RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM

Nowadays, many network already protected by Intrusion Prevention System (IPS). However, most IPS are using signature based technique whereas signature update tends to be difficult and time consuming because it requires expert knowledge in the making. Therefore, signature based IPS has weakness on de...

Full description

Saved in:
Bibliographic Details
Main Author: (NIM : 13511068), DANIEL
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/21567
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:21567
spelling id-itb.:215672017-10-09T10:28:08ZRULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM (NIM : 13511068), DANIEL Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/21567 Nowadays, many network already protected by Intrusion Prevention System (IPS). However, most IPS are using signature based technique whereas signature update tends to be difficult and time consuming because it requires expert knowledge in the making. Therefore, signature based IPS has weakness on detecting latest attack. Honeypot can be used to help learn the latest attack. Honeypot is a tool which doesn’t have production value, so every connection attempt to it can be considered as attack. However, honeypot data need to be processed first before can be used by IPS. To process attack data into signature, some researcher has made research on signature generator. After comparing signature generators, this final work decided to use Polygraph because it has advantage on detecting polymorphic worm compared to Honeycomb. Polymorphic worm is a worm that vary its shape in every infection attempt so it becomes difficult to determine its signature. This final work determine the technique needed to transform attack data captured by chosen honeypot (Dionaea) into signature with the help of Polygraph. The generated signature then furthermore adapted to the form that can be used by chosen IPS (Snort). Snort with the help of the generated signature is hoped to be able to block the same attack with the one captured by Dionaea before. After doing testing on the proposed technique, Snort able to block the same attack with the one captured by Dionaea. However, there is a problem with performance because the generated signature is utilizing regex resulting in slower packet processing on IPS. Furthermore, there is a need to change pcre match limitations on Snort to block attack more optimally. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Nowadays, many network already protected by Intrusion Prevention System (IPS). However, most IPS are using signature based technique whereas signature update tends to be difficult and time consuming because it requires expert knowledge in the making. Therefore, signature based IPS has weakness on detecting latest attack. Honeypot can be used to help learn the latest attack. Honeypot is a tool which doesn’t have production value, so every connection attempt to it can be considered as attack. However, honeypot data need to be processed first before can be used by IPS. To process attack data into signature, some researcher has made research on signature generator. After comparing signature generators, this final work decided to use Polygraph because it has advantage on detecting polymorphic worm compared to Honeycomb. Polymorphic worm is a worm that vary its shape in every infection attempt so it becomes difficult to determine its signature. This final work determine the technique needed to transform attack data captured by chosen honeypot (Dionaea) into signature with the help of Polygraph. The generated signature then furthermore adapted to the form that can be used by chosen IPS (Snort). Snort with the help of the generated signature is hoped to be able to block the same attack with the one captured by Dionaea before. After doing testing on the proposed technique, Snort able to block the same attack with the one captured by Dionaea. However, there is a problem with performance because the generated signature is utilizing regex resulting in slower packet processing on IPS. Furthermore, there is a need to change pcre match limitations on Snort to block attack more optimally.
format Final Project
author (NIM : 13511068), DANIEL
spellingShingle (NIM : 13511068), DANIEL
RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
author_facet (NIM : 13511068), DANIEL
author_sort (NIM : 13511068), DANIEL
title RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
title_short RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
title_full RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
title_fullStr RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
title_full_unstemmed RULE GENERATOR FOR IPS BY USING HONEYPOT DATA TO FIGHT POLYMORPHIC WORM
title_sort rule generator for ips by using honeypot data to fight polymorphic worm
url https://digilib.itb.ac.id/gdl/view/21567
_version_ 1821120498552012800