Developing Smart Port Scanner To Make Better Secure Network: MN691 Research Methods and Project Design
Developing Smart Port Scanner To Make Better Secure Network: MN691 Research Methods and Project Design
Final Report
Acknowledgement
We are really grateful because we managed to complete our MN691 Research
Methods and Project Design within the time given. This research project cannot be
completed without the effort and co-operation from our group members, (Surachet
Sukkram and Ageng Hardani). We also sincerely thank our lecturer Jason Brown for
the guidance and encouragement in finishing our research project and also for
teaching us in this course. We would also like to thank our colleagues from MIT who
provided insight and expertise that greatly assisted the research.
Signature of Students:
Sign your signature here
Date of Submission of Report: Put a date here clearly
Contents
Abstract.........................................................................................................4
1. Introduction................................................................................................5
2. Problem domain and research questions........................................................6
3. Background and Project Objective.................................................................8
3.1 Summary of Literature Review................................................................8
3.2 Objectives of the Project......................................................................13
4. Project Requirements Analysis and Specification...........................................14
5. Project plan and preliminary design.............................................................18
Flow chart of Smart port scanner................................................................19
Smart port scanner network scanning for a large group of clients....................20
Weekly Activity Table................................................................................21
Research project weekly activity grant chart................................................22
Role and Responsibilities Table..................................................................23
Cost and Budget Planning for Develop Port Scanner....................................24
Use Case Diagram for our Port Scanner.....................................................26
6. Research methods to be used for the next stage of..............................28
7. the pr.....................................................................................................28
8. oject.......................................................................................................28
9. Conclusion and limitations....................................................................28
References................................................................................................28
References................................................................................................28
Glossary and Abbreviations......................................................................29
Appendices................................................................................................29
Appendix I: Simulation Source Codes..................................................29
Appendix II: Detailed proof of theory..................................................29
Appendix III: Very Long Tables of data...............................................29
Abstract
Port scanning tool is one of the most crucial tool used by system administrator. The
purpose of port scanning is to scan all the port on the system to determine the
vulnerabilities of the services running on each port. Then system administrator can
use the information to allow only necessarily port and close unused port. This is the
way to increase the security of the system being scanned. Most of port scanning tool
is just running and then stop after it done scanning. This report is about designing a
smarter port scanning tool which not only run once but continually running and
reporting both internal and external port scanning. The smart port scanner can also
back out when it senses that the usage in the network is at a peak. Then start itself
again when the normal network traffic begins. The smart port scanning can also
detect and report suspicious activities of each program that try to utilize port to send
out any packets to another network. The smart port scanning can generate detail
report in two formats. First it can generate the report file in XML format (for easy web
viewing). Second, it can generate the report file in PDF format (for standard viewing).
The report will include information such as date, time, port number, IP address of
destination data that each program tries to utilize port to send data out. The main
idea of this project is to provide information and empower system administrator to
secure their system and also to implement security policies to enhance network
security.
1. Introduction
The tactics of traditional port scanning tool is to run once and then stop. This project
wants to provide better and smarter port scanner tool. The Smart port scanner will be
part of the network system which will actively probe to the network to secure the
network system and not just sit and wait for the port scan to happen. The tool will
also be able to determine the current network traffic. If it found out that the traffic is in
a peak time it will ideal itself and wait for the peak to pass, then reactivate itself to
continually monitoring the system again. All of the suspicious port utilization activities
will be collect and also can be used to generate a report. The report will not only
show all the information in only readable text but also will show in graphical view.
Because the more of the different ways that you can look at the report the better
chance that you might find something which will catch your eye. This will ensure you
will not miss any importance information that otherwise you might miss if you are
provided will a single type of report. The other benefit of the combination of graphical
and text report is that network administrator will be able to find any misconfiguration
a lot easier and in a short period of time. In this report will contain seven sections.
Section 1 is the introduction. In section 2 is the Problem domain and research
questions which will include a problem that need to be address and research goal.
Section 3 is background and project objective which is literature review of the topic
undertaken. Section 4 is project requirements analysis and specification that
contains the requirements such as hardware, software or required items for the
chosen project. While, section 5 is project plan and preliminary design. It this section
the detailed document and design of the project is provided. Section 6 is research
methods to be used for the next stage of the project. This will lay out how to
implement the project design in terms of design of experiment, data collection
method, data analysis method etc. Section 7 is conclusion and limitations which will
show summarization of the project and clearly list out the limitation of the simulation
and the project. Finally, references are given at the end of the report.
