept into network and bring forward

    the network security perception frame based on multi-sensor data fusion. It helps network

    administrators to identify, track and measure network attack activities. With references

    from Endsleys situation awareness framework, Jibao and others developed network

  • 5

    security situation awareness model. On the other hand, according to Basss concept, Liu

    and others put forward the model of network security perception based on information

    fusion. In order to know the whole network security trend, we have to collect, fusion and

    analysis a great deal of information, decrease the false positive rate and false negative

    rate. Yu and others reported a warning message fusion method based on weighted D-S

    evidence theory. Fuse information from all sensors with different reliability and weight to

    increase the reliability of warning message and decrease the false alarm rate effectively.

    But, the important thing is how to set the reliability and power of each sensor accurately.

    Wang and others suggested that using neural network for heterogeneous multi-sensor

    data fusion and considerate time and severity of the attack when analysis the security

    situation. Stefanos et al find the latent correlation with the help of automatic knowledge

    discovery and realize correlation analysis among warning information. The advantage is

    the mechanism of automatic knowledge discovery and the disadvantage is its not always

    give satisfaction without the interaction of human. Sometime it may find a great deal of

    useless message.

    Using network simulation software we can effectively build a variety of network

    environments and obtain the various information of network.

    There are large amounts of data whose meaning can only be determined in the context of

    the specifics of the monitored network. There are a large number of known patterns of

    intrusions, but there are also a larger number of unknown or yet to be discovered patterns

    of intrusions that must be made detectable. Finally, the intrusions themselves vary in

    criticality with respect to the context in which the intrusion appears. The visualization

    systems discussed in this paper each attempt to use visual presentation as a means of

    mitigating these issues. While the visual display and user interaction techniques are

    different for each class of visualization systems discussed, it is useful to understand how

    the methodological approach of the class determines the context in which the system will

    be effective. While no one approach has been shown to be superior to all others, lessons

    can be learned from each methodological approach, allowing promising new areas of

    investigation to be identified.

  • 6

    The Direct Approach: One methodology is to show what is happening as it is happening

    in a direct one-to-one relationship between the physical networking components and

    computers to the visualized elements. This approach yields systems that are intuitive to

    use and understand and operate in real-time or near-real-time. They generally take low-

    level data directly from packet or IDS logs and display it without abstracting either

    visualized elements or input data.

    Even with the aid of information visualization, there are still complex issues that network

    security situational awareness is difficult to describe, because the security events are hard

    to quantify, the terminology and concepts become too obscure to understand, and large

    number and scope of the available security multi-source data become a great challenge to

    the security analysts. In this paper, a novel visualization system, NetSecRadar, is

    proposed which can monitor the network in real-time and perceive the overall view of

    security situation and find the correlation of dangerous events in logs generated by multi

    source network security products using radial graph that is aesthetically pleasing and has

    a compact layout for user interaction. The system utilizes multi-source data to analyze the

    irregular behavioral patterns to identify and monitor the situational awareness, and

    synthesizes interactions, filtering and drill-down to detect the potential information.

    1.3 STEPS IN NETWORK SECURITY

    The process of traditional situation awareness can be visually represented by three-level

    model

    1.3.1 Situation Awareness

    Situation awareness is the perception of environmental elements with respect to time

    and/or space, the comprehension of their meaning, and the projection of their status after

    some variable has changed, such as time, or some other variable, such as a predetermined

    event. Situation awareness (SA) involves being aware of what is happening in the

    vicinity, in order to understand how information, events, and one's own actions will

    impact goals and objectives, both immediately and in the near future. One with an adept

    sense of situation awareness generally has a high degree of knowledge with respect to

    inputs and outputs of a system, i.e. an innate "feel" for situations, people, and events that

    play out due to variables the subject can control.

  • 7

    In network security situation awareness we have to collect network vulnerability

    information to assess the network vulnerability situation. The information collected from

    one single aspect can't obtain the network security situation accurately, thus obtaining

    comprehensive information and information's relevance is particularly important.

    1.3.2 Situation Evaluation

    With the rapid development of global information and the increasing dependence on

    network for people, network security problems are becoming more and more serious.

    Xiu-zhen Chen proposed a quantitative hierarchical network security threat evaluation

    method which has become the mainstream of network security situation assessment.

    Yong Wei and Yifeng Lian proposed a network security situation assessment model

    based on log audit and performance correction algorithm on the basis of the hierarchical

    network security situation assessment method.

    In situation evaluation we use proper algorithms to fetch the situation of network and get

    the forecast of network. Different parameters values are formed to check the situation.

    Data fetching is done.

    1.3.3 Situation Forecast

    In network security situation awareness, traditional network security situation awareness

    algorithm is based on Statistical Bayesian Techniques and Gray Relational Model. It only

    gives network managers the past and current state of network security situation, but can't

    forecast the network security situation. Abstract packet-forwarding method can process

    network behaviors in network simulation quickly. This method not only reduces the

    simulation time, but also ensures the result accuracy. Different methods used for network

    security dynamic situation forecasting method (Unbiased Gray Markov Forecasting

    Method: UGM_HM), which is based on the Unbiased Grey system theory and Markov

    Forecasting theory. UGM_HM combines advantages of Unbiased Grey system theory

    and Markov Forecasting theory. UGM_HM takes the complex network environment as a

    Grey system and takes the dynamic risk value of network as a Grey value. The long-term

    network security situation is reflected by the Unbiased GM (1, 1) and the state transition

    probabilities are identified by Markov chain theory. The above mentioned dynamic risk

  • 8

    value of network, which based on the artificial immune can reflect the network real-time

    state. Fig. 1.2 compute all.

    Fig. 1.2 Steps in situation awareness

  • CHAPTER 2

    LITERATURE SURVEY

    With the rapid development of computer network technology, network openness sharing

    and interconnection degree growing computer network has brought more and more

    convenience. But at the same time rapid expansion of network size complexity and

    uncertainty increases, network time face serious challenge by the attacks, the threats of

    unexpected events, availability, security, network security issues have become

    increasingly prominent. Traditional network security technology functional unit in a

    separate state, the lack of effective information extraction and information fusion

    mechanism, unable to establish a link between the network resources, global information

    about the performance of poor and unable to effectively manage, mass network security

    information. Network security situation awareness techniques have been proposed in this

    context become the hot spot of the new generation of network security technology and

    development direction.

    2.1 INTRODUCTION

    We are living in what has been termed the "information age". In many domains, this has

    meant a huge increase in systems, displays and technologies. From voice control to

    sophisticated line of sight head mounted displays, almost anything is possible in today's

    world, but too much is proving to be as big a challenge as too little once was. The

    problem is no longer lack of information, but finding what is needed when it is needed.

