Research Paper Course 60-592 Instructor: Dr. Aggrawal.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Modelling with expert systems. Expert systems Modelling with expert systems Coaching modelling with expert systems Advantages and limitations of modelling.
Configuration management
Database Planning, Design, and Administration
Lecture # 2 : Process Models
ITIL: Service Transition
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Sixth Hour Lecture 10:30 – 11:20 am, September 9 Framework for a Software Management Process – Artifacts of the Process (Part II, Chapter 6 of Royce’ book)
SPECIFYING AND MONITORING GUARANTEES IN COMMERCIAL GRIDS THROUGH SLA Sven Graupner Vijay MachirajuAad van Moorsel IEEE/ACM International Symposium on Clustering.
T-FLEX DOCs PLM, Document and Workflow Management.
L4-1-S1 UML Overview © M.E. Fayad SJSU -- CmpE Software Architectures Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I.
Agent Mediated Grid Services in e-Learning Chun Yan, Miao School of Computer Engineering Nanyang Technological University (NTU) Singapore April,
JACK Intelligent Agents and Applications Hitesh Bhambhani CSE 6362, SPRING 2003 Dr. Lawrence B. Holder.
A Multi-Agent System for Visualization Simulated User Behaviour B. de Vries, J. Dijkstra.
APPLICATION DEVELOPMENT BY SYED ADNAN ALI.
Building Knowledge-Driven DSS and Mining Data
Lecture Nine Database Planning, Design, and Administration
Course Instructor: Aisha Azeem
Reliability Analysis of Multi-state Systems with Heterogeneous Multi-state Elements Dmitrij Birjukov National Taras Shevchenko University of Kyiv Faculty.
Project Management and Scheduling
Enterprise Architecture
An initiative of the ACP Group of States funded by the European Union Global Climate Change Alliance: Intra-ACP Programme Training Module Mainstreaming.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
This chapter is extracted from Sommerville’s slides. Text book chapter
What is Business Analysis Planning & Monitoring?
Chapter 9 Database Planning, Design, and Administration Sungchul Hong.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
UML - Development Process 1 Software Development Process Using UML (2)
Overview of the Database Development Process
CPIS 357 Software Quality & Testing
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
ITEC224 Database Programming
Business Analysis and Essential Competencies
INFORMATION SYSTEMS Overview
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
OHTO -99 SOFTWARE ENGINEERING LECTURE 5 Today: - An overview to OO Analysis and OO Design - Introduction of Assignment 2.
Configuration Management (CM)
SOFTWARE DESIGN.
Module 9 Mainstreaming in country monitoring systems Country-led environmental and climate change mainstreaming (specialist course) Training materials.
Database System Development Lifecycle 1.  Main components of the Infn System  What is Database System Development Life Cycle (DSDLC)  Phases of the.
Learning Automata based Approach to Model Dialogue Strategy in Spoken Dialogue System: A Performance Evaluation G.Kumaravelan Pondicherry University, Karaikal.
SYSTEMS ANALYSIS AND DESIGN LIFE CYCLE
Defence mechanisms against computer attacks “Distributed denial of service” type Prof. Nina Siniagina Research associate 2nd grade Stela Ruseva IPP - Bulgarian.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
1 Policy Analysis for RISPO II National Workshop XXXXX 2006.
L6-S1 UML Overview 2003 SJSU -- CmpE Advanced Object-Oriented Analysis & Design Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I College.
Model-Driven Engineering of Behaviors in User Interfaces Efrem Mbaki & Jean Vanderdonckt Université catholique de Louvain (UCL) Louvain School of Management.
TESTING LEVELS Unit Testing Integration Testing System Testing Acceptance Testing.
INFORMATION SYSTEMS FOR MANAGEMENT. Agenda Information system project Organization analysis.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
L. M. Camarinha-Matos © L. M. Camarinha-Matos WP5 – STATUS OVERVIEW WP5 meeting – Paris, June 2004 Luis M. Camarinha-Matos
Domain Classes – Part 1.  Analyze Requirements as per Use Case Model  Domain Model (Conceptual Class Diagram)  Interaction (Sequence) Diagrams  System.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Finite State Machines (FSM) OR Finite State Automation (FSA) - are models of the behaviors of a system or a complex object, with a limited number of defined.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
___________________________________________________ Informatics MSc Course PLAN – Automated Planning The aim of this course is to provide: a solid grounding.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
EEL 5937 Multi Agent Systems -an introduction-. EEL 5937 Content What is an agent? Communication Ontologies Mobility Mutability Applications.
ITIL: Service Transition
PLM, Document and Workflow Management
Measuring Outcomes of GEO and GEOSS: A Proposed Framework for Performance Measurement and Evaluation Ed Washburn, US EPA.
Modeling Effective Communications in an DevOps Environment using the SIS Testbed Amanda Crawford Fall 2017 This project will model a scenario between a.
Introduction To software engineering
Presentation transcript:

Research Paper Course Instructor: Dr. Aggrawal

PAPERS Active Vulnerability Assessment of Computer Networks by Simulation of Complex Remote Attacks Igor Kotenko St. Petersburg Institute for Informatics and Automation, 39, 14th Liniya, Russia Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents Igor Kotenko, Alexey Alexeev, Evgeny Man’kov St. Petersburg Institute for Informatics and Automation, 39, 14th Liniya, Russia

Network Security Security Assurance We Have seen Practical tools We will see Underlying approach Theoretical Concepts With reference to Attack Simulator

Goal Of Paper Development Of General Approach Mathematical Models Software Simulation Tool For active analysis of computer network vulnerabilities

Security Assurance Important Problem Increasing Significance of information Potentially devastating Consequences Complex Growing Size Inter-Connectivity of Networks Number of Users Availability of Information

