SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
The Challenges, Gaps and
Future Trends: Network Security
Deris Stiawan. Ph.D
(C|EH. C|HFI)
Communication Network and Security Research Lab (COMNETS)
Faculty of Computer Science
Universitas Sriwijaya
www.comnets.unsri.ac.id
@2014
1. Network Attack
• Existing dataset or developing the data
• Analysis of attack
– How to sniffing and read the packet from RAW
data
– Classification, Clustering and statistical of data
• How to extraction the data to
– Features extraction and selection the raw data to
human readable
• Alert management / correlation
– How to analysis, compare and process of alert
Attack Pattern (sample)
ScanningBruteForceDoS
Windows Server 2003
Freebsd
Linux Redhat
(www.pcrg-utm.org/dataset)
10.10.10.15, 10.10.10.20 (Attacker’s)
10.10.10.10.5 (Redhat), 10.10.10.10 (FreeBsd), 10.10.10.25 (Windows Server 2003)
Normal & Attack Traffic
DoS
Normal / Attack ?
Normal Access:
Web 2.0 ( Video, Blog, Chat)
Penetration Testing:
Probe: Scanning, Network Mapping
U2R: Rooting, Escalating Privilege
R2L: Malware, SQL Injection, ARP
Man in the Middle Attack
DoS: ICMP Flooding
The Challenges, Gaps and Future Trends: Network Security
• Research opportunity ;
– Network Defense : Firewall, IDS / IPS (hybrid,
accuracy, prediction, active, smart and extensible)
– Email protection, spam filtering, malware
identification, etc
– Statistical data
– Clustering / classification data with Soft
computing approach (SOM, PSO, AI, fuzzy, etc)
– The results : algorithm, method or systems
2. Forensic Investigator
• Existing dataset or developing our data
• Mobile Device / Phone
– File system
• Network / Host
– Analysis the worm, DoS, XSS, SQL injection attack
– Log, traffic, alert, etc
– RAM, Card, HD, File system (IOS, NTFS, HFS+, Ext, FAT, etc)
• Evidence
– How to evidence the sources
– How to find the malicious and analyzing the intrusion
– How to get the old data, corrupted data, or erased data
– Recover the data
Network forensics based on fuzzy logic and expert system
Computer Communications, Volume 32, Issue 17, 15 November 2009, Pages 1881-1892
Niandong Liao, Shengfeng Tian, Tinghua Wang
• Research opportunity ;
– Expert in tools : FTK, ENCASE, etc
– Forensic in network
• Log system, log from host, etc
• File system: MBR, images, registry, kernel, etc
– Forensic in mobile phone
• SIM Card, RIM, RAM, Phone contact
• Operating system: android, J2ME, etc
• Messages, history log, firware,
3. Cloud Computing
• Development of previously technology
– Grid computing, Distributed Systems, ASP
(Application Service Provider)
– Service Oriented Architecture (SOA)
– Web services : XML, Jason, WSDL, J2ME, Cross
platform, etc
– Mobile computing, real time
A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 1-11
S. Subashini, V. Kavitha
The Challenges, Gaps and Future Trends: Network Security
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud
computing
Future Generation Computer Systems, Volume 28, Issue 6, June 2012, Pages 833-851
Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi
Addressing cloud computing security issues
Future Generation Computer Systems, Volume 28, Issue 3, March 2012, Pages 583-592
Dimitrios Zissis, Dimitrios Lekkas
• Security question by Dawei Sun et al.
– how to provide safety mechanisms,
– how to keep data confidentiality for all the individual and
sensitive information,
– how to avoid malicious insiders illegal operation under the
general lack of transparency into provider process and
procedure environments,
– how to avoid service hijacking, where phishing, fraud and
exploitation are well known issues in IT,
– how to management multi-instance in multi-tenancy
virtual environments,
– how to develop appropriate law and implement legal
jurisdiction
Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments
Procedia Engineering, Volume 15, 2011, Pages 2852-2856
Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang
• According Dawei Sun et al. Privacy Issue :
– how to make users remain control over their data
when it is stored and processed in cloud
– how to guarantee data replications in a
jurisdiction and consistent state
– which party is responsible for ensuring legal
requirements for personal information,
– what extent cloud sub-contractors involved in
processing can be properly identified, checked
and ascertained.
• Research opportunity ;
– Security sides :
• Infrastructure as a services
• Hardware as a services
– Surveying and Analyzing Security, Privacy and
Trust
– Integrity: Certificate Authority, Certificate digital,
PKI, ISAKMP, LDAP, etc
– QoS: Session key, Scheduling algorithm,
– Authentication method: physical, AAA, RADIUS
4. Heterogeneous Network
• Integrated and combined the “cloud”
• Unified communication: voice, images and video
multicast
• Integrated mobile tech, real time and reliable
• Quality of services & cross platform
– traffic, bandwidth, services, etc
• Broker’s as a middleware, to connected the node
to cloud
• How to management it (monitoring, access and
control)
Capability adaptation algorithm based on joint network and terminal selection inheterogeneous networks
The Journal of China Universities of Posts and Telecommunications, Volume 18, Supplement 1,September 2011, Pages
76-82
Resource competition in a converged heterogeneous networking
Computer Networks, Volume 55, Issue 7, 16 May 2011, Pages 1549-1559
Abbas Jamalipour, Farshad Javadi, Kumudu S. Munasinghe
• Research opportunity ;
– Develop a topology of network to create the dataset,
combining technology of Cloud, wireless and mobile
– SLA
– Protocol : integrated IPv4 – IPv6 & how to integrated
the devices with heterogeneous network
– Result : the new system, improved from existing,
implementation framework based on open sources
5. Network Graph
• How to shows the vulnerability for dynamic
attacks
• Graph the correlation and interconnections
• Easy to manages and maintenance network
• Extensible and hybrid
Network analysis of temporal trends in scholarly research productivity
Journal of Informetrics, Volume 6, Issue 1, January 2012, Pages 97-110
Hyoungshick Kim, Ji Won Yoon, Jon Crowcroft
The Challenges, Gaps and Future Trends: Network Security
Fast detection and visualization of network attacks on parallel
Computers & Security, Volume 28, Issue 5, July 2009, Pages 276-288
Hyunsang Choi, Heejo Lee, Hyogon Kim
• Research opportunity ;
– Graph based on bayesian, SOM, etc
– Socket programming, tools matlab, etc
– Graph of DoS, malware, scanning attack
6. Network Management
• Unified Threat Management
• Early system & monitoring for security officer
= network monitoring center / network
operating center
• How to get SNMP from different devices
• Research opportunity ;
– One stop monitoring & management network
• Tools : Netflow, MRTG, OPManager, the dude
– Integrated network management and control
– Network coordinate, analytic & behavior based on
soft computing
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
7. Big Data Processing
• Networking: Capturing, storing, processing
packet data in real-time / online traffic
• Data analytic in GB / TB of Data
• Grid / Parallel / distributed computing
– Extract
– Reduce
– Optimized
– Search
• Requirement: Python or Java
8. Internet of Things
• Semantically means ‘‘a world-wide network of
interconnected objects uniquely addressable,
based on standard communication protocols
• Is not just wireless communications
• The basic idea of this concept is the pervasive
presence around us of a variety of things
or objects : RFID, tags, sensors, actuators,
mobile phones, etc
Luigi Atzori , et al. The Internet of Things: A survey, Computer Networks 54 (2010) 2787–2805
Mu-Sheng Lin, et al. Zigbee-based Internet of Things in 3D Terrains.
Computers and Electrical Engineering 39 (2013) 1667–1683
• Research Opportunity