    Network security has become more important to personal computer users, organizations,

    and the military. With the advent of the internet, security became a major concern and the

    history of security allows a better understanding of the emergence of security technology.

    The internet structure itself allowed for many security threats to occur. The architecture

    of the internet, when modified can reduce the possible attacks that can be sent across the

    network. Knowing the attack methods, allows for the appropriate security to emerge.

    Many businesses secure themselves from the internet by means of firewalls and

    encryption mechanisms. The businesses create an intranet to remain connected to the

    internet but secured from possible threats. The entire field of network security is vast and

    in an evolutionary stage. The range of study encompasses a brief history dating back to

  • 10

    internets beginnings and the current development in network security. In order to

    understand the research being performed today, background knowledge of the internet, its

    vulnerabilities, attack methods through the internet, and security technology is important

    and therefore they are reviewed.

    The design and development of security solutions such as Intrusion Detection Systems

    (IDS) is a challenging and complex task. In this process, the evolving system needs to be

    evaluated continuously. There are several ways to study a system or technology. The

    most accurate is the analysis of the deployed production system. However, in the case of

    IDS evaluation, real experiments incorporating attack scenarios cannot be done in an

    operational environment because the induced risk of failures such as service loss is too

    high. For this very reason, evaluation is often carried out in small testbeds. Virtual

    machines are a solution for modeling mid-scale networks, but the representation of very

    large networks with thousands or millions of devices and links is out of scope. There

    exist scientific initiatives such as Planet- Lab 1 providing computational resources to a

    larger extent. This is an important opportunity for researchers to evaluate network or

    security functionality, but although they provide detailed results, experiments are time

    consuming and remain complex to setup and maintain. Another approach is to represent

    the system with the aid of mathematical models and find analytical answers, i.e. logical

    and quantitative relationships between the entities. Typically, such models also become

    very complex, in particular for a concurrent system such as IDS. Therefore, simulations

    are useful for the evaluation of distributed systems and protocols. Depending on the

    evaluation metrics, the simulations allow the abstraction from irrelevant properties. In

    addition, hazard scenarios, called what-if scenarios, can be constructed which may not

    be possible in real-world test environments.

    The Network Security Simulator, a simulation environment that is based on the service-

    centric agent platform JIAC. It focuses on network security-related scenarios such as

    attack analysis and evaluation of countermeasures. We introduce the main NeSSi2

    concepts and discuss the motivation for realizing them with agent technology. Then, we

    present the individual components and examples where NeSSi2 has been successfully

    applied.

  • 11

    Fig. 2.1 The information gap[16]

    2.2 BASICS OF SIMULATION

    Most of the commercial simulators are GUI driven, while some network simulators are

    CLI driven. The network model / configuration describe the state of the network (nodes,

    routers, switches, and links) and the events (data transmissions, packet error etc.). An

    important output of simulations is the trace files. Trace files log every packet, every event

    that occurred in the simulation and are used for analysis. Network simulators can also

    provide other tools to facilitate visual analysis of trends and potential trouble spots.

  • 12

    The block diagram of a simple simulator can be shown with the help of figure. The

    controller and controller element works simultaneously, then process is carried out to

    produce output.

    Fig 2.2 Simple simulator block diagram

    2.3 DIMENSIONS OF SIMULATION PERFORMANCE

    2.3.1 Execution Speed

    Simulation uses large amount of data to produce result that is the main aim of

    programmer is to reduce the complexity of data travelled to get the results as soon as

    possible. All simulation software has problem with execution speed .The more data to

    process the less execution speed becomes. To reduce this problem the thing we can do is

    to remove the buffer queue which also removes the in and out buffer queue. The

    execution speed is as fast as possible to determine the threat soon and to tell network

    administrator about the network situation as fast as possible which easily helps to forecast

    the network situation. Thats the reason execution speed is most important dimension for

    any network simulator software.

    2.3.2 Scalability

    Scalability is the ability of a system, network, or process to handle a growing amount of

    work in a capable manner or its ability to be enlarged to accommodate that growth. A

    network simulator duplicates the behavior of a real network, but cannot interact with real

    networks. A simulator uses lower quality reproduction or abstraction of the real system

    and focuses on simply replicating the real networks behavior. A network simulation is a

    cost-effective method for developing the early stages of network-centric systems. Users

  • 13

    can evaluate the basic behavior of a network and test combinations of network features

    that are likely to work. Thats why it is important for any network simulator to be

    scalable so that future improvement would be easy to accumulate. Scalable network is

    always useful for an organization. Network scalability main thing is

    1. per-packet processing must be fast;

    2. Separating control and packet handling.

    2.3.3 Fidelity

    Fidelity is the degree of exactness with which something is copied or reproduced. That

    means network simulator should produce correct graph for situation. The correctness and

    exactness is important in any of network simulation software. Any software must not

    deviate from its original graph. In real time system the exactness is something which is

    must. Without that it is difficult to cope with the situation.

    2.3.4 Cost

    For any software cost is very important dimension to judge on. In production, research,

    retail, and accounting, a cost is the value of money that has been used up to produce

    something, and hence is not available for use anymore. In business, one of acquisition, in

    which case the amount of money expended to acquire it is counted as cost. In this case,

    money is the input that is gone in order to acquire the thing. This acquisition cost may be

    the sum of the cost of production as incurred by the original producer, and further costs

    of transaction as incurred by the acquirer over and above the price paid to the producer.

    Usually, the price also includes a mark-up for profit over the cost of production. And

    there are new technology used in network simulation softwares such as firewall, IDS etc.

    so to fetch data from these the overall cost of software increases. So the cost is important

    feature with which we can detect the performance of network simulation software.

    2.4 TYPES OF SIMULATION

    We have seen that in continuous systems the state variables change continuously with

    respect to time, whereas in discrete systems the state variables change instantaneously at

    separate points in time. Unfortunately for the computational experimentation there are but

    a few systems that are either completely discrete or completely continuous state, although

  • 14

    often one type dominates the other in such hybrid systems. The challenge here is to find a

    computational model that mimics closely the behaviour of the system, specifically the

    simulation time-advance approach is critical. If we take a closer look into the dynamic

    nature of simulation models, keeping track of the simulation time as the simulation

    proceeds, we can distinguish between two time-advance approaches: time-driven and

    event-driven.

    2.4.1 Time-Driven Simulation

    In a time-driven simulation we have a variable recording the current time, which is

    incremented in fixed steps. After each increment we check to see which events may

    happen at the current time point, and handle those that do. For example, suppose we want

    to simulate the trajectory of a projectile. At time zero we assign it an initial position and

    velocity. At each time step we calculate a new position and velocity using the forces

    acting on the projectile. Time-driven simulation is suitable here because there is an event

    (movement) that happens at each time step. How do know when to stop the simulation?

