Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin

Slides:



Advertisements
Similar presentations
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Advertisements

Introduction to Game Theory
Based on: Petri Nets and Industrial Applications: A Tutorial
EKONOMSKA ANALIZA PRAVA. Game Theory Outline of the lecture: I. What is game theory? II. Elements of a game III. Normal (matrix) and Extensive (tree)
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Cryptography and Network Security Chapter 20 Intruders
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Rational Learning Leads to Nash Equilibrium Ehud Kalai and Ehud Lehrer Econometrica, Vol. 61 No. 5 (Sep 1993), Presented by Vincent Mak
QR 38, 2/13/07 Rationality and Expected Utility I. Rationality II. Expected utility III. Sets and probabilities.
Network Security Testing Techniques Presented By:- Sachin Vador.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Design of an Intrusion Response System using Evolutionary Computation Rohit Parti.
Game Strategies in Network Security Kong-wei Lye and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.
Lecture 11 Intrusion Detection (cont)
Budhaditya Pyne BEE-IV Roll No: Jadavpur University.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
APA of Isfahan University of Technology In the name of God.
Chapter 2: The Research Enterprise in Psychology
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
MAKING COMPLEX DEClSlONS
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
A Novel Method for Formally Detecting RFID Event Using Petri Nets SEKE 2011.
AMNESIA: Analysis and Monitoring for NEutralizing SQL- Injection Attacks Published by Wiliam Halfond and Alessandro Orso Presented by El Shibani Omar CS691.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Honeypot and Intrusion Detection System
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Dynamic Games & The Extensive Form
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Web mining:a survey in the fuzzy framework
Modelling by Petri nets
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Designing Games for Distributed Optimization Na Li and Jason R. Marden IEEE Journal of Selected Topics in Signal Processing, Vol. 7, No. 2, pp ,
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
Optimal Defense Against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach Presenter: Wayne Hsiao Advisor: Frank, Yeong-Sung.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
Incident Response Christian Seifert IMT st October 2007.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Contents of the Talk Preliminary Materials Motivation and Contribution
(A CORPORATE NETWORK APPROACH)
Non-additive Security Games
Decision Trees (suggested time: 30 min)
Stochastic Activity Networks
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Equlibrium Selection in Stochastic Games
Presented by Yu-Shun Wang
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
M9302 Mathematical Models in Economics
Presentation transcript:

Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin Modeling and Security Analysis of Enterprise Network Using Attack-defense Stochastic Game Petri Nets Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin

Agenda Part I Introduction (Game Theory, Petri Net) Part II Model Part III Enterprise Network Part IV Analysis and Conclusion

Introduction Journal: Security and Communication Networks Security Comm. Networks 2013 Impact Factor: 0.414 Author: Yuanzhuo Wang(王卓元)

Introduction Enterprise network firewall, VPN, IDS/IPS, antivirus software, content monitoring prevent or to counteract attacks more effective

Introduction - ADSGN Stochastic Game Net Stochastic Petri Net ADSGN

Introduction - SGN Game Theory: Nash Equilibrium(NE) Limitations: do not have enough modeling abilities to describe interaction relations existing modeling methods are nearly impossible to model the dynamic behaviors because of the complexity of state transitions the full state space can be extremely large

Introduction- SGN Stochastic Game Nets: - use of the NE as part of the transition probabilities in SGN models - build player models => combine - backwards: attack and defense actions that are interrelated with one another

Introduction- Stochastic Petri Net Mathematical modeling languages directed bipartite graph nodes: transitions and places  transitions : events that may occur places: conditions The directed arcs describe which places are pre- and/or post conditions for which transitions occur.

