Effective Countermeasures Against Emerging Threats in the Future Internet Salvatore D’Antonio Consorzio Interuniversitario Nazionale per l’Informatica.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
DESEREC, an ICT for Trust and Security project DESEREC: Dependability and Security by Enhanced Reconfigurability.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 IS 8950 Managing Network Infrastructure and Operations.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
SECURE –FORCE Project Christodoulos Keratidis Atlantis Consulting S.A. 1 st SEE-INNOVATION Know How Event Skopje, December 2006.
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Cryptography and Network Security (CS435) Part One (Introduction)
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Azam Supervisor : Prof. Raj Jain
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Paul Beraud, Alen Cruz, Suzanne Hassell, Juan Sandoval, Jeffrey J Wiley November 15 th, 2010 CRW’ : NETWORK MANEUVER COMMANDER – Resilient Cyber.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
IS3220 Information Technology Infrastructure Security
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
EU sponsored ICT R&D projects – examples, SME’s view point, lessons learnt Witold Hołubowicz ITTI Ltd. and A.Mickiewicz University Poznań,
[ [ Inter-Trust Interoperable Trust Assurance Infrastructure Project Presentation.
SECURE EUROPEAN COMMON INFORMATION SPACE FOR THE INTEROPERABILITY OF FIRST RESPONDERS AND POLICE AUTHORITIES Welcome to SECTOR Elena Francioni – e-GEOS.
ASSET - Automotive Software cyber SEcuriTy
Presentation transcript:

Effective Countermeasures Against Emerging Threats in the Future Internet Salvatore D’Antonio Consorzio Interuniversitario Nazionale per l’Informatica Canada-EU Future Internet Workshop March 23-24, 2011 – Waterloo, Canada

EC Grant Agreement n Project overview –IN-TE-R-SE-C-T-I-O-N : INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks –ICT Call 1 of Seventh Framework Programme (FP7) –Work programme topic addressed Challenge 1: Pervasive and Trusted Network and Service Infrastructures Objective ICT : Secure, dependable and trusted infrastructures –Start date: January 1st, 2008 –Duration: 24 months

EC Grant Agreement n Security and resilience in network infrastructures –Design of scalable, secure and resilient network architectures in order to enable dynamic management policies ensuring end–to-end secure data transmission and service provisioning across heterogeneous infrastructures and networks; real time detection and recovery capabilities against intrusions, malfunctions and failures Trusted computing infrastructures –Design of computing infrastructures enabling interoperability and end-to-end security in order to ensure the design and development of trustworthy applications and services Context

EC Grant Agreement n The Consortium ACADEMY Consorzio Interuniversitario Nazionale per l’Informatica [Italy] Lancaster University [UK] Fraunhofer Gesellschaft Zur Foerderung Der Angewandten Forschung [Germany] Eidgenoessische Technische Hochschule Zuerich [Switzerland] INDUSTRY Elsag Datamat (Coordinator) [Italy] Thales Research and Technology [UK] ITTI (SME) [Poland] END USERS Telefonica ID Investigación y Desarollo [Spain] Telespazio [Italy] Polska Telefonia Cyfrowa [Poland] ACADEMY Consorzio Interuniversitario Nazionale per l’Informatica [Italy] Lancaster University [UK] Fraunhofer Gesellschaft Zur Foerderung Der Angewandten Forschung [Germany] Eidgenoessische Technische Hochschule Zuerich [Switzerland] INDUSTRY Elsag Datamat (Coordinator) [Italy] Thales Research and Technology [UK] ITTI (SME) [Poland] END USERS Telefonica ID Investigación y Desarollo [Spain] Telespazio [Italy] Polska Telefonia Cyfrowa [Poland]

EC Grant Agreement n Project motivation

EC Grant Agreement n Heterogeneous networks Networks based on different low-level protocols (physical, data link) A data network composed of devices from different manufacturers and/or different types of LANs A heterogeneous network is a network connecting computers and other devices with different operating systems and/or protocols, services and applications Interconnection of different type of networks relying on different communication technologies Interconnection of networks managed by different telecom operators adopting diverse security policies

EC Grant Agreement n Identify and classify the vulnerabilities of heterogeneous and interconnected network infrastructures (wired, wireless, satellite, mobile networks) Create and maintain a network vulnerability database Design and implement an integrated network security framework including different components and tools: –detecting anomalous events –reacting to well-known, as well as new kinds of anomalies –deploying truly distributed countermeasures against ongoing attacks –providing systems with mechanisms for intrusion tolerance, i.e. preventing intrusions from generating a system failure Main objectives

EC Grant Agreement n INTERSECTION Vulnerability Database

EC Grant Agreement n The INTERSECTION framework

EC Grant Agreement n Remediation Reaction Detection Visualization Network Monitoring The real-time intrusion detection and tolerance system

EC Grant Agreement n The INTERSECTION Intrusion Detection System E v e n t B u s

EC Grant Agreement n Stealth attacks –“minimize the cost to and visibility of the attacker but which are about as harmful as brute force attacks” (wireless) – M. Jakobsson et al., Stealth Attacks on Ad Hoc Wireless Networks, 2003 –“become invisible (or at least very difficult to detect) to network-based defences” – A. D. Keromytis et al., Defending Against Next Generation through Network/Endpoint Collaboration and Interaction, 2007 Use case: detection of stealth attacks

EC Grant Agreement n Good candidate as Stealth Attack –“The low-rate attack raises serious concern because it can be significantly harder to detect than more traditional brute-force, flooding style attacks” – H. Sun et al., Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection, 2004 –“low-rate denial of service attacks, unlike high-rate attacks, are difficult for routers and counter-DoS mechanisms to detect” – E. Knightly et al., Low-rate TCP- targeted denial of service attacks and counter strategies, 2006 Low-rate DoS attack

EC Grant Agreement n Short traffic bursts –maliciously chosen duration –maliciously chosen low frequency Evade rate-controlling detection mechanisms Periodically keeps the network very busy Influences the TCP congestion control mechanisms of hosts sharing network segments between the attacker and the attack target Throttles other TCP flows' rate far below their ideal value Detection of stealth attacks

EC Grant Agreement n Generate traffic traces including low-rate attacks –Shrew attack tools Define traffic metrics for behavioural modelling –Statistical parameters Extract behaviour patterns for attack classification Machine learning algorithms Detection approach

EC Grant Agreement n Feature vectors computation through traces processing –Ad-hoc developed Snort plug-in Feature vectors classification Traffic model extraction by means of several supervised machine learning algorithms –Decision Tree J48 –SVM –Bayesian Network –Boosting Model extraction

EC Grant Agreement n The INTERSECTION demonstrator

EC Grant Agreement n Contacts Website : Information : Project Coordinator: Stefano Vertechi Technical Coordinator : Salvatore D’Antonio Networking Station EU-Canada Future Internet Workshop