    We can use either the criterion of time reaching a certain point, or the model reaching a

    certain state, or some combination of the two.

    For continuous systems, time-driven simulations advance time with a fixed increment.

    With this approach the simulation clock is advanced in increments of exactly t time

    units. Then after each update of the clock, the state variables are updated for the time

    interval [t, t+t]. This is the most widely known approach in simulation of natural

    systems. Less widely used is the time-driven paradigm applied to discrete systems. In this

    case we have specifically to consider whether: The time step t is small enough to

    capture every event in the discrete system.

    Here's a general algorithm for time-driven simulation:

    1. Initialize the system state and simulation time

    2. while (simulation is not finished)

    1. Collect statistics about the current state

    2. handle events that occurred between last step and now

    3. Increment simulation time

  • 15

    The difficulty of an efficient time-driven simulation of such a system is in the integration

    method applied. Specifically, multi-step integration methods to solve the underlying

    differential equations might prove not to work in this case. The reason is that these

    methods use extrapolation to estimate the next time step, this would mean that they will

    try to adapt to the sudden change in state of the system thus reducing the time step to

    infinite small sizes.

    2.4.2 Event Driven Simulation

    In event-driven simulation the next-event time advance approach is used. For the case of

    discrete systems this method consists of the following phases:

    Step 1: The simulation clock is initialised to zero and then the times of occurrence of all

    future events are will be determined.

    Step 2: The simulation clock is advanced to the time of the occurrence of the most

    imminent (i.e. first) of the future events.

    Step 3: The state of the system is updated to account for the fact that an event has

    occurred.

    Step 4: Knowledge of the times of occurrence of future events is updated and the first

    step is repeated.

    The advantage of this approach is that periods of inactivity can be skipped over by

    jumping the clock from event time to the next event time. This is perfectly safe since by

    definition all state changes only occur at event times. Therefore causality is guaranteed.

    The event-driven approach to discrete systems is usually exploited in queuing and

    optimization problems. However, as we will see next, it is often also a very interesting

    paradigm for the simulation of continuous systems.

    Consider a continuous system where every now and then (possibly at irregular or

    probabilistic time steps) discontinuities occur, for instance in the temperature of a room

    where the heating is regulated in some feed-back loop:

  • 16

    Fig 2.3 Typical discontinuities in time versus state trajectories of continuous systems or

    its higher order derivative with respect to time[29]

    2.5 NETWORK SIMULATION TOOLS

    In the network research area, establishing of network in a real time scenario is very

    difficult. A single test bed takes a large amount of time and cost. So implementation of a

    whole network in real world is not easily possible and very costly to. The simulator helps

    the network developer to check whether the network is able to work in the real time. Thus

    both the time and cost of testing the functionality of network have been reduced and

    implementations are made easy. The Network Simulator provides an integrated,

    versatile, easy-to-use GUI-based network designer tool to design and simulate a

    network with SNMP, TL1, TFTP, FTP, Telnet and Cisco IOS device.

    Network simulator allows the researchers to test the scenarios that are difficult or

    expensive to simulate in real world. It particularly useful to test new networking

    protocols or to changes the existing protocols in a controlled and reproducible

    environment. One can design different network topologies using various types of nodes

    (hosts, hubs, bridges, routers and mobile units etc.) The network simulators are of

    different types which can be compared on the basis of: range (from the very simple to the

    very complex), specifying the nodes and the links between those nodes and the traffic

    between the nodes, specify everything about the protocols used to handle traffic in a

    network, graphical applications (allow users to easily visualize the workings of their

    simulated environment.), text-based applications (permit more advanced forms of

  • 17

    customization) and programming-oriented tools (providing a programming framework

    that customizes to create an application that simulates the networking environment to be

    tested.)

    2.5.1 NS2 (Network Simulator Version2)

    NS2 is a discrete event simulator targeted at networking research. It provides support for

    simulation of TCP, routing, and multicast protocols over all networks (wired and

    wireless). Network simulator 2 has been developed under the VINT (Virtual Inter

    Network Testbed) project; in 1995 it is a joint effort by people from University of

    California at Berkeley, University of Southern California's Information Sciences Institute,

    Lawrence Berkeley National Laboratory and Xerox Palo Alto Research Center. The main

    sponsors are the Defense Advanced Research Projects Agency and the National Science

    Foundation. It is a discrete event simulator that provides substantial support for

    simulation of TCP, routing, and multicast protocols over wired and wireless networks.

    Otcl: Otcl runs much slower but can be changed very quickly (and interactively), making

    it ideal for simulation configuration.

    Fig 2.4 Architecture of NS2 [26]

    2.5.2 OPNET (Optimized Network Engineering Tools)

    It is extensive and powerful simulation software with wide variety of possibilities to

    simulate entire heterogeneous networks with various protocols. This simulator is

  • 18

    developed by OPNET technologies; Inc. OPNET had been originally developed at the

    Massachusetts Institute of Technology (MIT) and since 1987 has become commercial

    software. It provides a comprehensive development environment supporting the modeling

    of communication networks and distributed systems. Both behavior and performance of

    modeled systems can be analyzed by performing discrete event simulations. The main

    programming language in OPNET is C (recent releases support C++ development). The

    initial configuration (topology setup, parameter setting) is usually achieved using

    Graphical User Interface (GUI), a set of XML files or through C library calls. Simulation

    scenarios (e.g., parameter change after some time, topology update, etc.) usually require

    writing C or C++ code; although in simpler cases one can use special scenario

    parameters (e.g., link fail/restore time) [13]. It provides a comprehensive development

    environment supporting the modeling of communication networks and distributed

    systems. Both behavior and performance of modeled systems can be analyzed by

    performing discrete event simulations.The component diagram of OPNET is given

    below.

    Fig.2.5 Architecture of OPNET [26]

  • 19

    2.5.3 NetSim

    NetSim is a discrete event simulator developed by Tetcos in 1997, in association with

    Indian Institute of Science. NetSim has also been featured with Computer Networks and

    Internets V edition by Dr. Douglas Comer, published by Prentice Hall. It has an object-

    oriented system modeling and simulation (M&S) environment to support and analysis of

    voice and data communication scenarios for High Frequency Global Communication

    Systems (HFGCS). It creates fast, platform independent software that could be used in

    simple, consumer electronic products. Java designed for simple, efficient, platform-

    independent program for creating WWW based programs. Using Java one can create

    small programs called applets that are embedded into an HTML document and viewable

    on any Java compatible browser. Java applets are compiled into a set of byte-codes, or

    machine-independent processing instructions. The component diagram of NETSIM is

    given in Figure

    Fig 2.6 Architecture of NETSIM [26]

