Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christopher P. Lee is active.

Publication


Featured researches published by Christopher P. Lee.


annual computer security applications conference | 2007

A Taxonomy of Botnet Structures

David Dagon; Guofei Gu; Christopher P. Lee; Wenke Lee

We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Using these performance metrics, we consider the ability of different response techniques to degrade or disrupt botnets. In particular, our models show that targeted responses are particularly effective against scale free botnets and efforts to increase the robustness of scale free networks comes at a cost of diminished transitivity. Botmasters do not appear to have any structural solutions to this problem in scale free networks. We also show that random graph botnets (e.g., those using P2P formations) are highly resistant to both random and targeted responses. We evaluate the impact of responses on different topologies using simulation and demonstrate the utility of our proposed metrics by performing novel measurements of a P2P network. Our analysis shows how botnets may be classified according to structure and given rank or priority using our proposed metrics. This may help direct responses and suggests which general remediation strategies are more likely to succeed.


systems man and cybernetics | 2005

Visualizing network data for intrusion detection

Kulsoom Abdullah; Christopher P. Lee; Gregory J. Conti; John A. Copeland

As the trend of successful network attacks continue to rise, better forms of intrusion detection and prevention are needed. This paper addresses network traffic visualization techniques that aid an administrator in recognizing attacks in real time. Our approach improves upon current techniques that lack effectiveness due to an overemphasis on flow, nodes, or assumed familiarity with the attack tool, causing either late reaction or missed detection. A port-based overview of network activity produces a improved representation for detecting and responding to malicious activity. We have found that presenting an overview using stacked histograms of aggregate port activity, combined with the ability to drill-down for finer details allows small, yet important details to be noticed and investigated without being obscured by large, usual traffic. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary to help provide this overview. We provide graphs with examples of forensic findings. Finally, we describe our future plans for using live traffic in addition to our forensic visualization techniques.


visualization for computer security | 2005

IDS rainStorm: visualizing IDS alarms

Kulsoom Abdullah; Christopher P. Lee; Gregory J. Conti; John A. Copeland; John T. Stasko

The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and it is difficult to get an overall picture of what is occurring in the network by manually traversing textual alarm logs. We have designed a novel visualization to address this problem by showing alarm activity within a network. Alarm data is presented in an overview where system administrators can get a general sense of network activity and easily detect anomalies. They then have the option of zooming and drilling down for details. The information is presented with local network IP (Internet Protocol) addresses plotted over multiple yaxes to represent the location of alarms. Time on the x-axis is used to show the pattern of the alarms and variations in color encode the severity and amount of alarms. Based on our system administrator requirements study, this graphical layout addresses what system administrators need to see, is faster and easier than analyzing text logs, and uses visualization techniques to effectively scale and display the data. With this design, we have built a tool that effectively uses operational alarm log data generated on the Georgia Tech campus network. The motivation and background of our design is presented along with examples that illustrate its usefulness.


computer and communications security | 2009

Towards complete node enumeration in a peer-to-peer botnet

Brent ByungHoon Kang; Eric Chan-Tin; Christopher P. Lee; James Tyra; Hun Jeong Kang; Chris Nunnery; Zachariah Wadler; Greg Sinclair; Nicholas Hopper; David Dagon; Yongdae Kim

Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditional mitigation efforts such as server incapacitation. As an alternative strategy, the malware defense community has been trying to identify the bot-infected hosts and enumerate the IP addresses of the participating nodes so that the list can be used by system administrators to identify local infections, block spam emails sent from bots, and configure firewalls to protect local users. Enumerating the infected hosts, however, has presented challenges. One cannot identify infected hosts behind firewalls or NAT devices by employing crawlers, a commonly used enumeration technique where recursive get-peerlist lookup requests are sent newly discovered IP addresses of infected hosts. As many bot-infected machines in homes or offices are behind firewall or NAT devices, these crawler-based enumeration methods would miss a large portions of botnet infections. In this paper, we present the Passive P2P Monitor (PPM), which can enumerate the infected hosts regardless whether or not they are behind a firewall or NAT. As an empirical study, we examined the Storm botnet and enumerated its infected hosts using the PPM. We also improve our PPM design by incorporating a FireWall Checker (FWC) to identify nodes behind a firewall. Our experiment with the peer-to-peer Storm botnet shows that more than 40% of bots that contact the PPM are behind firewall or NAT devices, implying that crawler-based enumeration techniques would miss out a significant portion of the botnet population. Finally, we show that the PPMs coverage is based on a probability-based coverage model that we derived from the empirical observation of the Storm botnet.