Contenu connexe

Tendances

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Network forensics
Network forensicsNetwork forensics
Network forensicsArthyR3
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ PreventionDeris Stiawan
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsNasir Bhutta
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 

Tendances (20)

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Security
Security Security
Security
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Firewalls
FirewallsFirewalls
Firewalls
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 

Similaire à The Challenges, Gaps and Future Trends: Network Security

Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Saltzer principles.pptx
Saltzer principles.pptxSaltzer principles.pptx
Saltzer principles.pptxbekirm
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfMr. Moms
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...Asma Swapna
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Threat Intelligence Ops In-Depth at Massive Enterprise
Threat Intelligence Ops In-Depth at Massive EnterpriseThreat Intelligence Ops In-Depth at Massive Enterprise
Threat Intelligence Ops In-Depth at Massive EnterpriseJeremy Li
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network securityTrishla Thakur
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 

Similaire à The Challenges, Gaps and Future Trends: Network Security (20)

Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Saltzer principles.pptx
Saltzer principles.pptxSaltzer principles.pptx
Saltzer principles.pptx
 
Cyber Security in Power Systems
Cyber Security in Power SystemsCyber Security in Power Systems
Cyber Security in Power Systems
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Threat Intelligence Ops In-Depth at Massive Enterprise
Threat Intelligence Ops In-Depth at Massive EnterpriseThreat Intelligence Ops In-Depth at Massive Enterprise
Threat Intelligence Ops In-Depth at Massive Enterprise
 