    2.5.4 OMNET++

    It is a component based, modular and open architecture discrete event simulator

    framework. The most common use of OMNET++ is for simulation of computer

    networks, but it is also used for queuing network simulations and other areas as well. It is

    licensed under its own Academic Public License, which allows GNU Public Licenselike

  • 20

    freedom but only in noncommercial settings. It provides component architecture for

    models. A C++ class library which consists of the simulation kernel and utility classes

    (for random number generation, statistics collection, topology discovery etc), this one

    you will use to create simulation components (simple modules and channels);

    infrastructure to assemble simulations from these components and configure them (NED

    language, ini files); runtime user interfaces or environments for simulations (Tkenv,

    Cmdenv); an Eclipse-based simulation IDE for designing, running and evaluating

    simulations; extension interfaces for real-time simulation, emulation, MRIP, parallel

    distributed simulation, database connectivity and so on. The component diagram of

    OMNET++ is given in Figure

    Fig 2.7 Architecture of OMNET++ [26]

    2.5.5 QualNet

    It is a commercial network simulator from Scalable Network Technologies, Inc in 2000-

    2001. It is ultra highfidelity network simulation software that predicts wireless, wired and

    mixed-platform network and networking device performance. A simulator for large and

    heterogeneous networks and the distributed applications that execute on such networks

    for implementing new protocols, Qualnet uses C/C++ and follows a procedural paradigm.

    Uses the parallel simulation environment for complex systems (PARSEC) for basic

    operations, hence can run on distributed machines. It is a commercial version of

  • 21

    GloMoSim used by Scalable Network Technologies for their defense projects. It is ultra

    highfidelity network simulation software that predicts wireless, wired and mixed-

    platform network and networking device performance. A simulator for large,

    heterogeneous networks and the distributed applications that execute on such networks.

    The component diagram of QUALNET is given in Fig. 2.8.

    Fig. 2.8 Architecture of QualNet

    TABLE 2.1 Languages used by simulators [26]

  • 22

    2.6 A FRAMEWORK FOR NETWORK SECURITY SITUATION AWARENESS

    The framework for network security situation awareness proposed in this paper is based

    upon knowledge discovery and consists of two parts, the modeling of network security

    situation and the generation of network security situation, as shown in Fig. 2.9. The

    modeling of network security situation is to construct the formal model adapted for the

    measuring of network security situation based upon the D-S Evidence Theory[4]; and

    support the general process of the fusion and correlation analysis of various types of alert

    events from security situation sensors. The generation of network security situation

    primarily consists of three steps: firstly, acquiring attack patterns through interactive

    knowledge discovery by introducing FP-Tree algorithm and WINEPI algorithm;

    secondly, transforming the discovered frequent patterns and sequential patterns to the

    correlation rules of alert events; finally, implementing the dynamically generation of

    network security situation graph based upon the network security situation generation

    algorithm.

    Fig. 2.9 A Framework For Network Security Situation Awareness [4]

  • 23

    2.7 OLD EXPERIMENTAL SETUP AND RESULTS

    In order to complete the proposed work, the experimental setup that is required, must be

    arranged as it is shown in the Fig. 3.1. It will require a client/server environment

    equipped with Routers, Firewall, IDS and Switches. The user may be an employee who

    has proper authority to use the network. And the attacker is somebody unknown who is

    trying to break the network security through internet. Router is used to decide the path of

    the data packets to be transferred, 2 separate Firewalls have been used first one protects

    organizational network from outside network (Internet) and other one protects

    transactions inside the organizational network. IDS is used to record logs, process them

    and create rules for further detection and protection of previously occurred attacks.

    Fig. 2.10 Experimental Setup [18]

  • 24

    In order to verify the effectiveness of the method, the following experiment model is

    constructed as shown in Fig. 2.10, Server nodes provide the corresponding network

    services; user and attacker can access to the server nodes through the network. Server

    nodes, IDS and firewall will produce the corresponding log information and performance

    information of server nodes. The service information S (id" idh, name, CDs) of server

    nodes is expressed as follows:

    (Server!, Web Server, Web, 0.4)

    (Server2, Ftp Server, Ftp, 0.3)

    (Server3, DataBase, Database, 0.3)

    We build the simulation scenario by using GTNets, Server can be attacked by SYN flood

    attack, UDP flood attack and Unicode decoding vulnerability attack; Server2 can be

    attacked by MBLAST worm; Server3 can be attacked by SQL injection attack. All of the

    server nodes may be attacked by an unknown attack. All attacks come from the attacker.

    The various attacks academic security threat values of various attacks are determined as

    follows.

    SYN flood: 0.2

    UDP flood: 0.4

    Unicode decoding vulnerability: 0.1

    MSBLAST worm: 0.4

    SQL injection: 0.2

    The simulation scenario is operated as follows:

    I) User visits Server!, Server2 and Server3 during the experiment normally.

    2) Attacker launches attacks every two seconds (attack one second, sleep one second).

    According to the calculation of simulation results, we can obtain the network security

    situational graph shown in Fig. 10. The horizontal axis is time and the vertical axis is the

    network security situation value. In the first point, all server nodes are not detected being

    attacked, but there are significant changes in the performance of Server2. In the sixth

  • 25

    node, Server is detected being attacked by SYN flood and UDP flood; Server2 is detected

    being attacked by MSBLAST worm. Meanwhile these two servers both have changes in

    performance.

    Table 2.2 Simulation Experimental Data And Calculation Result [18]

  • CHAPTER 3

    PROPOSED WORK

    The process of traditional situation awareness can be visually represented by three-level

    model. The contents of network security situation awareness can be summarized as 3

    aspects: 1. network security situation elements extraction; 2. network security situation

    assessment and 3. network security situation awareness. This project is concerned with

    situation awareness, network health visualization and then preventive actions against

    intrusions. In network security situation elements extraction, Jajodia collected network

    vulnerability information to assess the network vulnerability situation. Ning collected

    network alerting information to assess the network threat situation. The information

    collected from one single aspect can't obtain the network security situation accurately,

    thus obtaining comprehensive information and information's relevance is particularly

    important. In this paper, we will obtain the comprehensive information and information's

    relevance by node performance and log files to evaluate the network security situation. In

    network security situation assessment, Xiu-zhen Chen proposed a quantitative hierarchical

    network security threat evaluation method which has become the mainstream of network

    security situation assessment. Yong Wei and Yi-feng Lian proposed a network security

    situation assessment model based on log audit and performance correction algorithm

    on the basis of the hierarchical network security situation assessment method. In network

    security situation awareness, traditional network security situation awareness algorithm

    is based on Statistical Bayesian Techniques and Gray Relational Model. It only gives

    network managers the past and current state of network security situation, but can't forecast

    the network security situation. Abstract packet-forwarding method can process network

    behaviors in network simulation quickly. This method not only reduces the simulation

    time, but also ensures the result accuracy.

