8.1 DISTRIBUTED COMPUTER SECURITY Dr. Yanqing Zhang, CSc 8320 Presented by Kireet Kokala © 2009 Georgia State University.

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

Issues Relevant To Distributed Security xuhong Zhang.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
LittleOrange Internet Security an Endpoint Security Appliance.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
seminar on Intrusion detection system
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Introduction to Honeypot, Botnet, and Security Measurement
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
BotNet Detection Techniques By Shreyas Sali
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Computer & Network Security
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
CSC8320. Outline Content from the book Recent Work Future Work.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
PAVANI REDDY KATHURI TRANSACTION COMMUNICATION. OUTLINE 0 P ART I : I NTRODUCTION 0 P ART II : C URRENT R ESEARCH 0 P ART III : F UTURE P OTENTIAL 0 R.
4.3 TRANSACTION COMMUNICATION Dr. Yanqing Zhang, CSc 8320 © 2009 Georgia State University Presented by Kireet KokalaKireet Kokala.
ACM 511 Introduction to Computer Networks. Computer Networks.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Network Monitoring.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Network Security Introduction
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
IS3220 Information Technology Infrastructure Security
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
CSc 8320 Advanced Operating Systems Chapter 8 Distributed Computer Security 8.1 Fundamentals of Computer Security FALL 2013 Instructor: Prof. Yanqing Zhang.
Botnets A collection of compromised machines
(A CORPORATE NETWORK APPROACH)
High Performance Computing Lab.
Botnets A collection of compromised machines
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Detection Detect the breach and protect the data. By,
Presentation transcript:

8.1 DISTRIBUTED COMPUTER SECURITY Dr. Yanqing Zhang, CSc 8320 Presented by Kireet Kokala © 2009 Georgia State University

O UTLINE P ART I : I NTRODUCTION o Brief Overview of Fundamentals P ART II : C URRENT R ESEARCH o Types of Attacks o Botnet Attack: detection and capacitance P ART III : F UTURE C YBER W ARFARE o Compromising Super-Grid computing security R EFERENCES Q & A 2 © 2009 Georgia State University

I : I NTRODUCTION [R. Chow & T. Johnson, 1997] Distributed System Security Dependable, robust, and secure systems uphold:  Secrecy – protection from unauthorized disclosure (info. leakage).  Integrity – protection from illegal access by unauthorized users.  Availability – system resources and functionality remain active for authorized users.  Reliability/Safety – fault tolerance mechanisms (i.e. both system and user) 3 © 2009 Georgia State University

I : I NTRODUCTION [R. Chow & T. Johnson, 1997] Distributed System Representation  Subjects: active entities that access objects  Objects: passive entities that must be protected Governed by  Access Control Policy: describes how objects are accessed by subjects  Flow Control Policy: regulates info flow between objects & subjects Basic Intrusion types: Denial of Service (DoS), Masquerading attack. Important step  packet and sensitive data sniffing. Ex: get started with Knoppix  Hakin9  PHLAK 4 © 2009 Georgia State University

I : I NTRODUCTION [Packet Analyzer, Wiki, 2009] Sniffing Overview 5 © 2009 Georgia State University

“The unexamined life is not worth living.” –Socrates “The examined life is painful.” –Malcolm X © 2009 Georgia State University

II : C URRENT R ESEARCH [R. Chow & T. Johnson, 1997] COMMON ATTACK TYPES [Botnets, Wiki, 2009]  Denial of Service: bombard the target machine with external communication requests  slow it down or make it ineffective.  Masquerading: one person or program successfully masquerades as another by falsifying data and gaining illegitimate access.  Botnet: network of compromised computers using distributed computing software. Botnet  Ex: Conficker targeted Windows machines server service. Detected in 2008 and growing well past 5 million PCs.  Est# bots is 10, 000, 000+ [Conficker, Wiki, 2009] 7 © 2009 Georgia State University

II : C URRENT R ESEARCH [] II : C URRENT R ESEARCH [Zhichun Li et. al, 2009] Botnet Detection  Still isn’t an exact science, but has large academic value and preventive measures that rise out of studying how the nodes connect and work.  Alarmingly large number of viruses, attacks, and security breaches are done via malware bots [ Brett Gross et. al, 2006 ].  Keep tabs on probing activities on websites to observe host-level of single instances of bot activities.  Their method requires local info and analytical knowledge about botnet properties and behavior. ***Detection comes with the caveat that with the click of a button, the botmaster/Bot herder/Warlock can switch bot routes or change probe patterns to blend in. © 2009 Georgia State University

II : A PPROACH [] II : A PPROACH [Zhichun Li et. al, 2009] 1. Statistical approaches to assess attributes of large-scale probing events— hit list detection. a.Subnet detection b.Dependency checking 2. Employ 2 algorithms: based on some assumptions, but allow them to infer the global scanning scope of a probing event. a.analysis of 293GB of Honeynet traffic data. © 2009 Georgia State University [Hiroshi Takemiya] [Hiroshi Takemiya et. al, 2006]Hiroshi TakemiyaHiroshi Takemiya et. al, 2006

II : A PPROACH [] II : A PPROACH [Zhichun Li et. al, 2009] Graphical overview of system architecture and results: distribution of malicious payload in scans. © 2009 Georgia State University

III : F UTURE P OTENTIAL A system is as strong as its weakest link. Analysis via simulation and practical experiments is key to facilitating system evolution! 11 © 2009 Georgia State University

III : F UTURE P OTENTIAL Ideas on how to compromise Super-Grid security? 12 © 2009 Georgia State University

III : F UTURE P OTENTIAL © 2009 Georgia State University Security Distributed systems laid across a heterogeneous array of hardware will help in the anti-malware initiative. Centralized Firewalls with real-time monitoring. Upgrading several W3 & IETF standards: TCP/IP, MIME type issues, etc. point to removing redundant ID misuse for transactions. Academic study of cyber-specific development helps understand the nature of complicated threats (viz. botnet). Attacks Attacks are moving away from known exploit-routes to taking on trusted sources for DoS type attacks. Dormant botnets evolve with time while awaiting instructions—an alarmingly growing number [Conficker, Wiki, 2009]. Consider mobile-botnets that are only limited to the number of devices allowed by IPv6 inception.

R EFERENCES [1] “Distributed Operating Systems & Algorithms”, Randy Chow and Theodore Johnson, [2] “Your Botnet is My Botnet: Analysis of a Botnet Takeover,” Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna, ACM, , [3] “A formal protection model of security in centralized, parallel, and distributed systems,” Glenn S. Benson, Ian F. Akyildiz, William F. Appelbe. ACM Transactions on Computer Systems, Vol 8, Issue 3, Pages: , [4] “Automating analysis of large-scale botnet probing events”, Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson, ASIAN ACM Symposium on Information, Computer and Communications Security, pages: 11-22, [5] “Sustainable adaptive grid supercomputing: multiscale simulation of semiconductor processing across the pacific,” Hiroshi Takemiya, Yoshio Tanaka, Satoshi Sekiguchi, Shuji Ogata, Rajiv K. Kalia, Aiichiro Nakano, Priya Vashishta, Conference on High Performance Networking and Computing archive Proceedings of the ACM, No. 106, [6] “Botnet”, [7] “Conficker”, 14 © 2009 Georgia State University

Q&AQ&AQ&AQ&A 15 © 2009 Georgia State University