Introduction- Stochastic Petri Net P is a set of states, called places. P = {P1,P2,P3,P4} T is a set of transitions. T = {T1,T2} M represents the number of tokens m0 ={1,0,2,1} Transition firing rates

Introduction - ADSGN According to the characteristics of the network attack and defense actions suitable to investigate the complex and dynamic game-related issues in network attack

Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion

Definition - Stochastic Game Nets Nine-tuple vector SGN: is the action set of player k

Definition1 - Stochastic Game Nets Nine-tuple vector SGN:

Definition - Stochastic Game Nets Nine-tuple vector SGN:

Definition - Stochastic Game Nets Each token S is assigned a reward vector h(s) = (h1(s), h2(s),. . .,hn(s)),where hk(s) is the reward of player k in token s Transition firing rates: consists of removing tokens from a subset of places and adding them to another subset

Definition - Stochastic Game Nets a strategy for player k is described as a vector

Definition2 - Stochastic Game Nets (p denotes the initial state of player k) An n-players game Player k’s utility is defined as:

Definition3 - Stochastic Game Nets NE is a vector such that

Definition3 - ADSGN Players: n => 2 administrator, attacker exist some transitions ti such that ti is no action

Theorem 1 - ADSGN For an ADSGN, if the two sets P and T contain finite elements, then there exists an NE under the setting of mixed strategies. P : places describe the states of the system

Modeling and analysis Reward values R represent the reward gained by the player when an action is completed

Construction First:) Players model => combine the models combining the places p that denote the same meanings in SGN models of different players: - case1 - case2

Construction – case1 Inhibition type

Construction – case2 Termination type

Utilities of players each players objective is to maximize the expected return k = 1, 2 is the initial place of strategy is the discount index of place

Utilities of players player k chooses an action using the probability distribution at place In order to determine the optimal defense strategy, we must find the NE

Calculation of the Nash Equilibrium Continuous ACO(CACO) For each place pi, the behavior is modeled as a matrix game Gi action sets of the attacker action sets of the administrator if an attack action is chosen in place pi , the intrusion is successful and undetected the system may transfer to another place pj where the game can continue

Calculation of the Nash equilibrium U(pi) to denote the expected utility at place pi

Calculation of the Nash equilibrium

Calculation of the Nash equilibrium objective function

Evaluation and analysis divide the place set into four parts, namely MTFSB: mean time to first security breach MTTSB: mean time to security breach

Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion

Enterprise network security process control structure

security process control structure Scan the weak ports (attacker) IDS detects the attack (administrator) Administrator server orders the firewall and trap node(administrator) The attacker enters the trap node(attacker) The trap node returns the false information to the attacker (administrator) obtain the evidence of the attacker (administrator)

security process control structure (7) cracks a common user’s user name and password (attacker) (8) The attacker gets the competence of root by handling the database (attacker) (9) The attacker installs the sniffer (attacker) (10) The administrator server orders the firewall and antivirus server to blockade the IP of the attacker and remove the sniffer (administrator)

security process control structure we have two action sets

security process control structure ADSGN model is based on the following three assumptions (1) the administrator does not know whether there is an attacker or not (2) the attacker may have several objectives and strategies that the defender does not know (3) not all of the attacker’s actions can be observe by the defender

ADSGN Model of Enterprise Network 在此model中有六個places {p(normal), p(web server with vulnerability), p(get general permission), p(get root permission), p(sniffer installing), p(information stolen)} = {p1, p2, p3, p4, p5, p6}

ADSGN Model of Enterprise Network p2: web server with vulnerability P3: get general permission a1:Scanvulnerability ; a2:CrackPassword a3:Attackdatabase ; a7:empty d1: IDSscan ; d2: Cheatattacker ; d3:Getevidence d6: empty

ADSGN Model of Enterprise Network p4: get root permission P5:sniffer installing a4: Enhance permission ;a5:Installsniffer a7:empty d1:IDSscan ; d4: Blockade IP d5:Removesniffer ; d6:empty

ADSGN Model of Enterprise Network p6:information stolen a6:Installsniffer ; a7:empty d1:IDSscan; d4:BlockadeIP d5: Remove sniffer ; d6: empty

Model-attacker

Model - administrator

Model - combine

Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion (MTTSB, MTTFB, attack rate)

Experimental Security Analysis

Experimental Security Analysis

Experimental Security Analysis

Experimental Security Analysis

Experimental Security Analysis

Conclusion Inherit the advantages of Petri nets and SGN investigate key factors of the attack and defense models, trying to find the inherent rules and patterns

Thanks for your attention