  • 27

    3.1 Important Elements Construction

    The essence of network simulation is to simulate network packets forwarding. In this

    project we will design and actualize firewall, intrusion detection system (IDS) and node

    performance based on this principle.

    3.1.1 Firewall and IDS

    Firewall and IDS both inspect network packets according to some certain rules to determine

    transmit it or not to protect the network security, therefore Firewall and IDS use the same

    design model. As shown in Fig. 3.1, Firewall and IDS model includes 5 modules: command

    recognition, command processing, packet filter, processing result and log entry. Command

    recognition recognizes the rules; Command processing supports command recognition by

    some API; Packet filter filters packets by rules; Process Result decides transmit the packet

    or not and Log entry records some important information for users to check.

    Firewall rules include operation, source/destination address, source/destination packet

    survival information (TTL), protocol, port and IDS rules are divided into two parts: rule

    header and rule option. Rule header contains operation, protocol, source/destination

    address and source/destination port information. Rule option includes alarm information

    and the rules used to determine whether to trigger a response action. Rule option is an

    important part of the core of the IDS detection engine, and it is flexible and powerful. Its

    flexibility means that you can add appropriate options based on the different behavior

    detection. Semicolon is the segmentation between the IDS rules options. Inter rule option

    keyword and its parameters use a colon : as segmentation.

    Snort is an open source IDS based on passive signature matching. All attack patterns are

    formulated into detection rules. Each rule has two parts: a rule header and rule options. The

    rule header contains the rule action, protocol, source/destination IP addresses and

    netmasks, and the source and destination ports information. The rule option section

    contains alert messages and information denoting on which parts of the packet should be

    compared to determine if the rule action should be taken. Snort acquires network packets

    via libpcap library.

  • 28

    Fig. 3.1 Firewall and IDS

    Then Snort decodes the captured packets and sends them to the detection engine for

    intrusion identification. Similar to Snort, AIMS defines a set of attack pattern rules to

    describe attack behaviors. However, AIMS additionally defines alarm rules and threshold

    rules for anomaly detection. In AIMS, there are a total of three different kinds of rules. The

    alarm rules are used to detect anomalous network conditions. The pattern rules are the

    normal signature matching rules. The threshold rules are used to decide whether some

    network statistic number is anomalous. A shortcoming of Snort is that its maintenance

    needs manually operations and is inflexible. The administrator must manually add new

  • 29

    rules in Snort. If Snort is deployed in a wide distributed environment, it will be complicated

    to manage these nodes. Also, there is no way to dynamically upgrade modules or engines

    in Snort. However, AIMS is natively designed to provide a flexible mechanism for dynamic

    reconfiguration. The Cooperative Intrusion Traceback and Response Architecture

    (CITRA) is an architecture integrating intrusion detection systems, routers, firewalls,

    security management systems, and other components to trace intrusions, avoid or decrease

    subsequent damage from intrusions, combine and report intrusion activities or coordinate

    intrusion responses in a system-wide basis. CITRA makes intrusion analysis and intrusion

    response automatically that are done by administrator manually before. The primary

    shortcoming of CITRA is that the system modules of CITRA cannot be reconfigured or

    customized when new types of intrusions occur. Only its policies can be modified.

    Therefore, the administrator needs to modify the policies for new intrusion types. However,

    as the intrusion techniques are rapidly evolving, manual modification is not enough to

    counteract all kinds of attacks. In addition, CITRA is not flexible because a specific

    intrusion description language called Common Intrusion Specification Language (CISL) is

    needed to describe attacks and responses. Furthermore, because CISL is of a stateless

    design, CITRA cannot detect attacks hided in multiple packet flows. Intrusion Detection

    Agent System (IDA) is a network intrusion detection system employing mobile agent

    technique. IDA works by watching events that may relate to intrusions instead of analyzing

    all of the user activities. If an MLSI (Marks Left by Suspected Intruder) is found, the IDA

    manager will dispatch agents to gather information related to the MLSI, analyze the

    information, and decide whether an intrusion occurs. In IDA, mobile agents autonomously

    migrate to target systems to collect information only related to intrusions. This avoids the

    need to transfer system logs to the server. There are message boards to keep information

    gathered from the target systems by information gathering agents. This helps exchange

    information between agents and the bulletin board. Compared to the active packet

    approach, mobile agents are more active. They can suspend detection processing, migrate

    to another node, and then resume the suspended execution. However, the mobile agent

    mechanism is more complicate than the active network approach. Trend Micro releases

    InterScan AppletTrap in August 2001. AppletTrap is designed to detect malicious mobile

    code or active contents in Java, ActiveX, JavaScript, or VBScript. From the architecture

  • 30

    viewpoint, AppletTrap is indeed an HTTP proxy server. If some ActiveX and Java Applet

    code segments have unrecognized certificates, AppletTrap will block the code segments.

    The blocking lists in AppletTrap are updateable to stop unknown malicious Java Applets

    and JavaScripts. Compared with AppletTrap, AIMS adopts different approaches. For

    example, AI MS uses active packets to update rules, but AppletTrap uses a web interface

    to update its rules. In addition, system management is complicated when many AppletTrap

    nodes online work in the network. Furthermore, AppletTrap is designed only for http

    access, but AIMS is designed to monitor universal network packets passing through AIMS

    nodes. FLAME is a performance-enhanced version of Lightweight Active Management

    Environment (LAME). It provides programmers a flexible and secure programming

    environment. To achieve security requirements, FLAME uses Cyclone in active packet

    design as their secure programming language. Third parties may write their own modules

    in Cyclone and deploy on FLAME nodes. Programmers can write a worm detection module

    and install it on FLAME nodes. Compared with FLAME, AIMS is not designed as a

    general-purposed active network system. Instead, AIMS is natively an intrusion detection

    system employing active network technology. Therefore, AIMS provides a dynamically

    programmable platform on which new intrusion detection modules or customize detection

    rules can be flexibly applied. For the efficiency consideration, AIMS is also developed in

    Cyclone as in FLAME. However, for the security and efficiency reasons, AIMS does not

    allow on-line compilation as adopted in FLAME. IBAN (Intrusion Blocker based on Active

    Networks) is a distributed intrusion prevention system based on active networks. IBAN

    performs vulnerability scanning and inline intrusion detection and blocking. It consists of

    a management station, mobile vulnerability scanner and mobile intrusion blockers.

    However, because IBAN deeply relies on active networks, it incurs the limitations native

    in active networks. To deploy IBAN, active network environments ANTS and SANTS

    need to be deployed first.