The solution for this is to include the code that can detect a pattern that monitor
network spikes. We will have to keep track data point, which provides traffic in
and out of the network. The details such as applications, users, speed, volume,
packets and utilization off the total bandwidth and all other thing that generating
traffic will be included in anlyzing the peak of the network. This will provide more
accuracy when our port scanner will active or inactive.
The second problem is how the system administrator will be notified if port scanning
is detected. Our program is continually monitoring port activities. The report has to
be generated in real time to be able to inform system administrator of the current
situation of the system.
The solution for this is to create pattern and give it priorities such 1 to 3.
Where 1, 2, and 3 can briefly described as below:
- Priority 1 (Red) Extreme urgent: this is the highest level of security risk. The
program will generate phone call plus send the message to the system
-
The third problem is how the smart port scanner will be able to probe into different
VLANs because in the real network environment it is common to have more than
one subnet in a network. All of the subnets will be link to each other via trunk port.
The smart port scanner will need to be able to support scanning port of the different
VLANs as well.
We have two ways to solve this problem. First solution, we might need to
implement our smart port scanner in each VLANs. This is to ensure full
capabilities of the program when running and to minimize any error that might
happens while program probe into different VLANs. Moreover, the feature of our
smart port scanner that can deactivate itself when network peak time might have
a problem when working with two network. This is due to if the traffic of one
network is peaked and the other is not. The smart port scanner could be
confusing of it status whether to continue monitoring or to inactive and wait until
network spike passed. Second solution, is to periodically send ping packet to
each network that our port scanner tries to scan the port to determine the
response time of particular network. If it takes too long for that particular network
to response. It can make a decision to stop port scanning for that network.
However, when the ping package that it sends showing fast response it then can
activate itself and going back to do its job again.
The Fourth problem is how the smart port scanner will work alongside with IDS. The
Smart port scanner should be able to differentiate between internal port scanning
and actual hacker port scanning.
better understanding of what other have done on the same topic and what we will do
to show novelty in our project. This is how we summarize the main idea of each
paper in the same field. Below is the list of abstract of the journals that most of them
mainly revolves around the different type of port scanning techniques.
This paper gives comprehensive information of various facets of network anomaly
detection including comparing many network anomaly detection methods and
systems. This help a researcher to be familiar with all elements of network anomaly
detection methods. The paper also gives overview of the underlying computational
techniques used in detecting anomaly detection methods. [1]
This paper present how to use extensive Penetration Tests (Ethical Hacking) to
reach maximums security level in network. The paper propose the use of a
Penetration Test methodology and framework capable to expose possible exploitable
vulnerabilities in every network layer. Furthermore, the paper gives comprehensive
analysis of a network penetration test case study that is used against a network
simulation in lab environment setup. This extensive analysis exposing common
network mis-configurations including the security implications which affect the whole
network and its users. [2]
This paper present multi-level access management that help in reconfigurable scan
networks. Typically, using the access is to restrict and locally protected instruments
at the interface to the network. The access restriction is to allow only a precomputed
set of scan-in access sequences. The paper shows extensive analysis result for
complex reconfigurable scan networks depends on the number of allowed access.
The multi-level access management is the scalable solution for complex
reconfigurable scan networks. [3]
This paper presents how to use just a simple network forensics architecture to
handling large volumes of network data. This method will also overcome a problem
of the resource intensive processing required for analysis. The paper proposes the
use of open source network security tools. The tools will be used to collect and store
the data. After the data is collected it will be used by the system to test against
various port scanning attacks. The results will describe the effectiveness in its
server will be used. In the real test, the proposes approach worked faster than other
methods like basic port knocking and Fwknop + SPA. As a result, the technique is
can be used to protect againte TCP replay attack and port scanning. [17]
This paper using technique called multi-window state map (MWSM) to show a novel
failed flow dispersion estimation technique. This technique requires small amount of
memory and a constant number of memory accesses for implementing the multiresolution concept. The paper proposed using multi-window state map technique to
help better port scan detector because this technique is well suited to hardware
implementation. [18]
This paper present a new technique called multiphase distributed vulnerability
detection (NICE). It is an attack graph-based analytical models and reconfigurable
virtual network-based countermeasures. This mechanism is worked on OpenFlow
network programming API. Developer can implement monitor and control plane to
build a virtual programmable virtual switches which improving the attack detection
and mitigate attack consequences. [19]
The paper gives information of all elements or cyber scanning topic. The paper
categorizes cyber scanning by strategies and approaches including comprehensive
review of its techniques. The paper also focuses on how to tackle cyber scanning by
focusing on methods of detecting cyber scanning. It also gives out two example of
cyber scanning attack which happened recently. [20]
menu explained above. Please see figure 2 5 for example of the Smart port scanner
report. The smart port scanner will also be able to run in command line mode with the
configuration file to configure the scan criteria. This is how to implement scanning for the
network using standard client-server architecture to distribute Smart port scanner
command line file to all the client and run that command line on each client that
connected to the server.