Design of network
Design of networkDesign of network
Design of network
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 

Plus de Deris Stiawan

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Deris Stiawan
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerDeris Stiawan
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Deris Stiawan
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeris Stiawan
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeris Stiawan
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionDeris Stiawan
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System Deris Stiawan
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerDeris Stiawan
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Deris Stiawan
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting CorruptionDeris Stiawan
 

Plus de Deris Stiawan (13)

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputer
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting Corruption
 

Dernier

EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxJoseeMusabyimana
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesDIPIKA83
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfGiovanaGhasary1
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderjuancarlos286641
 
A Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationA Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationMohsinKhanA
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfJulia Kaye
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Projectreemakb03
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvementVijayMuni2
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxKISHAN KUMAR
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Akarthi keyan
 

Dernier (20)

EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptx
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display Devices
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdf
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entender
 
A Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationA Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software Simulation
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Project
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvement
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptx
 
Litature Review: Research Paper work for Engineering
Litature Review: Research Paper work for EngineeringLitature Review: Research Paper work for Engineering
Litature Review: Research Paper work for Engineering
 
Présentation IIRB 2024 Marine Cordonnier.pdf
Présentation IIRB 2024 Marine Cordonnier.pdfPrésentation IIRB 2024 Marine Cordonnier.pdf
Présentation IIRB 2024 Marine Cordonnier.pdf
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part A
 

