SlideShare a Scribd company logo
1 of 1
Download to read offline
The Center for Cyber Defenders
Expanding Computer Security Knowledge
Results:
Network Analysis Tool
An interactive user interface implements and
displays the results from:
• Parser – Creates input for machine learning
	 algorithms by extracting features from the 		
	 Ethernet, IP, and TCP/UDP headers of pcaps
• Analysis Scripts – perform frequency
	 analysis on output from Parser to create				
	 visual representations
Classifiers
Machine learning techniques such as Naïve
Bayes and k-Nearest Neighbor were used to
create classifiers to automate detection of
anomalous network traffic.
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation,
a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National
Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-XXXXC.
Greg Anders, Texas A&M; Kesha Hietala, University of Minnesota;Joseph Malone, University of Dallas;
Srinidhi Raghavan, University of Pennsylvania; Elizabeth Walkup, University of Tulsa
Preguntas
Project Mentors: Eric Hokanson, 5636; Jon Blount, 5628
Problem Statement:
Current detection of protocol in internet traffic
relies on port numbers, which are unreliable
because they can be easily changed. We
aim to develop a port agnostic system to
automatically detect protocol and suspicious
Internet traffic on a specific protocol.
Objectives and Approach:
• Capture and analyze network packets 					
	 (pcaps) to establish baseline of ‘normal’
• Analyze known malware pcaps to find how 		
	 they vary from ‘normal’
• Develop machine learning techniques to 				
	 automatically detect abnormal traffic
• Extract traffic session features to be used 			
	 with machine learning
• Use existing machine learning tools such as 		
	 Weka and Scikit-learn to verify results
Impact and Benefits:
The developed tool will be a lightweight Python
program to automate port agnostic protocol
and malware detection.

More Related Content

Viewers also liked

Who gets grandmas yellow pie plate worksheet for receivers
Who gets grandmas yellow pie plate worksheet for receiversWho gets grandmas yellow pie plate worksheet for receivers
Who gets grandmas yellow pie plate worksheet for receiversLoriScharmer
 
The Martian Poster Analysis
The Martian Poster AnalysisThe Martian Poster Analysis
The Martian Poster AnalysisCarla Appleby
 
Meera Babu Alukkal
Meera Babu AlukkalMeera Babu Alukkal
Meera Babu AlukkalMeera Babu
 
Actividad de enseñanza 2 unidad 1
Actividad de enseñanza 2 unidad 1Actividad de enseñanza 2 unidad 1
Actividad de enseñanza 2 unidad 1Celiia Goonzález
 
resume_Sandner_2015_extend
resume_Sandner_2015_extendresume_Sandner_2015_extend
resume_Sandner_2015_extendIrene Sandner
 
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001Information_About_Brokerage_Services_BuyerTenant__101011_ts38001
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001Richard Martin
 
11-04-2011 Guillermo Padrés lanzó la campaña de turismo “Sonora Sonríe Color...
11-04-2011 Guillermo Padrés  lanzó la campaña de turismo “Sonora Sonríe Color...11-04-2011 Guillermo Padrés  lanzó la campaña de turismo “Sonora Sonríe Color...
11-04-2011 Guillermo Padrés lanzó la campaña de turismo “Sonora Sonríe Color...Guillermo Padrés Elías
 
February 23 Guest Letter
February 23 Guest LetterFebruary 23 Guest Letter
February 23 Guest LetterEd Mc Donald
 
062_063_allabout_cinema_Layout 1
062_063_allabout_cinema_Layout 1062_063_allabout_cinema_Layout 1
062_063_allabout_cinema_Layout 1Marina Nasi
 

Viewers also liked (15)

Who gets grandmas yellow pie plate worksheet for receivers
Who gets grandmas yellow pie plate worksheet for receiversWho gets grandmas yellow pie plate worksheet for receivers
Who gets grandmas yellow pie plate worksheet for receivers
 
The Martian Poster Analysis
The Martian Poster AnalysisThe Martian Poster Analysis
The Martian Poster Analysis
 
Meera Babu Alukkal
Meera Babu AlukkalMeera Babu Alukkal
Meera Babu Alukkal
 
firearms 2013
firearms 2013firearms 2013
firearms 2013
 
Aclaración de la tarea 4
Aclaración de la tarea 4Aclaración de la tarea 4
Aclaración de la tarea 4
 
Actividad de enseñanza 2 unidad 1
Actividad de enseñanza 2 unidad 1Actividad de enseñanza 2 unidad 1
Actividad de enseñanza 2 unidad 1
 
resume_Sandner_2015_extend
resume_Sandner_2015_extendresume_Sandner_2015_extend
resume_Sandner_2015_extend
 
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001Information_About_Brokerage_Services_BuyerTenant__101011_ts38001
Information_About_Brokerage_Services_BuyerTenant__101011_ts38001
 
city & guilds
city & guildscity & guilds
city & guilds
 
11-04-2011 Guillermo Padrés lanzó la campaña de turismo “Sonora Sonríe Color...
11-04-2011 Guillermo Padrés  lanzó la campaña de turismo “Sonora Sonríe Color...11-04-2011 Guillermo Padrés  lanzó la campaña de turismo “Sonora Sonríe Color...
11-04-2011 Guillermo Padrés lanzó la campaña de turismo “Sonora Sonríe Color...
 