    3.1.2 Node Performance

    Nodes in the network simulation software don't have real performance like in the real

    world, so we need to add the appropriate parameters in the node model to represent the

    performance of nodes. Performance parameters will be updated while processing packets

  • 31

    in order to indicate the changes of node performance. The structure of node performance

    is shown in Fig 3.2

    Fig. 3.2 Structure of Node Performance

    3.2 ABSTRACT PACKET-FORWARDING

    Most time of network simulation is spent on packets forwarding simulation. Therefore, the

    most effective way to reduce the time of network simulation is to abstract and simplify

    packets forwarding simulation model. Fig. 3.3 depicts the packet forwarding simulation

    process in the traditional discrete-event network simulation. Packets will go through the

    buffer queue and the discrete-event queue respectively. Because of the existence of these

    two queues, network simulation needs to do more work: on the one hand, packets need to

    in/out buffer queue constantly; on the other hand, the discontinuous processing increases

    the number of discrete events that need to be processed. Abstract packet-forwarding

    method can solve these two problems and make the network simulation more effective.

  • 32

    Abstract packet-forwarding method consists of computing queue and continuous multi-hop

    processing.

    Fig. 3.3 Traditional Packet Transmit Simulation Process

    3.2.1 Computing Queue

    As shown in Fig. 3.4, when "buffer queue" in traditional network simulation is replaced by

    "computing queue", the packets transmitted from one node to the next node, only need to

    in/out discrete event queue. Delay and packet loss can be calculated by the following

    algorithm.

    I) For one packet p, whose length in bytes is Ip, it transmits from the node S to the next node

    N through link L. What locates between the node S and link L is the corresponding

    computing queue F. The time from packet p getting to queue F to transmitting to link L is

    t. The moment just before the packet p reaching F is t; the number of packets in F is C(t);

    the bytes length of all packets in F is L(t); the moment just after the packet preaching F is

    4; the number of packets in F is C(4); the length in bytes of all packets in F is L(4). The

    bandwidth of L is B; the propagation delay is 0; the maximum length in bytes of F is max.

    In this case, whether to drop p or not is determined by the following formula:

    Fig. 3.4 Computing Queue

  • 33

    If P is not dropped, all the delay time of p transmitting from S to N is dp (including

    queuing delay dq; send delay dt; propagation delay D) represented by the following

    formula:

    If p is not dropped, after preaches F, C (4) and L (4) can be got by the following

    formulas:

    II) For two packets p1, p2. These two packets transmit from the node S to the next hop node

    N through link L. What located between the node S and link L is the corresponding

    computing queue F. The time from packets p1, p2 getting to F to transmitting to link L is

    t1, t2 respectively. The moment just before the packet p1 reaching F is tl_; the number of

    packets in F is C(tl-); the length in bytes of all packets in F is L(tl_); the moment just

    after the packet p1 reaching F is t)+; the number of packets in F is C(t)+); the length in

    bytes of all packets in F is L(tl+)' Assuming the moment just before the packet p2 reaching

    F is t2-; the number of packets in F is C(t2-); the length in bytes of all packets in F is

    L(t2_); the moment just after the packet p2 reaching F is t2+; the number of packets in F

    is C(t2+); the length in bytes of all packets in F is L(t2+)' The bandwidth of L is B. If PI,

    P2 are both not dropped, tl

  • 34

    Assuming Ii is the length in bytes of the ith packet in the queue F by the t2_ time, C (t2-)

    must meet the following formula:

    Equations (1)-(6) is the computing realization of packets forward: (1)-(2) can confirm

    whether to drop the packet or not and delay time; (3)-(4) confirm the changes of computing

    queue when a packet reaches; (5)-(6) confirm the changes of computing queue when two

    continuous packets reach F; (3)-(6) confirm the changes of computing queue when a

    network simulation senior is running.

    3.2.1 Continuous Multi-hop Processing

    As shown in Fig. 3.4, discrete events don't need in/out discrete-event queue by using

    continuous multi-hop processing to replace the traditional single-hop processing in

    Network simulation. The realization of continuous multi-hop processing is based on

    computing queue. As continuous multi-hop delay time and packet loss can be accumulated,

    we can get them at one time. Continuous multi-hop processing may lead to packets not

    reaching the next node in chronological order, which is called "out of order", so that the

    computing queue's parameters, transmitting delay and packet loss, may be wrong. In

    order to solve "out of order", we decide whether to use continuous multi-hop processing

    on the base of link condition: when the links reach their bottleneck, packets should be

    transmitted through computing queue and discrete-event queue normally and this hop

    should be processed with the previous hops; if not, packets don't need in/out computing

    queue and discrete event queue and this hop should be processed with the following hops.

    By using abstract packet-forwarding method, traditional network simulation processing

    model changes from Fig. 3.3 to Fig 3.5

  • 35

    Fig 3.5 Network Security Situation Assessment Based on Network Simulation Log Files

    3.3 NETWORK SECURITY SITUATION ASSESSMENT

    As shown in Fig.3.5, We will extract network security incidents and calculate the value

    of the network security situation by using network simulation log files.

    3.3.1 Event Extraction

    Event extraction uses a rule-based log audit method. Firstly, we obtain preliminary safety

    incidents by matching the rule base with log information. Secondly we remove the

    duplicate security incidents by merging security incidents. Finally we can obtain the nodes

    theoretic security threat. Nodes theoretic security threat is the security situation of a service

    node when it is attacked. Nodes theoretic security threat value, namely VoT, is the

    cumulative sum of attack threat. Attack severity is defended according to Snort User

    Manual.

  • 36

    3.3.2 Performance Correction Method

    The value of nodes security situation is more accurately reflects the status of the server

    nodes than nodes theoretic security threat. In this paper we calculate the value of nodes

    security situation by using performance correction algorithm. Performance information P

    is denoted by (idh, timep, , , , , ), idh represents node's ID, timep represents the time

    from the beginning to the present; the performance parameters of node is (, , , , ).

    represents the number of packets processed; is the amount of memory used; is the

    number of connections; is the sum of packets length which is processed; is the number

    of packets dropped. The minimum values of performance parameters are 0 and the

    maximum are (0, 0, 0, 0, 1). 0 is the maximum number of packets which can be

    processed by server node per unit time; 0 is the maximum size of memory; 0 is the

    maximum allowable number of connections; 0 is the maximum flow rate; 1 represents

    that all the packets are dropped and = . Node performance P can be measured by using

    the following formula:

    At the beginning of a period of time, node performance parameters are (1, 1, 1, 1, 1), at

    the end of this period, node performance parameters are (2, 2, 2, 2, 2). According to

    (7), we can know:

  • 37

    Correcting nodes theoretic security threat with performance variation ,0.P, we can get

    the value of nodes security situation SAh according to the following formula.

    is correction parameter, the value of which is [0,1], representing the node performance

    weight in the value of nodes security situation. When U=O, SAh represents nodes

    theoretic security threat; When n=l, SAh represents the node performance change.