The Challenges, Gaps and Future Trends: Network Security

  • 1. The Challenges, Gaps and Future Trends: Network Security Deris Stiawan. Ph.D (C|EH. C|HFI) Communication Network and Security Research Lab (COMNETS) Faculty of Computer Science Universitas Sriwijaya www.comnets.unsri.ac.id @2014
  • 2. 1. Network Attack • Existing dataset or developing the data • Analysis of attack – How to sniffing and read the packet from RAW data – Classification, Clustering and statistical of data • How to extraction the data to – Features extraction and selection the raw data to human readable • Alert management / correlation – How to analysis, compare and process of alert
  • 3. Attack Pattern (sample) ScanningBruteForceDoS Windows Server 2003 Freebsd Linux Redhat (www.pcrg-utm.org/dataset)
  • 4. 10.10.10.15, 10.10.10.20 (Attacker’s) 10.10.10.10.5 (Redhat), 10.10.10.10 (FreeBsd), 10.10.10.25 (Windows Server 2003)
  • 5. Normal & Attack Traffic DoS Normal / Attack ? Normal Access: Web 2.0 ( Video, Blog, Chat) Penetration Testing: Probe: Scanning, Network Mapping U2R: Rooting, Escalating Privilege R2L: Malware, SQL Injection, ARP Man in the Middle Attack DoS: ICMP Flooding
  • 7. • Research opportunity ; – Network Defense : Firewall, IDS / IPS (hybrid, accuracy, prediction, active, smart and extensible) – Email protection, spam filtering, malware identification, etc – Statistical data – Clustering / classification data with Soft computing approach (SOM, PSO, AI, fuzzy, etc) – The results : algorithm, method or systems
  • 8. 2. Forensic Investigator • Existing dataset or developing our data • Mobile Device / Phone – File system • Network / Host – Analysis the worm, DoS, XSS, SQL injection attack – Log, traffic, alert, etc – RAM, Card, HD, File system (IOS, NTFS, HFS+, Ext, FAT, etc) • Evidence – How to evidence the sources – How to find the malicious and analyzing the intrusion – How to get the old data, corrupted data, or erased data – Recover the data
  • 9. Network forensics based on fuzzy logic and expert system Computer Communications, Volume 32, Issue 17, 15 November 2009, Pages 1881-1892 Niandong Liao, Shengfeng Tian, Tinghua Wang
  • 10. • Research opportunity ; – Expert in tools : FTK, ENCASE, etc – Forensic in network • Log system, log from host, etc • File system: MBR, images, registry, kernel, etc – Forensic in mobile phone • SIM Card, RIM, RAM, Phone contact • Operating system: android, J2ME, etc • Messages, history log, firware,
  • 11. 3. Cloud Computing • Development of previously technology – Grid computing, Distributed Systems, ASP (Application Service Provider) – Service Oriented Architecture (SOA) – Web services : XML, Jason, WSDL, J2ME, Cross platform, etc – Mobile computing, real time
  • 12. A survey on security issues in service delivery models of cloud computing Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 1-11 S. Subashini, V. Kavitha
  • 14. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Generation Computer Systems, Volume 28, Issue 6, June 2012, Pages 833-851 Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi
  • 15. Addressing cloud computing security issues Future Generation Computer Systems, Volume 28, Issue 3, March 2012, Pages 583-592 Dimitrios Zissis, Dimitrios Lekkas
  • 16. • Security question by Dawei Sun et al. – how to provide safety mechanisms, – how to keep data confidentiality for all the individual and sensitive information, – how to avoid malicious insiders illegal operation under the general lack of transparency into provider process and procedure environments, – how to avoid service hijacking, where phishing, fraud and exploitation are well known issues in IT, – how to management multi-instance in multi-tenancy virtual environments, – how to develop appropriate law and implement legal jurisdiction Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments Procedia Engineering, Volume 15, 2011, Pages 2852-2856 Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang
  • 17. • According Dawei Sun et al. Privacy Issue : – how to make users remain control over their data when it is stored and processed in cloud – how to guarantee data replications in a jurisdiction and consistent state – which party is responsible for ensuring legal requirements for personal information, – what extent cloud sub-contractors involved in processing can be properly identified, checked and ascertained.
  • 18. • Research opportunity ; – Security sides : • Infrastructure as a services • Hardware as a services – Surveying and Analyzing Security, Privacy and Trust – Integrity: Certificate Authority, Certificate digital, PKI, ISAKMP, LDAP, etc – QoS: Session key, Scheduling algorithm, – Authentication method: physical, AAA, RADIUS
  • 19. 4. Heterogeneous Network • Integrated and combined the “cloud” • Unified communication: voice, images and video multicast • Integrated mobile tech, real time and reliable • Quality of services & cross platform – traffic, bandwidth, services, etc • Broker’s as a middleware, to connected the node to cloud • How to management it (monitoring, access and control)
  • 20. Capability adaptation algorithm based on joint network and terminal selection inheterogeneous networks The Journal of China Universities of Posts and Telecommunications, Volume 18, Supplement 1,September 2011, Pages 76-82
  • 21. Resource competition in a converged heterogeneous networking Computer Networks, Volume 55, Issue 7, 16 May 2011, Pages 1549-1559 Abbas Jamalipour, Farshad Javadi, Kumudu S. Munasinghe
  • 22. • Research opportunity ; – Develop a topology of network to create the dataset, combining technology of Cloud, wireless and mobile – SLA – Protocol : integrated IPv4 – IPv6 & how to integrated the devices with heterogeneous network – Result : the new system, improved from existing, implementation framework based on open sources
  • 23. 5. Network Graph • How to shows the vulnerability for dynamic attacks • Graph the correlation and interconnections • Easy to manages and maintenance network • Extensible and hybrid
  • 24. Network analysis of temporal trends in scholarly research productivity Journal of Informetrics, Volume 6, Issue 1, January 2012, Pages 97-110 Hyoungshick Kim, Ji Won Yoon, Jon Crowcroft
  • 26. Fast detection and visualization of network attacks on parallel Computers & Security, Volume 28, Issue 5, July 2009, Pages 276-288 Hyunsang Choi, Heejo Lee, Hyogon Kim
  • 27. • Research opportunity ; – Graph based on bayesian, SOM, etc – Socket programming, tools matlab, etc – Graph of DoS, malware, scanning attack
  • 28. 6. Network Management • Unified Threat Management • Early system & monitoring for security officer = network monitoring center / network operating center • How to get SNMP from different devices
  • 29. • Research opportunity ; – One stop monitoring & management network • Tools : Netflow, MRTG, OPManager, the dude – Integrated network management and control – Network coordinate, analytic & behavior based on soft computing
  • 34. 7. Big Data Processing • Networking: Capturing, storing, processing packet data in real-time / online traffic • Data analytic in GB / TB of Data • Grid / Parallel / distributed computing – Extract – Reduce – Optimized – Search • Requirement: Python or Java
  • 35. 8. Internet of Things • Semantically means ‘‘a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols • Is not just wireless communications • The basic idea of this concept is the pervasive presence around us of a variety of things or objects : RFID, tags, sensors, actuators, mobile phones, etc
  • 36. Luigi Atzori , et al. The Internet of Things: A survey, Computer Networks 54 (2010) 2787–2805
  • 37. Mu-Sheng Lin, et al. Zigbee-based Internet of Things in 3D Terrains. Computers and Electrical Engineering 39 (2013) 1667–1683