SlideShare a Scribd company logo
MALICIOUS TRAFFIC
Presented by Ishraq Fataftah
Agenda
   Introduction.
   What is Malicious traffic.
   Malicious traffic types.
   Malicious traffic detection and prevention.
   Conclusion.
Introduction
   As the internet become more
    mature, management of its resources to
    provide guaranteed services is crucial.
   The success of the Internet has increased its
    vulnerability to misuse and performance
    problems.
Introduction
   It has been frequently abused by people
    mostly with hostile intentions.
   We have been under various kinds of attacks
    such as viruses, worms and commonly a
    bunch of spam mails every day.
Introduction
Malicious Traffic
   It is hard to detect and distinguish malicious
    packet and legitimate packets in the traffic.
   The behavior of Internet traffic is very far from
    being regular.
   Presents large variations in its throughput at
    all scales.
Malicious Traffic
   Any traffic anomalies that occur from hardware
    or software failures to internet packets with
    maliciously modified options.
   Generated from what is called botnets.
Malicious Traffic: Botnets
Malicious Traffic
   Monitoring the flow of packets.
   Malicious traffic usually exhausts the legitimate
    resources by sending a lot of traffic.
   Monitoring traffic targeting unused addresses
    in the network.
Malicious Traffic Types
   Scanners.
   Worms.
   Malicious Spam.
   Backscatters.
   DOS, DDOS.
Scanners
 Single source.
 Strikes the same port on many machines.

 Different ports on the same machine.

 Generates

a lot of flows.
Worms
   Self-replicating virus that does not alter files
    but resides in active memory and duplicates
    itself.
   CodeRed worm infected 395,000 computers
    and resulted in approximately $2.6 billion in
    damage.
   Results in an increase in service
    activity, especially if service is law traffic.
Worms
MyTob Worm, 2005
                              Copies itself as %System%msnmsgs.exe
                              Adds the value: “MSN” = “msnmsgs.exe” to
              IRC Server       registry:
                               HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
                               HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion
                               RunServices
                               HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun
                               HKEY_CURRENT_USERSoftwareMicrosoftOLE
                               HKEY_CURRENT_USERSYSTEMCurrentControlSetControlLsa


                              W32.Mytob@mm runs every time Windows starts




  User Zone                    Server Zone
Malicious Spam
   Spamming is flooding the network with a huge
    amount of unsolicited email messages to force
    people to receive them.
   Contains malware or links to malicious sites.
Backscatter
   Email bounces for emails that a person didn’t
    send.
   Spammer is spoofing the Reply-to field in
    email.
   When sent to email server, it is bounces to the
    reply-to address rather than the sender.
   Used to overcome spam filters and in DOS
    attacks.
DOS, DDOS
   Generate a huge amount of adverse traffic to a
    target server to make it unavailable.
   Attempt to exhaust the resources of the victim.
   They are difficult to detect and prevent.
   DDOS attacks are simultaneously launched
    from several sources destined to the same
    target.
DOS, DDOS
Malicious traffic Detection and
Prevention
   Anomaly detection techniques.
   Signature-scan techniques.
   Intrusion detection and prevention systems.
   QoS metrics.
   Tools such as Snort.
   Network filters such as ACLs.
   Honeypots.
Anomaly detection techniques
   Differentiates between normal and malicious
    traffic by:
     Studying the normal behavior of users, resources.
     Create patterns for these activities.

