Autonomous Network Alerting Systems and Programmable Networks

Slides:



Advertisements
Similar presentations
Slick: A control plane for middleboxes Bilal Anwer, Theophilus Benson, Dave Levin, Nick Feamster, Jennifer Rexford Supported by DARPA through the U.S.
Advertisements

Openflow App Security Chao SHI Stephen Duraski. Background Software-defined networking o Control plane abstraction o Abstract topology view o Abstraction.
SDN and Openflow.
Network Innovation using OpenFlow: A Survey
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Intrusion Detection Systems and Practices
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
A Survey on Interfaces to Network Security
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Software-Defined Networks Jennifer Rexford Princeton University.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Firewall Security.
Network security Product Group 2 McAfee Network Security Platform.
Module 7: Advanced Application and Web Filtering.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Presented By: Mohammed Al-Mehdhar Presentation Outline Introduction Approaches Implementation Evaluation Conclusion Q & A.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
SIEM Rotem Mesika System security engineering
Denial of Service Mitigation with OpenFlow using SciPass
SDN and Security Security as a service in the cloud
Instructor Materials Chapter 7: Network Evolution
SDN challenges Deployment challenges
CompTIA Security+ Study Guide (SY0-401)
Denial of Service detection and mitigation on GENI
Intrusion Detection Systems
University of Maryland College Park
Network Anti-Spoofing with SDN Data plane Authors:Yehuda Afek et al.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Author: Ragalatha P, Manoj Challa, Sundeep Kumar. K
Author: Daniel Guija Alcaraz
Introduction to Networking
Optical Networks & Smart Grid Lab.
CompTIA Security+ Study Guide (SY0-401)
A Novel Framework for Software Defined Wireless Body Area Network
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
CS 31006: Computer Networks – The Routers
Software Defined Networking (SDN)
Intrusion Detection & Prevention
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
DDoS Attack Detection under SDN Context
IS4680 Security Auditing for Compliance
Chapter 3 VLANs Chaffee County Academy
Final Conference 18 Set 2018.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
OpenSec:Policy-Based Security Using Software-Defined Networking
Intrusion Detection Systems
Intelligent Network Services through Active Flow Manipulation
Presentation transcript:

Autonomous Network Alerting Systems and Programmable Networks Dr. Ahmed AlEroud Department of Information Systems Yarmouk University, Jordan ahmed.aleroud@yu.edu.jo

Software Defined Networks Possible definitions: SDN is a new network architecture: That’s makes it easier to program networks. With the core idea that software remotely controls network hardware. SDN is a framework to allow network administrators to automatically and dynamically manage and control a large number of network devices, services, topology, traffic paths, and packet handling (quality of service) policies using high-level languages and APIs. SDN/OpenFlow have recently gained a lot of attention in the industry and the academia.

Software Defined Networks

Security Challenges Vs. opportunities in SDNs With the promise of programmable networks will come a with security challenges, including the need to protect the new network controller At the same time SDNs offer several mechanisms to protect against Cyber Attacks

SDN Misuse/Attack Cases

SDN architecture and Security Benefits Can be used for Data collection and Attack Detection Xia, W., et al., A survey on software-defined networking. IEEE Communications Surveys & Tutorials. 17(1): p. 27-51.

Unknown Attacks are on rise! https://www.hackmageddon.com/2019/01/15/2018-a-year-of-cyber-attacks/

Research Question Can we reduce the Risk of Unknown attacks Using Software Defined Networks?

Research Approach

Data Collection Communicate with the OpenFlow switches to make customized traffic queries and receive customized traffic that is requested from the network or the switches. Can be analyzed by existing Intrusion Detection Systems Attack signatures of Known attacks can be created

Detection of known Attacks Rule-based (Signature matching approach) Incoming connections are tested using attack profiles If No match is discovered, the connection is classified as Normal If Full match is discovered, the connection is labled as a Known attack If a partial match is discovered, then there is a probability of an unknown attack

Attack graphs to Discover unknown attack In each graph there is a single special node called target node (TAN) that represents the final objective of all steps Since each node is related to one or more vulnerabilities each of which has a Common Vulnerability (CVSS) score, nodes will be connected to the TAN node using such a score.

Discovering Unknown attacks If an event is found to be similar to one of the profiles 𝐴𝑃 𝑛 𝑖 ={ 𝑓 1 ,…., 𝑓 𝑚 } in the database , an alert is raised and the node 𝑛 𝑖 becomes active. After some time if another node 𝑛 𝑗 becomes active and such a node has a direct relation to TAN, the probability of compromising the target node 𝑃(𝑇𝐴𝑁) is denoted by 𝑃(𝑇𝐴𝑁) = 𝑠 ( 𝑛 𝑖 → 𝑛 𝑗 ) ∗ 𝑐𝑣𝑠𝑠 𝑛 𝑗 →TAN

Discovering Unknown attacks To model the “leaky” chances that 𝑇𝐴𝑁 may still occur without requiring 𝑛 𝑖 to be certainly true “leaky” parameters(LPs) are introduced. In particular, each node has an associated (enabling) influence to the TAN node. Such a parameter is represented by a probability value 𝑃(𝐿𝑃).

Discovering Unknown attacks Given such a probability which approximately equals the similarity between incoming activities and the signature of 𝑛 𝑖 the relation between 𝑛 𝑖 and 𝑛 𝑗 need to be modified as follows 𝑠′ ( 𝑛 𝑖 → 𝑛 𝑗 ) = 𝑠 ( 𝑛 𝑖 → 𝑛 𝑗 ) - (|1- 𝑠 ( 𝑛 𝑖 → 𝑛 𝑗 ) |× 𝑃(𝐿𝑃))   Given this formula the new probability 𝑃(𝑇𝐴𝑁) becomes 𝑃(𝑇𝐴𝑁) = 𝑠′ ( 𝑛 𝑖 → 𝑛 𝑗 ) ∗ 𝑐𝑣𝑠𝑠 𝑛 𝑗 →TAN

Eliminating the Risk of unknown Attack Using Open Flow Actions Table 1: Reducing the risk of zero-day attacks using some mitigation procedures in Open flow Architecture Mitigation procedure Value Traffic Redirection 𝑉 1 Traffic block 𝑉 2 Deep packet inspection 𝑉 3 Block port 𝑉 5 ….. 𝑉 𝑛 Procedure: Eliminating the risk of Unknown Attack Require 𝑔𝑟𝑎𝑝ℎ , 𝑀𝑃𝑠 For each detected path 𝑡 𝑙 to TAN For each 𝑡𝑟𝑖𝑔𝑔𝑒𝑟𝑑 𝐿𝑃𝑠 Select one or more 𝑀𝑃𝑠 depending on attack type For each selected 𝑀𝑃 𝑃 𝑇𝐴𝑁 =𝑃 𝑇𝐴𝑁 ∗(1− 𝑉 𝑀𝑃 ) // calculate the change in the 𝑃 𝑇𝐴𝑁 using 𝑉 𝑀𝑃𝑠 End For 𝑍𝐷 𝑒𝑓 =∆𝑃 𝑇𝐴𝑁 // the elimination in achieved on the probability of unknwn attack on path 𝑡 𝑙 End for End  

Experiments and Analysis Network topology used to generate suspicious and benign flows

Denial of Service Attack Scenarios

Datasets used for Experiments

Results

Conclusions We proposed a novel technique to mitigate unknown attacks on SDNs. Our approach is driven by Graph theory to identify such attacks on SDNs. We propose to design and implement algorithms for: Creation of attack graphs to identify unknown attacks using SDNs Initial Results Show that Our approach is very effective