CSCE 727 Cyber Attacks and Risk Management. CSCE 727 - Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge High Low 1980198519901995 2000.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Chapter 1 – Introduction
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Lecture 11 Reliability and Security in IT infrastructure.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
APA of Isfahan University of Technology In the name of God.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
CSCE 727 Cyber Attacks and Risk Management. CSCE Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge From:
COEN 252 Computer Forensics
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Cryptography and Network Security
BUSINESS B1 Information Security.
Lecture 1 Introduction Basic Security Concepts
What does “secure” mean? Protecting Valuables
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Computer Security: Principles and Practice
Computer & Network Security
C8- Securing Information Systems
COEN 252 Computer Forensics Collecting Network-based Evidence.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
CSC8320. Outline Content from the book Recent Work Future Work.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Cryptography and Network Security Sixth Edition by William Stallings.
Computer Security By Duncan Hall.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network security Vlasov Illia
Threat Modeling for Cloud Computing
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Intrusion Control.
Secure Software Confidentiality Integrity Data Security Authentication
Legal and Ethical Issues in Computer Security
CSCE 548 Secure Software Development Test 1 Review
Security in Networking
INFORMATION SYSTEMS SECURITY and CONTROL
Intrusion Detection Systems
Intrusion Detection system
Network Security Ola Flygt Växjö University
Cyber Security For Civil Engineering
Basic Security Concepts
Presentation transcript:

CSCE 727 Cyber Attacks and Risk Management

CSCE Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Staged attack Copyright: CERT, 2000

CSCE Farkas3 Attack Sophistication vs. Intruder’s Technical Knowledge From:

Attack Trend CSCE Farkas4

5 Reading Required: Denning Chapter 8, 9, 14 Hutchins et al, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, White paper, ocuments/LM-White-Paper-Intel-Driven-Defense.pdfhttp:// ocuments/LM-White-Paper-Intel-Driven-Defense.pdf Interesting Reading: DHS repairing internal security operations, Homeland Security News Wire, April 9, 2014, dhs-repairing-internal-security-operationshttp:// dhs-repairing-internal-security-operations Student develops new way to detect hackers, Homeland Security News Wire, April 9, 2014, student-develops-new-way-to-detect-hackershttp:// student-develops-new-way-to-detect-hackers Measuring smartphone malware infection rates, Homeland Security News Wire, April 9, 2014, measuring-smartphone-malware-infection-rateshttp:// measuring-smartphone-malware-infection-rates

CSCE Farkas6 Attack Internet Engineering Task Force: RFC 2828: “ An assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of the system.”

CSCE Farkas7 Normal Flow Information source Information destination

CSCE Farkas8 Interruption Information source Information destination Asset is destroyed of becomes unavailable - Availability Example: destruction of hardware, cutting communication line, disabling file management system, etc.

CSCE Farkas9 Interception Information source Information destination Unauthorized party gains access to the asset – Confidentiality Example: wiretapping, unauthorized copying of files

CSCE Farkas10 Modification Information source Information destination Unauthorized party tampers with the asset – Integrity Example: changing values of data, altering programs, modify content of a message, etc.

CSCE Farkas11 Fabrication Information source Information destination Unauthorized party insets counterfeit object into the system – Authenticity Example: insertion of offending messages, addition of records to a file, etc.

CSCE Farkas12 Phases of Attack Improve detection by examining which “phase” an intruder’s behavior is identified Attack phases: – Intelligence gathering: attacker observes the system to determine vulnerabilities – Planning: attacker decide what resource to attack (usually least defended component) – Attack: attacker carries out the plan – Inside the system: Hiding: attacker covers tracks of attack Future attacks: attacker installs backdoors for future entry points

CSCE Farkas13 Passive Attack “Attempts to learn or make use of information from the system but does not affect system resources” (RFC 2828) Sniffer

CSCE Farkas14 Sniffers All machines on a network can “hear” ongoing traffic A machine will respond only to data addressed specifically to it Network interface: “promiscuous mode” – able to capture all frames transmitted on the local area network segment

CSCE Farkas15 Risks of Sniffers Serious security threat Capture confidential information – Authentication information – Private data Capture network traffic information

CSCE Farkas16 Passive attacks Interception (confidentiality) Disclosure of message contentsTraffic analysis

CSCE Farkas17 Disclosure of message content Intruder is able to interpret and extract information being transmitted Highest risk:authentication information – Can be used to compromise additional system resources

CSCE Farkas18 Traffic Analysis Intruder is not able to interpret and extract the transmitted information Intruder is able to derive (infer) information from the traffic characteristics

CSCE Farkas19 Protection Against Passive Attacks Shield confidential data from sniffers: cryptography Disturb traffic pattern: – Traffic padding – Onion routing Detect and eliminate sniffers

CSCE Farkas20 Detection of Sniffer Tools Difficult to detect: passive programs Tools: – Promisc – Linux – cmp – SunOS 4.x: detects promiscuous mode – AntiSniff (L0pht Heavy Industries, Inc. ): remotely detects computers that are packet sniffing, regardless of the OS Interesting read: S. Truth, How to Test for Sniffing Vulnerabilities, weekly/blog/bid/63274/How-to-Test-for-Sniffing- Vulnerabilitieshttp://web.securityinnovation.com/appsec- weekly/blog/bid/63274/How-to-Test-for-Sniffing- Vulnerabilities

CSCE Farkas21 Active attacks “Attempts to alter system resources of affect their operation” (Internet Enginering Task Force, RFC 2828)

CSCE Farkas22 Active attacks InterruptionModificationFabrication DOS, DDOS(integrity) (integrity) (availability) ReplayMasquarade(Authentication)

CSCE Farkas23 Protection against DoS, DDoS Hard to provide full protection Some of the attacks can be prevented – Filter out incoming traffic with local IP address as source – Avoid established state until confirmation of client’s identity Internet trace back: determine the source of an attack

CSCE Farkas24 Degradation of Service Do not completely block service just reduce the quality of service

CSCE Farkas25 Intrusion Control It is better to prevent something than to plan for loss. Problem: Misuse happens!