IEEE Transactions on Information Forensics and Security | 2012

A Large-Scale Empirical Study of Conficker

Seungwon Shin; Guofei Gu; A. L. Narasimha Reddy; Christopher P. Lee

Conficker is the most recent widespread, well-known worm/bot. According to several reports, it has infected about 7 million to 15 million hosts and the victims are still increasing even now. In this paper, we analyze Conficker infections at a large scale, about 25 million victims, and study various interesting aspects about this state-of-the-art malware. By analyzing Conficker, we intend to understand current and new trends in malware propagation, which could be very helpful in predicting future malware trends and providing insights for future malware defense. We observe that Conficker has some very different victim distribution patterns compared to many previous generation worms/botnets, suggesting that new malware spreading models and defense strategies are likely needed. We measure the potential power of Conficker to estimate its effects on the networks/hosts when it performs malicious operations. Furthermore, we intend to determine how well a reputation-based blacklisting approach can perform when faced with new malware threats such as Conficker. We cross-check several DNS blacklists and IP/AS reputation data from Dshield and FIRE and our evaluation shows that unlike a previous study which shows that a blacklist-based approach can detect most bots, these reputation-based approaches did relatively poorly for Conficker. This raises a question of how we can improve and complement existing reputation-based techniques to prepare for future malware defense? Based on this, we look into some insights for defenders. We show that neighborhood watch is a surprisingly effective approach in the case of Conficker. This suggests that security alert sharing/correlation (particularly among neighborhood networks) could be a promising approach and play a more important role for future malware defense.


visualization for computer security | 2005

Visual firewall: real-time network security monitor

Christopher P. Lee; Jason Trost; Nicholas Gibbs; Raheem A. Beyah; John A. Copeland

Networked systems still suffer from poor firewall configuration and monitoring. VisualFirewall seeks to aid in the configuration of firewalls and monitoring of networks by providing four simultaneous views that display varying levels of detail and time-scales as well as correctly visualizing firewall reactions to individual packets. The four implemented views, real-time traffic, visual signature, statistics, and IDS alarm, provide the levels of detail and temporality that system administrators need to properly monitor their systems in a passive or an active manner. We have visualized several attacks, and we feel that even individuals unfamiliar with networking concepts can quickly distinguish between benign and malignant traffic patterns with a minimal amount of introduction.


IEEE Computer Graphics and Applications | 2006

Countering security information overload through alert and packet visualization

Gregory J. Conti; Kulsoom Abdullah; Julian B. Grizzard; John T. Stasko; John A. Copeland; Mustaque Ahamad; Henry L. Owen; Christopher P. Lee

This article presents a framework for designing network security visualization systems as well as results from the end-to-end design and implementation of two highly interactive systems. In this article, we provide multiple contributions: we present the results of our survey of security professionals, the design framework, and lessons learned from the design of our systems as well as an evaluation of their effectiveness. Our results indicate that both systems effectively present significantly more information when compared to traditional textual approaches. We believe that the interactive, graphical techniques that we present will have broad applications in other domains seeking to deal with information overload.


wireless algorithms, systems, and applications | 2008

Designing Secure Protocols for Wireless Sensor Networks

A. Selcuk Uluagac; Christopher P. Lee; Raheem A. Beyah; John A. Copeland

Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.


IEEE Journal on Selected Areas in Communications | 2011

Goodput Enhancement of VANETs in Noisy CSMA/CA Channels

Yusun Chang; Christopher P. Lee; John A. Copeland

The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportation Systems (ITS). Major challenges in such network environments include varying path characteristics and vulnerable channel quality resulting from dynamic traffic conditions and the design of the road. This paper demonstrates a feasible methodology that can enhance inter-vehicle information dissemination using dynamic optimal fragmentation with rate adaptation algorithm (DORA). DORA achieves maximum goodput in wireless mobile networks by computing a fragmentation threshold and transmitting optimal sized packets with maximum transfer rates. To estimate the SNR in the model, an adaptive on-demand UDP estimator is designed to reduce estimation overhead. Several test-beds were developed to evaluate the performance of DORA in channel estimation accuracy, ad hoc network goodput, and vehicle-to-vehicle network goodput along I-85 in Atlanta, Georgia. The proposed algorithm is an energy-efficient, generic CSMA/CA MAC protocol for wireless mobile computing applications, and enhances system goodput in ad hoc networks and vehicle-to-vehicle networks without modification of the base protocols.


visualization for computer security | 2006

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers

Christopher P. Lee; John A. Copeland

Current tools for forensic analysis require many hours to understand novel attacks, causing reports to be terse and untimely. We apply visual filtering and tagging of flows in a novel way to address the current limitations of post-attack analysis, reporting, and sharing. We discuss the benefits of visual filtering and tagging of network flows and introduce FlowTag as our prototype tool for Honeynet researchers. We argue that online collaborative analysis benefits security researchers by organizing attacks, collaborating on analysis, forming attack databases for trend analysis, and in promoting new security research areas. Lastly, we show three attacks on the Georgia Tech Honeynet and describe the analysis process using FlowTag.

Collaboration


Dive into the Christopher P. Lee's collaboration.

Top Co-Authors

Avatar

John A. Copeland

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yusun Chang

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

David Dagon

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Gregory J. Conti

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Kevin D. Fairbanks

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kulsoom Abdullah

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bongkyoung Kwon

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Henry L. Owen

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Wenke Lee

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge