CYBERCOG Test Bed Overview. The Experiment Setup 2 Screens per analyst A common projector screen Experimenter observing the interactions and taking notes.

Slides:



Advertisements
Similar presentations
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Advertisements

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
By Hiranmayi Pai Neeraj Jain
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Distributed Logging in Java with Constrained Resource Usage Sunil Brown Varghese, Daniel Andresen Dept. of Computing and Information Sciences Kansas State.
The Most Analytical and Comprehensive Defense Network in a Box.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Multi-Route Anomaly detection using Principal Component Analysis Adnan Iqbal Superviser Dr. Waqar Mahmood
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Chapter 6: Hostile Code Guide to Computer Network Security.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
APA of Isfahan University of Technology In the name of God.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IIT Indore © Neminah Hubballi
The Most Analytical and Comprehensive Defense Network in a Box.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Internet Security facilities for secure communication.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Module 7: Fundamentals of Administering Windows Server 2008.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Active Ports 1.4 ZoneLog. Active Ports Overview What it does Where to get it Why use it How to use it Screen Shots Observations Lessons Learned.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Gaining Cyber Situation Awareness in Enterprise Networks: A Systems Approach Peng Liu, Xiaoyan Sun, Jun Dai Penn State University ARO Cyber Situation Awareness.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Chapter 34 Internet Applications (Telnet, FTP).
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 10: Windows Firewall and Caching Fundamentals.
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Intrusion Detection System
Role Of Network IDS in Network Perimeter Defense.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 9 Intruders.
CompTIA Security+ SY0-401 Real Exam Question Answer
Securing the Network Perimeter with ISA 2004
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Active Ports 1.4 ZoneLog.
GCED Exam Braindumps
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Chapter 9 Intruders.
Crisis and Aftermath Morris worm.
Internet Applications (Telnet, FTP)
Presentation transcript:

CYBERCOG Test Bed Overview

The Experiment Setup 2 Screens per analyst A common projector screen Experimenter observing the interactions and taking notes

Resources for each cyber analyst Each participant takes the role of a cyber analyst. Each participant will have two computer screens. The first screen displays the events, alerts, attack patterns and messages from other analyst in the experiment The second screen displays the map of the network segment that the analyst is responsible for, and also the alerts and events of importance, identified by the team. The common projector screen displays the entire network map and a timer to indicate the time left to complete the task.

Information available to each cyber analyst

Overview of tasks performed during an exercise

Sample Network Map

Attack Scenario Example attack scenario [1]

Example Scenario Workstations of several employees in a company XYZ becomes non responsive. Work is majorly affected in the company. It is estimated that if the situation continues for more than 2 hours, the company could incur a net loss of over a million dollars.

Ground Truth available to each Cyber Analyst Cyber Analyst 1 Web Server: reachability (Internet, webService, TCP,80) Web server :networkServiceInfo(webServer, httpd,tcp,80,apache) Web server :VulExists(webServer,’CAN ’,httpd,remoteExploit, privEscalation Cyber Analyst 2 Fileserver: reachability(webserver,fileserver,rpc,100005) Fileserver: vulExists(fileserver,vulID,mountd,remoteExploit,privEscalation) Fileserver: networkServiceInfo(fileServer,mountd,rpc,100005,root) Fileserver: canAccessFile(fileServer,root,write,’/export’) Fileserver: nfsExportInfo(fileServer,’/export’,write,webServer) Fileserver: reachability(webserver,fileServer,nfsProtocol,nfsPort) Cyber Analyst 3 nfsMounted(workstation,’/usr/local/share’,fileServer,’/export’,read)

Event distribution – Cyber Analyst 1 Event 1:TCP probe on port 80 on web server fails. Event 2:Successful data transfer through port 80 on web server Event 3:TCP probe on port 80 on web server fails. Event 4:Successful data transfer through port 80 on web server Event 5:Successful data transfer through port 80 on web server. Event Successful data transfer through port 80 on web server. Event 7:Successful data transfer through port 80 on web server. Event 8:TCP probe on port 80 on web server succeeds Event 9:Successful remote login to FTP server. Event 10:Unauthorized access to FTP server blocked.

Event distribution – Cyber Analyst 2 Event 1:TCP probe to the RPC port of fileServer fails. Event 2:Successful data transfer to the RPC port of fileServer. Event 3:TCP probe to the rpc port of fileServer succeeds. Event 4:Successful data transfer to the RPC port of fileServer. Event 5:Successful data transfer to the RPC port of fileServer. Event 6:Binary file “config.temp” in directory “/export” is changed by “shanter”. Event 7:Binary file “config.temp” in directory “/export” is changed by “jhun”. Event 8:Binary file “config.temp” in directory “/export” is changed by “unknown” – malicious file override. Event 9:Binary file “source.temp” in directory “/export” is changed by “nfinch”. Event 10:File “world.xml” updated by admin.

Event distribution - Cyber Analyst 3 Event1:Bad File “config.temp” is downloaded by “rjay”. Event2:File “config.temp” is executed on “rjay” user computer Event3:Executable File “free.exe” downloaded by “jkay”. Event4:File “free.exe” is executed by “jkay”. Event5:Bad File “config.temp” is downloaded by “praj” Event6:File “config.temp” is executed on on “praj” user computer Event7:Executable File “free.exe” downloaded by “skay”. Event8:File “free.exe” is executed by “skay”. Event9:Bad File “config.temp” is downloaded by “skay”. Event10:Trojan Horse detected on “skay” user computer

Alert distribution- Cyber Analyst 1 AE1 against Event 1: The probing packet matches a signature compromising webServer. AE2 against Event 3: The probing packet matches a signature compromising webServer. AE3 against Event 8: The probing packet matches a signature compromising webServer. AE4 false positive: saying that webServer runs a malicious NSF shell.

Alert distribution- Cyber Analyst 2 FN1 False Negative against Event 3: the sensor did not raise any alert about probe to file server. AE1 against event 6: file “change.temp” in directory “/export” is changed. AE2 against event 7: file “change.temp” in directory “/export” is changed. AE3 against event 8: file “change.temp” in directory “/export” is changed. AE4 against event 8: file “change.temp” is a Trojan horse. AE3 against event 9: file “source.temp” in directory “/export” is changed. AE3 against event 10: file “change.temp” in directory “/export” is changed.

Alert distribution- Cyber Analyst 3 AE1 against event 2: Trojan horse is being executed on rjay user computer. AE2 against event 6: Trojan horse is being executed on praj user computer. AE2 against event 10: Trojan horse is being executed on skay user computer.

CyberCog Feedback System Feedback to the users of what they have accomplished so far. The severity level (high, medium or low) of attacks identified and mitigated in the current exercise. Dynamic factors to measure SA Increasing information(Events & alerts) and data overload. Introducing new attacks. Changing environment factors real time. A delay to provide an important alert. Change to possible assumptions. Increasing and decreasing the time to respond to an attack. Providing multiple solutions in defending an attack (choosing the most cost effective solution). Road blocks introduced while defending an attack eg:- tool crash. Flashing new attack information on to individual user’s screen. 16

CyberCog Measuring and logging Team interaction is logged real time Team performance measured through the number of attacks identified and mitigated. Dynamic nature of the environment is used to measure SA. Enhancements Planned Visual representation of events and alerts E.g. – attack graph. 17

Reference [1] – “Using Bayesian Networks for Cyber Security Analysis”, Peng Xie, Jason H Li, Xinming Ou, Peng Liu, Renato Levy