Figure 2 shows sample of Port scanning detected base on priorities (Pie chart graph)
Week 1
Week 2
Week 3
Week 4
Figure 4. shows sample of weekly port scan report (3D Bar Graph)
port scanning again. The Smart port scanner will terminate once user choose to
terminate the program. Please see flow chart below.
The Smart port scanner will be able to run in command line with a command line
configuration file configured. This is the way that Smart port scanner will be able to
scan a large group of clients at once. We will set up virtual server which will be
distributed the Smart port scanner command line file to all clients connected to it.
The virtual server will then reads an already configured Smart port scanner
command line file and sends the Smart port scanner command line to all clients. This
works by implementing a client/server architecture (Cloud based). All of the clients
had Smart port scanner program installed and when it received the Smart port
scanner command line file it run Smart port scanner according to the configured in
the command line file. The output of the scan can be stored on both server and
clients.
Figure 8 shows Smart port scanner can scan large group of clients
Week 4
Week 5
Week 6
Week 1
Week 2
Week 3
Week 7
Week 8
Week 9
Week 10
Week 11
Week 12
Role
Responsibilities
Team
Member
abstraction
Specify and identified at least 3 research problems
List project requirements such as hardware, software including
detailed specification
Create table of weekly activities, roles & responsibilities of
Ageng
Hardani
Team
Member
presentation
Presentation of the final report
Research literature review for individual task
Conducted literature review extensively on chosen topic
Ensure that report template is meet to final report requirement
Specify and identified research problems
Create table of weekly activities, roles & responsibilities of each
Figure 12 shows Gantt chart for Cost and Budget Planning of the Smart port scanner
Figure 13 shows network diagram for Cost and Budget Planning of the Smart port
scanner
The recurring cost is the cost of the virtual server. Our project is to implement virtual
server and we will be using it to distribute the Smart port scanner command line file
to all clients that connected to it. The Smart port scanner is written in C++ which
allows it to run on multiple platform. To take advantage of this we selected the Linode
Linux virtual server as our virtual server platform. Linode.com is the one of the
leaders in Linux virtual server platform. The plan of virtual server that we choosing is
Linode 12GB. The cost per month is $80 which is about $.12 per hour. The virtual
server specification includes 12 GB RAM, 6 CPU Cores, 192 GB SSD Storage, 8 TB
Transfer, 40 Gbps Network In, and 1000 Mbps Network Out. We decide to use
Linode because the flexibility in resizing the account. We can upgrade or downgrade
the
account
at
any
time.
Pricing
of
Linode
plan
can
be
found
at
Category
One time
Free
Cost
Community
Software Developing, implementing and testing
One time
$16,300
Recurring
$80/Month
Figure 14 shows Use Case Diagram for the Smart port scanner
References
Compile your reference list as used in the review and research sections.
This section should not contain any reference to any article that you have
not used. Use the IEEE Communications referencing format. Check the
Library on this format. For examples
References
[1] H. Monowar, D. Bhuyan, B. K and J. K. Kalita, Network Anomaly
Detection: Methods, Systems and Tools, IEEE Communication, vol.
16, pp. 303-336, 2014.
[2] B. A and S. N., Aiming at Higher Network Security through
2011.
[19 M. HWASHIN, Y. SUNGWON, C. GYU SANG, J. YONGSUNG and
] JOENGNYEO, A Multi-resolution Port Scan Detection Technique for
High Speed Networks, Journal of information Science &
Engineering, vol. 31, 2015.
[20 H. E. Bou, D. Mourad and A. Chad, Cyber Scanning: A
] Comprehensive Survey, vol. 16, 2014.
[21 C. Chung, P. Khatkar, T. Xing, J. Lee and D. Huang, NICE: Network
] Intrusion Detection and Countermeasure Selection in Virtual
Network System, IEEE, vol. 10, pp. 198-211, 2016.