Metrics-Focused Analysis of Network Flow Data

Slides:



Advertisements
Similar presentations
© 2008 Oracle Corporation – Proprietary and Confidential.
Advertisements

The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Carnegie Mellon University Software Engineering Institute CERT® Knowledgebase Copyright © 1997 Carnegie Mellon University VU#14202 UNIX rlogin with stack.
© 2013 Carnegie Mellon University UFO: From Underapproximations to Overapproximations and Back! Arie Gurfinkel (SEI/CMU) with Aws Albarghouthi and Marsha.
UNCLASSIFIED © 2011 Carnegie Mellon University Building Malware Infection Trees Jose Andre Morales 1, Michael Main 2, Weilang Luo 3, Shouhuai Xu 2,3, Ravi.
© 2014 Microsoft Corporation. All rights reserved.
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
© 2011 Carnegie Mellon University System of Systems V&V John B. Goodenough October 19, 2011.
Two-tiered, Multi-team Assessment of CSIRTs
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
© 2013 Carnegie Mellon University Measuring Assurance Case Confidence using Baconian Probabilities Charles B. Weinstock John B. Goodenough Ari Z. Klein.
© Carnegie Mellon University The CERT Insider Threat Center.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2011 Carnegie Mellon University Should-Cost: A Use for Parametric Estimates Additional uses for estimation tools Presenters:Bob Ferguson (SEMA) Date:November.
© 2011 Carnegie Mellon University QUELCE: Quantifying Uncertainty in Early Lifecycle Cost Estimation Presenters:Dave Zubrow PhD Bob Ferguson (SEMA) Date:November.
© 2015 Carnegie Mellon University Software Engineering Institute Carnegie Mellon University Pittsburgh, PA A Cognitive Study of Incident Handling.
Jul The New Geant4 License J. Perl The New Geant4 License Makes clear the user’s wide- ranging freedom to use, extend or redistribute Geant4, even.
Ipek Ozkaya, COCOMO Forum © 2012 Carnegie Mellon University Affordability and the Value of Architecting Ipek Ozkaya Research, Technology.
© 2010 Carnegie Mellon University Team Software Process.
Conditions and Terms of Use
Cassio Goldschmidt June 29 th, Introduction 2.
1  Ex Libris Ltd., Internal and Confidential Primo DPHT Spring Meeting | March 2012 Ido Peled, Primo Product Manager.
© 2014 The MITRE Corporation. All rights reserved. "Approved for Public Release; Distribution Unlimited " Using Probabilistic Data for Strategic.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Receipts.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Author Software Engineering Institute
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
1 IX. Managing Funds & Payments Invoicing Workflows.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
© 2015 Carnegie Mellon University COCOMO 2015 November 17, 2015 Distribution Statement A: Approved for Public Release; Distribution is Unlimited Causal.
1 PDA Management in Alma Network Zone. 2 Copyright Statement All of the information and material inclusive of text, images, logos, product names is either.
Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware Part VIII – Transaction Taxes in Payables.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
RTAS 2014 Bounding Memory Interference Delay in COTS-based Multi-Core Systems Hyoseung Kim Dionisio de Niz Bj ӧ rn Andersson Mark Klein Onur Mutlu Raj.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
1 CERT BFF: From Start To PoC June 09, 2016 © 2016 Carnegie Mellon University This material has been approved for public release and unlimited distribution.
1 Parsing call numbers for labels Yoel Kortick Senior Librarian.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
Data Science: What It Is and How It Can Help Your Company
A Scorecard for Cyber Resilience: What We Have Observed
Secure Software Workforce Development Panel Session
Low Hanging Fruit Tastes Just as Good
David Svoboda & Aaron Ballman
Software Configuration Management
Author Software Engineering Institute
Temporal Protection in Real-Time Systems
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Interview Process Skills Evaluation, Hire & On-Board Positions
Automation in an XML Authoring Environment
A Proposed New Standard: Common Privacy Vulnerability Scoring System (CPVSS) Jonathan Fox, Privacy Office/PDIT Harold A. Toomey, PSG/ISecG Jason M. Fung,
QUELCE: Quantifying Uncertainty in Early Lifecycle Cost Estimation
Dynamic Cyber Training with Moodle
Presentation Title Presenter(s) name(s) and job title(s), if needed
PLACEHOLDER FOR YOUR LOGO
Gas Well Deliquification Breakout Session
Secure WNM Requirements
Gas Well Deliquification Breakout Session
Presentation Title Presenter(s) name(s) and job title(s), if needed
Gas Well Deliquification Breakout Session
PLACEHOLDER FOR YOUR LOGO
Gas Well Deliquification Breakout Session
Presentation Title Presenter(s) name(s) and job title(s), if needed
Gas Well Deliquification Breakout Session
The Software Dilemma Ceci Albert.
Developing Useful Metrics
Presentation transcript:

Metrics-Focused Analysis of Network Flow Data Timothy Shimeall, Ph.D.

Distribution Statements Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center sponsored by the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. CERT Coordination Center® and FloCon® are registered marks of Carnegie Mellon University. DM-0004323

Overview Security Content Automation Protocol (SCAP) Network Management Metrics Focused Analysis

Security Content Automation Protocol Common Vulnerability Enumeration Identity Severity score (CVSS) Systems affected Common Checklist Enumeration Checklist items Common Platform Enumeration http://nvd.nist.gov/

Network Management Metrics Homogeneity (fraction of hosts made up by most common configuration) Out-of-date (fraction of hosts in use that are no longer supported) Modification rate of platforms Arrival rate of platforms Arrival rate of vulnerabilities Departure rate of vulnerabilities Recurrence of vulnerabilities Arbaugh W., Fifthen, W., McHugh, J. “Windows of Vulnerability, A Case Study Analysis.” IEEE Computer. December 2000. pp. 52-59.

Example 1: Assessing Patch Efficiency Patch Efficiency – mitigations are applied for significant (serious and exploitable) vulnerabilities prior to exploitation Metrics: Modification rate of platforms Arrival rate of vulnerabilities Departure rate of vulnerabilities Flow Analysis: Response to scanning Bytes/Packet/Second classification Service abnormalities Campbell, G. “MEASURES and METRICS In CORPORATE SECURITY.” Security Executive Council Publication Series. January 2008.

Example 2: Quantifying Vulnerability Exposure Vulnerability exposure – Probable loss associated with vulnerabilities in a given network service Metrics: Arrival rate of vulnerabilities Departure rate of vulnerabilities Recurrence of vulnerabilities Flow Analysis: Filter by service Bytes/packet/second clustering Responses to scanning Service baseline use Compare to overall network usage

Example 3: Measuring APT Vulnerability Advanced Persistent Threat Vulnerability: opportunities for threats to exploit collateral vulnerabilities between units within the organization to penetrate and establish permanency in local networks. Metrics: CVSS scoring Common vulnerability prevalence between units Arrival rate of vulnerabilities Flow Analysis: Response to scanning Usage of vulnerable services between units Measuring dependencies between units Mateski, M. et. al. “Cyber Threat Metics.” Technical Report SAND2012-2427. Sandia National Labs. March 2012.

Summary Pivoting between data can enable advanced analysis Metrics focus the interaction Configuration information for structural view Traffic information for dependency view Combined information for threat view