Attack Modeling and Simulation Approach Malefactors intention and attack task specification Application Ontology “Computer Network Attacks” Formal Grammar Based Framework State Machine based representation of attack generation Formal Model of Attacked Computer Network

Malefactors Intentions R - Reconnaissance Aiming at getting information about the network (host) I – Implantation And Threat Realization

List of Malefactor’s Intentions 1-6 R type 7-12 I type

Attack Task Specification A Top Level attack Goal Specified as Known Data specifies the information about attacked computer network. Attack Object corresponds to optional variable defining more exactly attack target

Hierarchy of Attacks Two Subsets Upper Level ( Macro-level attacks) Lower Level (Micro Level attacks)

Relations Part Of – decomposition relationship Kind Of – specialization relationship Seq Of – specifying sequence of relationship Example Of – type of object (specific sample of Object)

Mathematical Model of Attack Intentions Formal Grammar Particular intentions inter-connected through substitution operations Ma = Gi = {Gi} – formal Grammar {Su} – substitution

State Machines States First (Initial) Intermediate End (Final) Transition Arcs – can be carried out only under specific circumstances Examples of State Machines Implantation and Threat Realization Identification of Hosts

Factors Malefactors Strategy Depends on results of intermediate actions Reason – not possible to generate complete sequence of malefactor’s actions before-hand

Attack Simulator Implementation Multi Agent System Network Agent – simulates a attacked computer network Hacker Agent – performs attacks against computer networks Technology- MASDK (Multi Agent System Development Kit)

Key Components of Hacker Agent Kernel of Hacker Agent It calls specification of attack task Computes next state machine transition Script Component – specifies set of scripts that can be executed by state machines Attack Task Specification Component – provides user with interface to specify attack attributes Probabilistic decision making model – used to determine hackers agent further action in attack generation Network Traffic Generator – forms flow of network packets Attack Scenario Visualization – for visual representation of attack progress

Key Component of Network Agent Kernel of Network Agent Functions used for specification of network configuration through user interface Computation of network’s response to an attacking action State Machines Model – specifies the network agent behavior ( communication functionality) Network Configuration Specification Component – is used for a set of user interfaces for configuration of network to be attacked Firewall Model component – determines firewall’s response to action Network response component – network’s (host’s) response messages to attack

Component Models of Network Agent and Hacker Agent

Experiments with Attack Simulator Goals of experiment Checking a computer network security policy at stages of conceptual and logic design network security system. Checking security policy of a real life computer network

Factors affecting attack efficacy Protection Degree of Network firewall (PNF) Protection degree of Personal Firewall (PPF) Protection Parameters of attacked host(PP) Hackers Knowledge of Network (KN)

Attack outcome parameters Number of Attack steps (NS) Percentage of Intent realization (PIR) Percentage of Attack realization(PAR) Percentage of Firewall Blocking(PFB) Percentage of Reply Absence (PRA)

Example Realization of Intention CVR Protection of attacked host – Strong Hacker’s Knowledge – Good

Changes of Attack Outcome Parameters

Conclusion (Paper I) Paper presents formal approach to active vulnerability assessment based on modeling and simulation of remote computer network attacks Multi agent system Tries to give a standard procedure for security assurance

PAPER II Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents Igor Kotenko, Alexey Alexeev, Evgeny Man’kov St. Petersburg Institute for Informatics and Automation, 39, 14th Liniya, Russia Concern Growth of Number Capacity of DDOS attacks

Goals of Paper Goals Of Paper Development for formal framework for modeling Elaboration of Formal Specification of a representative spectrum Implementation of software development tools

Teamwork Joint Intention Theory Shared Plans theory Combined theory of Agents

Creation of Hackers Agent Forming the subject domain ontology Determining the agents team structure Defining the agents interaction-and- coordination mechanisms Specifying the agents actions plans Assigning roles and allocating plans between agents Realizing the teamwork by set of state- machines

Structure Client Supervises a sub-team of masters Masters Each master supervises a group of demons Demons Execute immediate attack actions against victim hosts

Suggested Mechanisms Maintenance and Action coordination Monitoring and restoration of agent functionality Maintenance of Communication Selectivity

Plan Of DDoS Preliminary Reconnaissance and Installation of Agents Basic Realization of DDoS attack by joint action of agents Final Visualization of attack results

Formal Model of Attacked Networks Represented as Quadruple MA = Mcn – model of computer network structure {Mhi} – model of host resources Mp – model of computation of success probablilites Mhr – model of host reaction in response to attacks Input -> Output [& post condition]

Attack Simulation Tool Implementation MASDK – Multi-Agent System Development Kit Why Use Attack Simulator Checking a computer network security policy at stages of conceptual and logical design. Checking security of real life computer network

Conclusion (Paper II) Paper presents formal paradigm for modeling and simulation Presents a structure of team of agents Above approach used for evaluation of computer network security Analysis of both efficiency and effectiveness of security policy against DDoS attacks

References F.Cohen, “Simulating Cyber Attacks, Defenses, and Consequences”, IEEE Symposium on Security and Privacy,Berkeley, CA, 1999 V.Gorodetski, and I.Kotenko, “Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool”, Lecture V.Gorodetski, O.Karsayev, I.Kotenko, and A.Khabalov, “Software Development Kit for Multi-agent Systems Design and Implementation”, Lecture Notes in Artificial Intelligence, Vol. 2296, Springer Verlag, M.Tambe, “Towards Flexible Teamwork”, Journal ofArtificial Intelligence Research, No.7, M.Tambe, and D.V.Pynadath, “Towards Heterogeneous Agent Teams”, Lecture Notes in Artificial Intelligence,Vol.2086, 2001

Questions and Comments THANK YOU Presented By Ashutosh Sood