    3.3.3 Network Security Situation Value

    After getting the value of nodes security situation, we can calculate the value of network

    security situation by using each service weight in network. Service information S is

    denoted by (id" idh, name, CDs). ids represents server's ID; idh represents server node's

    ID, name represents service name; CDs represents the weight of service. We can get

    service node's weight CDh with the following formula.

  • 38

    m is the amount of services which are provided by the service node. The cumulative sum

    of the weights of all network services is 1. Finally, we can calculate the value of network

    security situation SA by using server node's SAh and CDh.

    Where n is the number of service nodes in network.

    Network security visualization is a growing community of network security research in

    recent years. More and more visualization tools are designed to help analysts cope with

    huge amount of network security data. Hence the demand of visualization techniques has

    stretched into each step of situation awareness research like situation perception, situation

    comprehension and even situation pre-diction. NVisionIP and VisFlowConnect take the

    lead in introducing visualization technology into NSSA, NVisionIP uses multi-level matrix

    graphs in status analysis of a class-B network by using Net Flow logs, and VisFlowConnect

    is a visualization design based on parallel axis technology to enhance the ability of an

    administrator to detect and investigate anomalous traffic between a local network and

    external domains. The Intrusion Detection System (IDS) is the most popular application

    that reports a variety of network events taken for the important input data of NSSA, IDS

    RainStorm , SnortView and Avisa are typical visual analysis tools that help administrators

    to recognize false positives, detect real abnormal events such as worm propagations and

    Botnet activities and make a better situation assessment. However, those visual s systems

    based on a single kind of logs such as NetFlow log or IDS log are obviously insufficient.

    To achieve situational awareness BANKSAFE, a scalable and web-based visualization

    system, analyzes health monitoring logs, Firewall logs and IDS logs in the same time, and

    Horn uses visual analytics to support the modeling of the computer network defense from

    kinds of raw data sources to decision goals

  • 39

    3.4 OVERALL DESCRIPTION

    3.4.1 Product Perspective

    Considering the liability and scope of the project, it is must if its requirement and

    specification are clear well before its beginning. As a product, this could be a software or

    architecture or system, the role of it will be vital. Network security situation awareness is

    a comprehensive technology which can obtain and process the information, detect

    intrusions and also forecast security risk.

    3.4.2 Product Functions

    This Project mainly uses the log files of user firewall and IDS along with different node

    situation parameter which is helpful in determining the risk level of each node as well as

    complete network. This method will reduce the network security stimulation time

    effectively and evaluate the network security situation value accurately. After evaluation

    of situational value graphical representation will be shown.

    3.4.3 Requirements:

    Hardware Elements: Latest 1.8 GHz CPU processor, display device, Keyboard, Mouse,

    Fully Equipped LAN (Bridges, Switches, Firewall, Routers etc.).

    Software Requirement: Snort AIMS, Network Simulator, Firewall.

    3.4.4 Design and implementation constraint

    This method firstly constructs various simulation elements models.

    Secondly it constructs a network security situation awareness simulation scenario based on

    these constructed models.

    thirdly it uses abstract packet-forwarding method to quickly infer network security

    behaviors in simulation scenario meanwhile recording important log information.

    finally it evaluates the value of network security situation based on the log

    information and forecasts the network security situation.

    3.4.5 User Characteristics

  • 40

    The user can be anyone who have knowledge of networking.

    The user readily willing to interact with the software.

    3.4.6 Assumptions and Dependencies

    Network simulator always takes some unnecessary time, so we use abstract packet

    forwarding mechanism to reduce time.

    According to log files of network simulation, well extract network security events and

    node performance info. To be used to calculate network security.

    3.5 External Interface Requirements

    3.5.1 User Interfaces

    The network admin privilege.

    3.5.2 Hardware Interface

    A proper working tool is required in order to accomplish a job. Similar goes in the case of

    completion of a project. Tools and hardware required are a working laptop and internet

    connection to begin with.

    3.5.3 Software Interface

    Platform - C, python, Snort AIMS

    3.5.4 Performance Requirements

    Processing of packets should be fast as a large number of packets have to be processed.

    Node performance level should be perfect.

    Log files in snort AIMS should be selected according to latest rules.

    The graphical representation should be perfect and fast as soon as attack appears.

  • 41

    3.6 Other Non-functional Requirements

    3.6.1 Safety Requirements

    No safety as such as it is designed for a network admin. database for a user and all log is

    maintained.

    3.6.2 Security

    Security is must only admin have privilege to access this software.

    3.6.3 Maintenance

    The training database is an important factor which determines the accuracy of the results.

    Hence the quality of the database should be updated with as much diversity as possible.

    3.7 MILESTONE CHART

    3.7.1 Problem Statement

    Using network simulator software we will show the graphical representation of security

    level of organizational network. We have our own firewall and IDS built in in that software.

    3.7.2 Outline

    The outline of the project includes selection of the domain, deciding the topic for project,

    study of research papers, and studying the existing algorithms and modifying them. Outline

    of the project completed and submitted in the month of September.

    3.7.3 Survey

    It includes the study of various research papers related to the topic, Preparing the S.R.S.

    for the project and selecting the algorithms to implement for our project. The completion

    of the documentation of our project is expected in the month of October.

    3.7.4 Design

    Design phase includes the initial implementation of the project and will provide the basic

    and initial shape to the project. This phase includes high level design, which provides an

  • 42

    overview of an entire system, identifying all its elements at some level of abstraction and

    low level design, which exposes the detailed design of each of these elements. This work

    is expected to complete in the month of October-November.

    3.7.5 Coding

    This phase is the core of the project. It contains various codes required, to make the

    modified algorithm working. With the help of coding, the comparison between the original

    algorithm and modified algorithm will be made. This coding phase is very crucial part of

    the project as this will require the modification of the algorithm to obtain optimum results.

    Coding is expected up to the month of January.

    3.7.6 Testing

    This is the final phase of the project and the most important one. This phase will perform

    rigorous testing on the codes written, simulator and the modified algorithm. This phase will

    decide the success of the project. Testing is done to check for the bugs and then their

    removal. Which further include the proper working of the codes, i.e. if they are giving the

    expected results or not etc. The testing is the final step and will be completed (tentatively)

    in the month of March.

    Fig 3.6 Milestone Chart

    Milestone August September October November January February March April

    Outline

    survey

    Design (1st draft)

    (draft +architecture)

    Coding

    Testing

    1st

  • 43

    3.8 Data flow Diagram

    3.8.1 0-level DFD

    Fig 3.7 0 level DFD

  • 44

    3.8.2 1 level DFD

    Fig 3.8 1 level DFD

  • 45

    3.8.3 Flow Diagram

    Fig. 3.9 flow chart of project

  • CHAPTER 4

    CONCLUSION AND FUTURE SCOPE

    Network security situation awareness is a challenging problem in the field of networking.

