Can Network Security be Fun? An agent-based Simulation Model and Game Proposal "A computer lets you make more mistakes faster than any invention in human.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Software Frame Simulator (SFS) Technion CS Computer Communications Lab (236340) in cooperation with ECI telecom Uri Ferri & Ynon Cohen January 2007.
System Security Scanning and Discovery Chapter 14.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Student Projects in Computer Networking: Simulation versus Coding Leann M. Christianson Kevin A. Brown Cal State East Bay.
Meaningful Learning in an Information Age
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
PROS & CONS of Proxy Firewall
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Intranet, Extranet, Firewall. Intranet and Extranet.
The use of ‘exploratory learning’ for supporting immersive learning in virtual environments Freitas, S. d. & Neumann, T. (2009). The use of ‘ exploratory.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Computer-Based Training Methods
Honeypot and Intrusion Detection System
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Internet and Intranet Fundamentals Class 9 Session A.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
GemIsland Prepared by: Areen Jondi Diala Hamadneh Supervised by: Dr. Raed Alqadi Dr. Luai Malhis.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
Server Performance, Scaling, Reliability and Configuration Norman White.
Module 11: Designing Security for Network Perimeters.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
2D Game Programming with XNA 4.0. Principles of Game Programming Game Programming Basics Mouse & Keyboard Controls Sounds Sprites and Animation Collision.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
CompTIA Security+ Study Guide (SY0-401)
Computer Data Security & Privacy
CompTIA Security+ Study Guide (SY0-401)
Chapter 16: Distributed System Structures
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Design Unit 26 Design a small or home office network
ECEN “Internet Protocols and Modeling”
Soar Agents for Cyberspace 5/15/2018
Firewalls Jiang Long Spring 2002.
Presentation transcript:

Can Network Security be Fun? An agent-based Simulation Model and Game Proposal "A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila“ -Mitch Ratcliffe Frode Gilberg

Problem Too often, security topics are learned through experience (learning by burning) Large scale attacks are often initiated by computers in private- and home- networks Improved awareness is needed We need a training tool that could motivate people to learn more about network security People typically don’t look for litterature to improve their knowledge Educational tools are often hard to find

Research Questions We want to investigate how a game on network security should look like, and; how this game can be built using a model (design) for agent-based simulation, with agents as network nodes and virtual users, and; finally, the performance of such a model (scalability – the number of agents that can be simulated), alternatively collect feedback to measure the validity and enjoyment of the game (tool).

What makes things fun to play? T.W.Malone’s paper from 1980 – Challenge (goal, uncertain outcome, self-esteem) – Fantasy (intrinsic and extrinsic fantasies, emotional aspects of fantasies) – Curiosity (sensory curiosity, cognitive curiosity) Flow and GameFlow – Mihaly Csikszentmihalyi (Flow:1990) – P. Sweetser/P. Wyeth (GameFlow:2005)

Flow and GameFlow “Flow is an experience so gratifying that people are willing to do it for its own sake, with little concern for what they will get out of it, even if it is difficult or dangerous” GameFlow review criterias to measure flow-ability in games; – Concentration (one should be able to concentrate on a task) – Challenge (levels should match skills) – Player Skills (skill development and mastery) – Control (a sense of control over actions) – Clear Goals (clear and presented) – Feedback (appropriate feedback toward the goal) – Immersion (deep and effort less involvemnt, sense of time) – Social Interaction (competition and cooperation)

Simulation Games The Sim City series – Play the Mayor and urban-planner of a city The Rollercoaster Tycoon series – Play the Theme park manager CyberCIEGE – Play the IT manager of an IT-dependent company with focus on graphics, security policies and instructions. Our Game – Like CyberCIEGE, but with focus on agent-based network simulation. ”Construction” ideas from Sim City and RollerCoaster Tycoon.

Sim City Demo

RollerCoaster Tycoon

Agent-based simulation model Simulating network componets (like rides/buildings) – Model content (agents): Switches, Routers, Clients, Servers, Firewalls, Processes/Threads, Sockets, TCP states, Routing, Address resolution – More details => Complex state => More real-life events – Disadvantage: Performance. Scalability is important(!) Simulating Users – Different characteristics and preferences – Different awarness, work- and equipment- efficiency characteristics

We need Physical communication end-points (hosts) Logical communication end-points (sockets/processes) Application protocol logic A volatile state mechanism (memory) A non-volatile state mechanism (file system) Users that create tasks using preferences => instantiation of processes => running software defined logic in threads => directing sockets to communicate

Queues and packets Using IP/ARP to address hosts on the same packets, and IP/Forwarding for cross-net communication

Hosts, Routers and Firewalls (agents)

Internet and Sites Player objective is to build and configure networks with appropriate equipment, applications and service configurations (public and/or intranet services). The player controls the local site Remote users and public services are located at remote sites (not controlled by player). Remote sites are simulated in the same way as the local site (realism) An Internet-agens is used to transfer packets between sites. Within sites, IP routing is used

Attacks Script-kiddie tools targeting public and private services Malware and viruses. Built as procedures and executed as threads in its own process (malware) or an infected process (virus). Can change any host-state parameter (both volatile and non-volatile). Vulnerabilities and Exploits Spam

Countermeasures Design principles including host-hardening (first line of defence) Anti-virus software Backup-tools Patching Spam-filters Routing and Firewall configuration

Features Modeled using OOAD (object oriented analysis and design) and pattern techniques Implemented from scratch using C# and the Microsoft.NET 2.0 framework Simulation kernel running multiple threads Currently running 600+ hosts and routers with no problem

Contribution Gaming tool to teach network security topics Software kernel for application that need to run network and attack simulations Can be used to protocol testing Can be used to create new ideas on easy user-interface design which could reduce complexity and improve security Etc...

Simposter DEMO