Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Seidenberg School of Computer Science and Information Systems.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
SECURITY CHECK Protecting Your System and Yourself Source:
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Hands-On Ethical Hacking and Network Defense
Password?. Project CLASP: Common Login and Access rights across Services Plan
1 Telstra in Confidence Managing Security for our Mobile Technology.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
System and Network Security Practices COEN 351 E-Commerce Security.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Information Systems Seidenberg School of Computer Science.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lecture 11 Reliability and Security in IT infrastructure.
1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Stephen S. Yau CSE , Fall Security Strategies.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Incident Response Updated 03/20/2015
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Information Systems
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Web Server Administration Chapter 10 Securing the Web Environment.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
C8- Securing Information Systems
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
CSC-682 Advanced Computer Security Analyzing Websites for User-Visible Security Design Flaws Pompi Rotaru Based on an article by : Laura Falk, Atul Prakash,
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
1 Managing A Global Corporate Protection Infrastructure Jeannette Jarvis Association of Anti Virus Asia Researchers November 26, 2004.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Module 11: Designing Security for Network Perimeters.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Web SecurityIdentity Verification Services Signing Services Enterprise Security © 2007 GeoTrust, Inc. All rights reserved. How SSL is Changing to Increase.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Advanced Anti-Virus Techniques
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
Securing Information Systems
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Securing Information Systems
NAAS 2.0 Features and Enhancements
INTERNET SECURITY.
Presentation transcript:

Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Seidenberg School of Computer Science and Information Systems Pace University 03/15/08

© Li-Chiou Chen, CSIS, Pace 2 Agenda Past research projects in Internet-based attacks Ongoing research projects in security usability & web security Student research projects

© Li-Chiou Chen, CSIS, Pace 3 Interdisciplinary study in information assurance Technology domain: Security Technology Problem domain: Social, Economical and Policy Issues Research Methodology: Computational Modeling

© Li-Chiou Chen, CSIS, Pace 4 Countermeasures for the propagation of computer viruses Problem: What anti-virus strategy works better to slow down the propagation of a new computer virus Method:  Simulate the spread of computer viruses and countermeasures using agent-based simulation  Run on 4 different theoretical network topology and 2 different empirical network topology  Compare five different strategies  Propose a new one – Countermeasure competing (CMC) Past project - Computer viruses

© Li-Chiou Chen, CSIS, Pace 5 Results and further research issues Results - countermeasure propagation network is more effective than others when  this network has a few highly connected nodes like P2P networks  the rate of countermeasure propagation is faster than the rate of virus infection Further research  How about zero-day worms?  The same model can be used to discussed the diffusion of ideas, the diffusion of disease, etc Past project - Computer viruses

© Li-Chiou Chen, CSIS, Pace 6 Distributed denial-of-service (DDOS) attacks and defenses Past project - Distributed denial of service

A research framework for DDOS problems © Li-Chiou Chen, CSIS, Pace 7 Past project - Distributed denial of service

© Li-Chiou Chen, CSIS, Pace 8 Further research problems Defenses for attacks against infrastructures, such as routers and DNS servers Assessment of risk attitude of subscribers and providers  E.g., the premium that a subscriber would like to pay in order to avoid the risk of DDOS attacks Procedures for determining a liability assignment Past project - Distributed denial of service

© Li-Chiou Chen, CSIS, Pace 9 Security usability of banking web sites What is usability? Problems:  Phishing: users can distinguish legitimate web sites from phishing web sites  a security usability problem of web interface design  What is the status quo?  What can we improve from here? Ongoing project – Security Usability

How do you distinguish legitimate web sites from fake ones © Li-Chiou Chen, CSIS, Pace 10 Ongoing project – Security Usability

Banking web site survey Top 100 banks from FDIC (Federal Deposit Insurance Corporation) Institution Directory Database Examine the login page of each online banking web site Three types of information  Security indicators: HTTPS, lockpad, security seal  Security certificate: common name, organization name, SSL version, cipher, validity  Site security information: security guide, phishing info, lock next to login Tools: Openssl library, awk, Linux shell programs © Li-Chiou Chen, CSIS, Pace 11 Ongoing project – Security Usability

Confusing login interfaces Company web site redirect to a secure server with a login page SSL is negotiated after users enter user name and password Popup windows for login The little secure lock next to login screen has a different meaning in different sites  Some have no links, some link to security information, some change the interface to show security indicators, some connects to 3 rd party certification © Li-Chiou Chen, CSIS, Pace 12 Ongoing project – Security Usability

Preliminary Results Number Percentage of total servers surveyed Banking Secure Servers Surveyed80 Login page without certificate padlock and https 19 24% Popup window used for login3 4% Invalid certificate1 1% Bank name is inconsistent with subject name11 14% outsourcing6 8% bank holding company name5 6% © Li-Chiou Chen, CSIS, Pace 13 Ongoing project – Security Usability

Cipher exchanged is not always the most secure one © Li-Chiou Chen, CSIS, Pace 14 Cipher SuiteNumber of Servers Percentage of the total server surveyed AES256-SHA13 16% DES-CBC3-SHA4 5% DHE-RSA-AES256-SHA6 8% RC4-MD551 64% RC4-SHA6 8% Total80100% Ongoing project – Security Usability

Long validation period might give certificate longer period to be exploited Validity durationNumberPercentage < 2 years5670% =2 years2025% >=3 years 4 (3 of them are between 3-4 years and one is 5 years) 5% Total80100% © Li-Chiou Chen, CSIS, Pace 15 Ongoing project – Security Usability

Implications Invalid security certificates: should not be there; defy anti-phishing tools Establish SSL connection after user enters username and password: no way to verify security indicator before login Inconsistent domain name with brand name: 3 rd party secure servers; using domain name checking strategy fails Confusing security indicators: multiple indicators, etc Confusing security information : consumers do not know which one to follow or look at Confusing login visual interface design: popup windows; may suffer visual deception attack Industry common practice do not echo the best available technology: vulnerability with the older versions © Li-Chiou Chen, CSIS, Pace 16 Ongoing project – Security Usability

Further research problems Align consumer trust and security on the web Security usability scanner Solve phishing problems from risk management perspectives, where should government put money and resources? Risk identification, reduction, or mitigation © Li-Chiou Chen, CSIS, Pace 17 Ongoing project – Security Usability

© Li-Chiou Chen, CSIS, Pace 18 Student Research Projects Joseph Acampora –MS in IS  XML-DNR: A Bandwidth-Saving Technique for Distributed Intrusion Detection Systems Yosef Lehrman – MS in IT  Client-side solutions for phishing prevention Konrad Koenig  Analyzing access control policies of banking data using Secure UML Alex Tsekhansky - DPS  Byzantine fault tolerant DNS for networks with limited PKI infrastructure Student projects