International Conference on Cyber Warfare and Security (ICCWS 2016) Effectiveness of Migration-based Moving Target Defense in Cyber Systems Noam Ben-Asher.

Slides:



Advertisements
Similar presentations
A First Step Towards Characterizing Stealthy Botnets Justin Leonard, Shouhuai Xu, Ravi Sandhu University of Texas at San Antonio.
Advertisements

Virtual Disk based Centralized Management for Enterprise Networks
Carlo Tarantola Senior Director EMEA Mobile and Wireless Center of Expertise Warsaw, Poland Oracle Corporation.
Brad Berdine Brian Henze Beth Cohlman Bryan Schiele.
Moving Target Defense in Cyber Security
Introduction to Information Operations Attaché Corps- SEP 09
Chapter 5: Competitive Rivalry and Competitive Dynamics
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
Black & Decker Policy Patriots. Agenda  Executive summary  Recommendations  Conclusion  Question & Answers.
1 The IIPC Web Curator Tool: Steve Knight The National Library of New Zealand Philip Beresford and Arun Persad The British Library An Open Source Solution.
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
SYST Web Technologies SYST Web Technologies Installing a Web Server (XAMPP)
Topological Vulnerability Analysis
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Chapter 2 System Administration - 1. Overview  Introduction to system administration  Importance of system administration to information security 
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
NWS Linux Implementation Barry C. West Chief Information Officer.
Carnegie Mellon Selected Topics in Automated Diversity Stephanie Forrest University of New Mexico Mike Reiter Dawn Song Carnegie Mellon University.
Linux vs. Windows: A Comparison of Application and Platform Innovation Incentives for Open Source and Proprietary Software Platforms Submitted By: Kishan.
Open Source & Freeware Products in Maine State Government B. Victor Chakravarty October 6, 2008.
Cyber vulnerabilities and the threat of attack: Making things better:
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.
A Web-based Distributed Simulation System Christopher Taewan Ryu Computer Science Department California State University, Fullerton.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Profiling Self-Propagating Worms via Behavioral Footprinting Xuxian Jiang, Dongyan Xu ACM WORM’06 November 3, 2006.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Optimizing Live Migration of Virtual Machines across Wide Area Networks using Integrated Replication and Scheduling Sumit Kumar Bose, Unisys Scott Brock,
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Deconstructing Storage Arrays Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau University of Wisconsin,
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
Optimizing Live Migration of Virtual Machines across Wide Area Networks using Integrated Replication and Scheduling Sumit Kumar Bose, Unisys Scott Brock,
SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J.
Grid Defense Against Malicious Cascading Failure Paulo Shakarian, Hansheng Lei Dept. Electrical Engineering and Computer Science, Network Science Center,
Learning Momentum: Integration and Experimentation Brian Lee and Ronald C. Arkin Mobile Robot Laboratory Georgia Tech Atlanta, GA.
IWM 2004 Jouko Lehonen Jouko Lehtonen A Proposal for Future Databases on Micropiles.
Simulation in Operational Research form Fine Details to System Analysis.
Grid as a Service. Agenda Targets Overview and awareness of the obtained material which determines the needs for defining Grid as a service and suggest.
Benefits Of PHP Web Development. Easy to Implement PHP permits quick implementation of complicated issue. Its upper your cost- efficiency and also the.
Cyber Security Mission Area Overview
Brian Thompson1,2, James Morris-King1,2, and Hasan Cam1
Group 18: Chris Hood Brett Poche
Using Ontologies to Quantify Attack Surfaces
System Center 2012 Configuration Manager
Center of Excellence in Cyber Security
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Brian Thompson1, James Morris-King1,2, and Hasan Cam1
DoD Cyberspace Workforce Definitions
Or how to learn to love the bomb
COSC 316: Host Computer Security
2014: the year so far in cyber security
Topological Vulnerability Analysis
بهترین راهکار را انتخاب کنید...
Determined Human Adversaries: Mitigations
When Security Games Go Green
DoD Cyberspace Workforce Definitions
Implementing Mapping Composition
Computer software 2.
Cybersecurity ATD Scenario conclusion
Database Administration
The CYBERWISER.eu project
Final Conference 18 Set 2018.
Determined Human Adversaries: Mitigations
Work Plan For 6LoWPAN Platform
Presentation transcript:

International Conference on Cyber Warfare and Security (ICCWS 2016) Effectiveness of Migration-based Moving Target Defense in Cyber Systems Noam Ben-Asher 1,2, James Morris-King 2, Brian Thompson 2, and William Glodek

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Moving Target Defense 2

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Platform Migration 3 OS: Windows 10 DBMS: Oracle WS: Microsoft IIS OS: Red Hat Linux DBMS: MySQL WS: Apache Tomcat

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Motivation The need for moving target defense (MTD) in cyber systems is increasingly being recognized, but its security and productivity impacts are not yet clearly understood The effectiveness of MTD is difficult to evaluate, and depends on the type of attack and the capabilities of the attacker 4

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Definitions & Model 5

Effectiveness of Migration-based Moving Target Defense in Cyber Systems OS: Red Hat Linux DBMS: MySQL WS: Apache Tomcat OS: ??????????? DBMS: MySQL WS: ???????????? Attacker Model 6 EXPLOITS RECON ATTACK FAILED

Effectiveness of Migration-based Moving Target Defense in Cyber Systems OS: Windows 10 DBMS: Oracle WS: Microsoft IIS OS: Windows 10 DBMS: Oracle WS: Microsoft IIS Defender Model 7 TIME TO MIGRATE! OS: Red Hat Linux DBMS: MySQL WS: Apache Tomcat PLATFORMS

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Model Parameters 8 Dimensions of Attacker Capabilities Recon Skill Arsenal Size Dimensions of Defender Capabilities Migration Rate Platform Diversity

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Problem Statement 9

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Migration Strategies Maximal Diversity: Select uniformly at random from all available platforms, without replacement Top-k Performers: Select uniformly at random from the k highest-performing platforms, without replacement Maximal Performance: Select the highest-performing platform and never migrate 10 Platform Diversity

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Experimental Setup 11

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Results: Maximal Performance 12 Reconnaissance skill Utility Arsenal size

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Results: Maximal Diversity 13 Reconnaissance skill Utility Arsenal size Migration rate

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Results: Top-k Performers 14 Reconnaissance skill Utility Arsenal size Migration rate

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Summary of Contributions We study the effectiveness of migration-based moving target defense under a more nuanced representation of attacker and defender behaviors and capabilities We develop a model of defender utility that captures the tradeoff between system security and performance when implementing platform migration defense We perform simulation experiments to evaluate the effectiveness of different migration strategies against attackers of varying capabilities 15

Effectiveness of Migration-based Moving Target Defense in Cyber Systems Future Work Consider cross-platform attacks or multi-stage attacks that maintain persistence when the system migrates Model the attacker’s acquisition of new exploits Allow learning from past observations, e.g. the attacker could learn the defender’s migration strategy, or the defender could learn which exploits are in the attacker’s arsenal 16

Effectiveness of Migration-based Moving Target Defense in Cyber Systems 17 Questions? Brian Thompson