     Any behavior that deviates from this pattern is
      considered malicious.
Signature-scan techniques
   Uses a database that store signatures.
   Passive scan for network traffic, any patterns
    match these stored signatures are considered
    malicious traffic.
   Effective for known attacks.
Intrusion detection and prevention
systems
   Software or hardware that is designed to
    detect and prevent any malicious attack or
    activity on the network.
   Monitor the network traffic.
   Analyze any suspicious event.
   Log these events and report them to the
    network administrator for actions.
QoS metrics
   Studying the behavior of the network traffic
    under normal and malicious attacks.
   Extracting parameters from network traffic.
Snort
   Open source tool that is used in intrusion
    detection systems.
   Real time analysis on the network traffic.
   Intrusion detection system to monitor the
    traffic, analyzes it and inform the network
    administrator for suspicious activities.
ACLs
   Installed in routers and used to match packet
    headers against a pre-defined list of rules and
    takes pre-defined actions on any matching
    packets.
Honeypots
“a security resource whose value lies in being
  probed, attacked or compromised”

   Any attempt to interact with honeypots incurs a
    malicious activity or attack.
Conclusion
   Malicious traffic is any traffic anomalies occurs
    from failure in traffic packets that is
    intentionally modified for malicious acts.
   By studying malicious attacks we can obtain
    better understanding of malicious traffic and
    how to detect and prevent these attacks.
   An increase in the awareness toward the
    importance of security will help in mitigation
    against internet misuse.

More Related Content

PPT
Intrusion detection system ppt
PPTX
Types of cyber attacks
PDF
Ransomware attacks
PDF
Ransomware: History, Analysis, & Mitigation - PDF
PPTX
Directory Traversal & File Inclusion Attacks
PPTX
Introduction to Malware Analysis
PDF
MITRE ATT&CK Framework
PPTX
Intrusion detection system ppt
Types of cyber attacks
Ransomware attacks
Ransomware: History, Analysis, & Mitigation - PDF
Directory Traversal & File Inclusion Attacks
Introduction to Malware Analysis
MITRE ATT&CK Framework

What's hot (20)

PPTX
ARP Spoofing.pptx
PPTX
Botnets
PPTX
Intrusion detection system
PDF
models of distributed computing
PPTX
Network traffic analysis with cyber security
PPTX
Understanding NMAP
PPT
Port Scanning
PPTX
MALWARE AND ITS TYPES
PDF
VULNERABILITY ( CYBER SECURITY )
PPT
Intrusion Detection System
PPTX
Intrusion detection system
PPTX
Deep learning approach for network intrusion detection system
PPTX
Network forensic
PDF
Nmap basics
PPTX
Ethical Hacking PPT (CEH)
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPT
DDoS Attacks
PPTX
Malware analysis
PPTX
Network sniffers & injection tools
ARP Spoofing.pptx
Botnets
Intrusion detection system
models of distributed computing
Network traffic analysis with cyber security
Understanding NMAP
Port Scanning
MALWARE AND ITS TYPES
VULNERABILITY ( CYBER SECURITY )
Intrusion Detection System
Intrusion detection system
Deep learning approach for network intrusion detection system
Network forensic
Nmap basics
Ethical Hacking PPT (CEH)
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
DDoS Attacks
Malware analysis
Network sniffers & injection tools
Ad

Viewers also liked (10)

PPTX
Towards scalable locationaware
PPTX
Optimizing spatial database
PPTX
Password based cryptography
PPT
Network Intrusion Detection System Using Snort
PPTX
Snort IDS/IPS Basics
PPTX
Intrusion Detection System(IDS)
PPTX
Intrusion detection and prevention system
PDF
Introduction to Snort Rule Writing
PPSX
Intrusion detection system
PPTX
Hacking & its types
Towards scalable locationaware
Optimizing spatial database
Password based cryptography
Network Intrusion Detection System Using Snort
Snort IDS/IPS Basics
Intrusion Detection System(IDS)
Intrusion detection and prevention system
Introduction to Snort Rule Writing
Intrusion detection system
Hacking & its types
Ad

Similar to Malicious traffic (20)

PPTX
Security Operation Center Presentat.pptx
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
types of cyber attack by taufiqurrahman.pptx
PPTX
Malware attack Social engineering attack
PPTX
PPTX
Protection from hacking attacks
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PDF
HITB2013AMS Defenting the enterprise, a russian way!
 
PPTX
Intrusion detection system
PPT
Web security
PPTX
PPTX
Lec 2- Hardening and whitelisting of devices
PDF
Network security
PPT
Cybercrime presentation
PPTX
front_one cyberseuciryt is the protection of something digital from the uneth...
PPT
Security threats facing SA businessess
PPTX
Computing safety
PDF
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
PPTX
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
PDF
Plugging Network Security Holes Using NetFlow
Security Operation Center Presentat.pptx
CyberSecurity presentation for basic knowledge about this topic
types of cyber attack by taufiqurrahman.pptx
Malware attack Social engineering attack
Protection from hacking attacks
week2-cybersecurityOverview of social engineering attacks.pptx
HITB2013AMS Defenting the enterprise, a russian way!
 
Intrusion detection system
Web security
Lec 2- Hardening and whitelisting of devices
Network security
Cybercrime presentation
front_one cyberseuciryt is the protection of something digital from the uneth...
Security threats facing SA businessess
Computing safety
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Plugging Network Security Holes Using NetFlow

More from Ishraq Al Fataftah (6)

PPTX
Edge detection
PPTX
Peer to-peer mobile payments
PPTX
Publish subscribe model overview
PPTX
Requirement engineering evaluation
PPTX
Packet sniffing in switched LANs
PPTX
Presentation skills
Edge detection
Peer to-peer mobile payments
Publish subscribe model overview
Requirement engineering evaluation
Packet sniffing in switched LANs
Presentation skills

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf

Malicious traffic

  • 2. Agenda  Introduction.  What is Malicious traffic.  Malicious traffic types.  Malicious traffic detection and prevention.  Conclusion.
  • 3. Introduction  As the internet become more mature, management of its resources to provide guaranteed services is crucial.  The success of the Internet has increased its vulnerability to misuse and performance problems.
  • 4. Introduction  It has been frequently abused by people mostly with hostile intentions.  We have been under various kinds of attacks such as viruses, worms and commonly a bunch of spam mails every day.
  • 6. Malicious Traffic  It is hard to detect and distinguish malicious packet and legitimate packets in the traffic.  The behavior of Internet traffic is very far from being regular.  Presents large variations in its throughput at all scales.
  • 7. Malicious Traffic  Any traffic anomalies that occur from hardware or software failures to internet packets with maliciously modified options.  Generated from what is called botnets.
  • 9. Malicious Traffic  Monitoring the flow of packets.  Malicious traffic usually exhausts the legitimate resources by sending a lot of traffic.  Monitoring traffic targeting unused addresses in the network.
  • 10. Malicious Traffic Types  Scanners.  Worms.  Malicious Spam.  Backscatters.  DOS, DDOS.
  • 11. Scanners  Single source.  Strikes the same port on many machines.  Different ports on the same machine.  Generates a lot of flows.
  • 12. Worms  Self-replicating virus that does not alter files but resides in active memory and duplicates itself.  CodeRed worm infected 395,000 computers and resulted in approximately $2.6 billion in damage.  Results in an increase in service activity, especially if service is law traffic.
  • 13. Worms MyTob Worm, 2005  Copies itself as %System%msnmsgs.exe  Adds the value: “MSN” = “msnmsgs.exe” to IRC Server registry: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion RunServices HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun HKEY_CURRENT_USERSoftwareMicrosoftOLE HKEY_CURRENT_USERSYSTEMCurrentControlSetControlLsa  W32.Mytob@mm runs every time Windows starts User Zone Server Zone
  • 14. Malicious Spam  Spamming is flooding the network with a huge amount of unsolicited email messages to force people to receive them.  Contains malware or links to malicious sites.
  • 15. Backscatter  Email bounces for emails that a person didn’t send.  Spammer is spoofing the Reply-to field in email.  When sent to email server, it is bounces to the reply-to address rather than the sender.  Used to overcome spam filters and in DOS attacks.
  • 16. DOS, DDOS  Generate a huge amount of adverse traffic to a target server to make it unavailable.  Attempt to exhaust the resources of the victim.  They are difficult to detect and prevent.  DDOS attacks are simultaneously launched from several sources destined to the same target.
  • 18. Malicious traffic Detection and Prevention  Anomaly detection techniques.  Signature-scan techniques.  Intrusion detection and prevention systems.  QoS metrics.  Tools such as Snort.  Network filters such as ACLs.  Honeypots.
  • 19. Anomaly detection techniques  Differentiates between normal and malicious traffic by:  Studying the normal behavior of users, resources.  Create patterns for these activities.  Any behavior that deviates from this pattern is considered malicious.
  • 20. Signature-scan techniques  Uses a database that store signatures.  Passive scan for network traffic, any patterns match these stored signatures are considered malicious traffic.  Effective for known attacks.
  • 21. Intrusion detection and prevention systems  Software or hardware that is designed to detect and prevent any malicious attack or activity on the network.  Monitor the network traffic.  Analyze any suspicious event.  Log these events and report them to the network administrator for actions.
  • 22. QoS metrics  Studying the behavior of the network traffic under normal and malicious attacks.  Extracting parameters from network traffic.
  • 23. Snort  Open source tool that is used in intrusion detection systems.  Real time analysis on the network traffic.  Intrusion detection system to monitor the traffic, analyzes it and inform the network administrator for suspicious activities.
  • 24. ACLs  Installed in routers and used to match packet headers against a pre-defined list of rules and takes pre-defined actions on any matching packets.
  • 25. Honeypots “a security resource whose value lies in being probed, attacked or compromised”  Any attempt to interact with honeypots incurs a malicious activity or attack.
  • 26. Conclusion  Malicious traffic is any traffic anomalies occurs from failure in traffic packets that is intentionally modified for malicious acts.  By studying malicious attacks we can obtain better understanding of malicious traffic and how to detect and prevent these attacks.  An increase in the awareness toward the importance of security will help in mitigation against internet misuse.