    It is helpful in assessment and forecasting of network of organisation. This also reduces

    the work of network administrator. The main aim of simulation software is to easily fetch

    the data required and process the result as soon as possible.

    Network security situation awareness system is a new research domain, and it has great

    importance in improving abilities of responding to emergences, reducing losses of

    network attacks, revealing abnormally intrusions, enhancing system abilities of fighting

    back. On the basis of evaluation our main work is to: Improve network security situation

    assessment model and its quantitative evaluation method and to Find a better way to

    accelerate network simulation. We analyzed the existing problems of network security

    situation awareness and proposed a framework based on that. The framework consists of

    the modeling of network security situation and the whole process of the generation of

    network security situation.

    The running time network simulation task will increase effectively. The essence of

    abstract packet forwarding method is to enhance the packet processing speed, but it may

    be ineffective if too many packets need to be processed per second such as large-scale

    network worm simulation. On the basis of our studies, the next jobs are:

    (1) Improve evaluation method and network security assessment model.

    (2)Find a better way to accelerate network simulation.

  • REFERENCES

    [1] B. Potter, "Software & network security," J Network Security, vol Bass T.,

    Intrusion Detection Systems and Multisensor Data Fusion: Creation Cyberspace

    Situation Awareness, Communications of the ACM, 2000, vol (43), April pp.99-

    105.

    [2] D. Schnackenberg, H. Holliday, R. Smith, K. Djahandari, and D. Sterne,

    ``Cooperative Intrusion Traceback and Response Architecture (CITRA), Proc.

    Of DARPA Information Survivability Conference and Exposition (DISCEX-II) ,

    Jun. 2001.

    [3] D. Wetherall, J. Guttag, and D. Tennenhouse, ``ANTS: Network Services without

    the Red Tape, IEEE Computer , vol.32, no.4, Apr. 1999.

    [4] Fang Lan, Wang Chunlei, Ma Guoqing, A Framework for Network Security

    Situation Awareness Based on Knowledge Discovery 978-1-4244-6349-7/10,

    IEEE, 2010.

    [5] Hideki K., Kazuhiro O. SnortView: visualization system of snort logs. The 2004

    ACM.

    [6] IETF81 Internet Engineering Task Force. Internet protocol: DARPA Internet

    program protocol specification, 1981.

    [7] I-Hsuan Huang and Cheng-Zen Yang, Design of an Active Intrusion Monitor

    System Department of Computer Science and Engineering, Yuan Ze University,

    Chungli, Taiwan, R.O.C. E-mail: {ihhuang,czyang}@syslab.cse.yzu.edu.tw

    [8] K. G. Anagnostakis, M. Greenwald, S. Ioannidis, and S. Miltchev, ``Open Packet

    Monitoring on FLAME: Safety, Performance and Applications, Proc. of the 4th

    International Working Conference on Active Networks (IWAN), Dec. 2002.

    [9] M. Asaka, S. Okazawa, A. Taguchi, and S. Goto, ``A Method of Tracing Intruders

    by Use of Mobile Agents, Proc. of INET99 , Jun. 1999.

    [10] M. R. Endsley, "Design and evaluation for situation awareness enhancement,".

    Processings of the Human Factors and Ergonomica Society Annual Meeting.

    Northrop Aircraft Hawthorne, CA. vol 32, pp. 97-101, October, 1988.

    [11] M. Roesch and C Green, "Snort users manual," J Snort Release,2003

  • 48

    [12] M. Roesch and C. Green, ``Snort Users Manual, http://www.snort.org/

    docs/writing_rules/ , Apr. 2003.

    [13] Mica R. Endsley, Designing for Situation Awareness in Complex System

    workshop on symbiosis of humans Tokyo, japan 2001

    [14] P. Ning, Y Cui, and D. S. Reeves, et ai, "Techniques and tools for analyzing

    intrusion alerts," JACM TISSEC New York. vol 7, pp. 274-318, May 2004.

    [15] R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg, S. S. Chen, and B. Tung, S.

    Jajodia, S Noble, and B. O'Berry, 'Topological analysis of network attack

    vulnerability," in Managing Cyber Threats. Springer US, 2005, pp. 247-266.

    [16] S. Jajodia, S Noble, and B. O'Berry, 'Topological analysis of network attack

    vulnerability," in Managing Cyber Threats. Springer US, 2005, pp. 247-266.

    [17] S. Murphy, E. Lewis, R. Watson, and R. Yee, ``Strong Security for Active

    Networks, Proc. of the IEEE OPENARCH Conference, Apr. 2001.

    [18] Song-song Lu, Xiao-feng Wang, Li Mao, Network Security Situation Awareness

    Based On Network Simulation, IEEE Workshop on Electronics, Computer and

    Applications 2014

    [19] T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2 , Springer

    2008.

    [20] USA, October 25 -29, 2004). VizSEC/DMSEC '04. IEEE Computer Society,

    2004, 143-147.

    [21] W. L. Cholter, P. Narasimhan, D. Sterne, R. Balupari, K. Djahandari, A. Mani,

    and S. Murphy, ``IBAN: intrusion blocker based on active networks, Proc. of

    the DARPA Active Networks Conference and Exposition (DANCE), Jun. 2002.

    work-shop on Visualization and data mining for computer security. (Washington,

    DC,

    [22] Xiangdong Cai, Yang Jingyi and Huanyu Zhang, Network Security Threats

    Situation Assessment and Analysis, Technology Study International Journal of

    Security and Its Applications, Vol.7, No.5 (2013),

    [23] Xiao-Feng Wang, Hong-Li Zhang, Feng-Yu Wang, and Zhao-Xin Zhang,

    "Dynamic continuous computing in network simulation," J Journal of System

    Simulation, vol 21, pp. 7439-7444, December 2009.

  • 49

    [24] Xiu-Zhen Chen, Qing-Hua Zheng, and Xiao-Hong Guan, "Quantitative

    hierarchical threat evaluation model for network security," J Journal of

    Software, vol 17, pp. 885-897, April 2006.

    [25] Yong Wei and Yi-Feng Lian, "A network security situational awareness model

    based on log audit and performance correction," J Chinese Journal of Computers,

    vol 32, pp. 763-772, April 2009.

    [26] Mrs. Saba Siraj, Mr. Ajay Kumar Gupta, Mrs Rinku-Badgujar, Network

    Simulation Tools Survey IJARCCE vol.1, issue 4 june 2012.

    [27] http://www.ietf.org/rfc/rfc0791.txt?number=791

    [28] http://artemis.wszib.edu.pl/~sloot/1_4.html


Recommended