Advertising
AdvertisingAdvertising
Advertising
 
Mini manual drive
Mini manual driveMini manual drive
Mini manual drive
 
Ford tvc
Ford tvcFord tvc
Ford tvc
 
February 23 Guest Letter
February 23 Guest LetterFebruary 23 Guest Letter
February 23 Guest Letter
 
062_063_allabout_cinema_Layout 1
062_063_allabout_cinema_Layout 1062_063_allabout_cinema_Layout 1
062_063_allabout_cinema_Layout 1
 

Similar to CCD_2013_Preguntas_REVIEW

Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Jim Gilsinn
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
SHREYA_CISCO.pptx
SHREYA_CISCO.pptxSHREYA_CISCO.pptx
SHREYA_CISCO.pptxAkttripathi
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Kale
 
Phishing Detection Presentation.pptx
Phishing Detection Presentation.pptxPhishing Detection Presentation.pptx
Phishing Detection Presentation.pptxKavitaThakur72
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingAnita D'Amico
 
final presentation of md asif ali.pptx
final presentation of md asif ali.pptxfinal presentation of md asif ali.pptx
final presentation of md asif ali.pptxMDASIFALI19DEE8027
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to solTatianaMajor22
 

Similar to CCD_2013_Preguntas_REVIEW (20)

Venkata brundavanam 2020
Venkata brundavanam 2020Venkata brundavanam 2020
Venkata brundavanam 2020
 
Venkata brundavanam 2020
Venkata brundavanam 2020Venkata brundavanam 2020
Venkata brundavanam 2020
 
Resume tara linkedin
Resume tara linkedinResume tara linkedin
Resume tara linkedin
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 
Phanidhar Gorrepati
Phanidhar GorrepatiPhanidhar Gorrepati
Phanidhar Gorrepati
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
SHREYA_CISCO.pptx
SHREYA_CISCO.pptxSHREYA_CISCO.pptx
SHREYA_CISCO.pptx
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
 
Rushabhraj resume
Rushabhraj resumeRushabhraj resume
Rushabhraj resume
 
Resume
ResumeResume
Resume
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Phishing Detection Presentation.pptx
Phishing Detection Presentation.pptxPhishing Detection Presentation.pptx
Phishing Detection Presentation.pptx
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 
Rohan resume
Rohan resumeRohan resume
Rohan resume
 
final presentation of md asif ali.pptx
final presentation of md asif ali.pptxfinal presentation of md asif ali.pptx
final presentation of md asif ali.pptx
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
Vamsi Krishna
Vamsi KrishnaVamsi Krishna
Vamsi Krishna
 
ARVIND_BALAKUMAR_Resume
ARVIND_BALAKUMAR_ResumeARVIND_BALAKUMAR_Resume
ARVIND_BALAKUMAR_Resume
 
Prashant Soman resume
Prashant Soman resumePrashant Soman resume
Prashant Soman resume
 

CCD_2013_Preguntas_REVIEW

  • 1. The Center for Cyber Defenders Expanding Computer Security Knowledge Results: Network Analysis Tool An interactive user interface implements and displays the results from: • Parser – Creates input for machine learning algorithms by extracting features from the Ethernet, IP, and TCP/UDP headers of pcaps • Analysis Scripts – perform frequency analysis on output from Parser to create visual representations Classifiers Machine learning techniques such as Naïve Bayes and k-Nearest Neighbor were used to create classifiers to automate detection of anomalous network traffic. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-XXXXC. Greg Anders, Texas A&M; Kesha Hietala, University of Minnesota;Joseph Malone, University of Dallas; Srinidhi Raghavan, University of Pennsylvania; Elizabeth Walkup, University of Tulsa Preguntas Project Mentors: Eric Hokanson, 5636; Jon Blount, 5628 Problem Statement: Current detection of protocol in internet traffic relies on port numbers, which are unreliable because they can be easily changed. We aim to develop a port agnostic system to automatically detect protocol and suspicious Internet traffic on a specific protocol. Objectives and Approach: • Capture and analyze network packets (pcaps) to establish baseline of ‘normal’ • Analyze known malware pcaps to find how they vary from ‘normal’ • Develop machine learning techniques to automatically detect abnormal traffic • Extract traffic session features to be used with machine learning • Use existing machine learning tools such as Weka and Scikit-learn to verify results Impact and Benefits: The developed tool will be a lightweight Python program to automate port agnostic protocol and malware detection.