Editor's Notes

  • #5: threats may range from simple to severe functional and financial damage to the network infrastructure. Adding the legal perspective, these threats should be clearly and carefully identified, analyzed and managed.
  • #6: data is encapsulated in packets.
  • #7: Most flows are roughly symmetric at the packet levelWhenever a packet is sent, a packet is received within some reasonable interval (round trip time)This can me measured (and enforced) at the edge router inexpensively
  • #8: these botnets launch malicious traffic that attacks network hosts and internet service provider (ISPS).
  • #10: Malicious traffic can be detected by monitoring the network traffic using packet monitoring tools and studying any up normal or suspected behavior in the network. By monitoring the flow of packets, maliciously changed packets can be identified and infected computers can be determined based on its signature. In addition, malicious traffic usually exhausts the legitimate resources by sending a lot of traffic to halt its functionality. Another measurement can be by monitoring traffic targeting unused addresses in the network [3]. Unused addresses should expect a very limited load of traffic not mentioning that no device should be connected to it.
  • #17: Among all attacks, the denial-of-service (DoS) attack is one ofthe attacks rather difficult to detect and prevent since they exploitregular services, and overwhelm such services with tremendousmalicious traffic.
  • #19: Anomaly-detection first establishes a normal behavior pattern forusers, programs or resources in the system, and then looks for deviationfrom this behavior.signature-scan techniques passively monitor traffic seen on a network and detect an attack when patterns within the packet match predefined signatures in a database.They are a resource that has no authorized activity, they do not have any production value. Theoreticlly, a honeypot should see no traffic because it has no legitimate activity. This means any interaction with a honeypot is most likely unauthorized or malicious activity. Any connection attempts to a honeypot are most likely a probe, attack, or compromise. Snort’s open source network-based intrusion detection system (NIDS) has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection. Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection. the program will monitor network traffic and analyze it against a ruleset defined by the user. The program will then perform a specific action based on what has been identified