CSCE Farkas26 Need: Intrusion Prevention: protect system resources Intrusion Detection: (second line of defense) identify misuse Intrusion Recovery: cost effective recovery models

CSCE Farkas27 Intrusion Prevention First line of defense Techniques: cryptography, identification, authentication, authorization, access control, security filters, etc. Not good enough (prevention, reconstructions)

CSCE Farkas28 Intrusion Detection System (IDS) Looks for specific patterns (attack signatures or abnormal usage) that indicate malicious or suspicious intent Second line of defense against both internal and external threats See recommended reading!

CSCE Farkas29 Intrusion Detection Systems Deter intruders Catch intruders Prevent threats to fully occur (real-time IDS) Improve prevention techniques IDS deployment, customisation and management is generally not trivial See required reading!

CSCE Farkas30 Audit-Based Intrusion Detection Intrusion Detection System Audit Data Profiles, Rules, etc. Decision Need: Audit data Ability to characterize behavior

CSCE Farkas31 Audit Data Format, granularity and completeness depend on the collecting tool Examples – System tools collect data (login, mail) – Additional collection of low system level – “Sniffers” as network probes – Application auditing Honey Net Needed for – Establishing guilt of attackers – Detecting suspicious user activities

CSCE Farkas32 Audit Data Accuracy Collection method – System architecture and collection point – Software and hardware used for collection Storage method – Protection of audit data Sharing – Transmission protection and correctness – Availability

CSCE Farkas33 IDS Categories 1.Time of data analysis Real-time v.s. off-the-line IDS 2.Location where audit data was gathered Host-based v.s. network-based v.s. hybrid 3.Technique used for analysis Rule-based v.s. statistic-based 4.Location of analysis Centralized, distributed, network-based 5.Pattern IDS looking for Misuse v.s. anomaly-based v.s. hybrid

CSCE Farkas34 Intrusion Recovery Actions to avoid further loss from intrusion Terminate intrusion and protect against reoccurrence Law enforcement Enhance defensive security Reconstructive methods based on: – Time period of intrusion – Changes made by legitimate users during the effected period – Regular backups, audit trail based detection of effected components, semantic based recovery, minimal roll- back for recovery.

CSCE Farkas35 What is “Survivability”? To decide whether a computer system is “survivable”, you must first decide what “survivable” means.

36 Risk Assessment RISK Threats VulnerabilitiesConsequences

37 Real Cost of Cyber Attack Damage of the target may not reflect the real amount of damage Services may rely on the attacked service, causing a cascading and escalating damage Need: support for decision makers to – Evaluate risk and consequences of cyber attacks – Support methods to prevent, deter, and mitigate consequences of attacks

38 Risk Management Framework (Business Context) Understand Business Context Identify Business and Technical Risks Synthesize and Rank Risks Define Risk Mitigation Strategy Carry Out Fixes and Validate Measurement and Reporting

39 Understand the Business Context “Who cares?” Identify business goals, priorities and circumstances, e.g., – Increasing revenue – Meeting service-level agreements – Reducing development cost – Generating high return investment Identify software risk to consider

40 Identify Business and Technical Risks “Why should business care?” Business risk – Direct threat – Indirect threat Consequences – Financial loss – Loss of reputation – Violation of customer or regulatory constraints – Liability Tying technical risks to the business context in a meaningful way

41 Synthesize and Rank the Risks “What should be done first?” Prioritization of identified risks based on business goals Allocating resources Risk metrics: – Risk likelihood – Risk impact – Risk severity – Number of emerging risks

42 Define the Risk Mitigation Strategy “How to mitigate risks?” Available technology and resources Constrained by the business context: what can the organization afford, integrate, and understand Need validation techniques

43 Carry Out Fixes and Validate Perform actions defined in the previous stage Measure “completeness” against the risk mitigation strategy – Progress against risk – Remaining risks – Assurance of mechanisms Testing

44 Measuring and Reporting Continuous and consistent identification and storage of risk information over time Maintain risk information at all stages of risk management Establish measurements, e.g., – Number of risks, severity of risks, cost of mitigation, etc.

45 Assets-Threat Model (1) Threats compromise assets Threats have a probability of occurrence and severity of effect Assets have values Assets are vulnerable to threats ThreatsAssets

46 Assets-Threat Model (2) Risk: expected loss from the threat against an asset R=V*P*S R risk V value of asset P probability of occurrence of threat V vulnerability of the asset to the threat

47 Risk Acceptance Certification How well the system meet the security requirements (technical) Accreditation Management’s approval of automated system (administrative)

Readings for the Student Presentations 04/14/2014 Yinyan He – Zahid H. Qureshi A review of accident modelling approaches for complex socio- technical systems. In Proceedings of the twelfth Australian workshop on Safety critical systems and software and safety-related programmable systems - Volume 86 (SCS '07), Tony Cant (Ed.), Vol. 86. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, Frank Peloquin Robert D. Larkin, Juan Lopez, Jr., Jonathan W. Butts, and Michael R. Grimaila Evaluation of security solutions in the SCADA environment. SIGMIS Database 45, 1 (March 2014), , David Rodriquez – Yakkala V. Naga Manikanta and Anjali Sardana Protecting web applications from SQL injection attacks by using framework and database firewall. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI '12). ACM, New York, NY, USA, , CSCE Farkas48