Future Work  Improve diagnosis of a modeled system’s weaknesses  Save and load profiles of potential intruders to the system, such as the average script.

Slides:



Advertisements
Similar presentations
IENG 423 Design of Decision Support Systems Modeling with Excel Excel Basics Pivot Tables and Pivot Charts in Decision Support Systems.
Advertisements

RightNow 8 -- Adding a new report: New > Report: ORAnalytics > Reports > New Report
Powered by. The JACAMAR (fka. SDV) is... A stand-alone tool to structure and display data in Tree-Tables. An alternative for overwhelming standard spreadsheet.
Why ROOT?. ROOT ROOT: is an object_oriented frame work aimed at solving the data analysis challenges of high energy physics Object _oriented: by encapsulation,
Cochrane “New Search” Project Who: For the last year, Wiley worked with members of the Cochrane Collaboration, including a team of Trial Search Coordinators,
The Last Procedure Before First Functional Prototype Grant Boomer, Brett Papineau, Tanis Lopez, Archana Shrestha CS 383.
Network+ Guide to Networks, Fourth Edition
MATLAB Presented By: Nathalie Tacconi Presented By: Nathalie Tacconi Originally Prepared By: Sheridan Saint-Michel Originally Prepared By: Sheridan Saint-Michel.
Structural Inference of Hierarchies in Networks BY Yu Shuzhi 27, Mar 2014.
Computer Security and Penetration Testing
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Managing Data Resources
1 Chapter 12 Working With Access 2000 on the Internet.
Integrating Access with the Web and with Other Programs.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Computer Network Project Computer Network Project Efficient handling of messages with multimedia attachments.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Social Network Priyanka Agrawal. Introduction Social Network is a social structure made of nodes that are tied by one or more specific types of relations.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 5: Navigation in OBIEE – Touring the Catalog Page.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Towards Modelling Information Security with Key-Challenge Petri Nets Teijo Venäläinen
Chapter 12: Simulation and Modeling Invitation to Computer Science, Java Version, Third Edition.
Chapter 5 Data mining : A Closer Look.
VeriFire Tools Network Diagnostic Utility
Collections Management Museums Reporting in KE EMu.
Access 2007 ® Use Databases How can Access help you to find and use information?
Reporting in EMu Crystal != Reporting or Why is reporting so difficult and can we do anything about it? Bernard Marshall KE Software.
Intelligent Tutoring Systems Traditional CAI Fully specified presentation text Canned questions and associated answers Lack the ability to adapt to students.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Architecting secure software systems
Graduate Attributes at the University of Edinburgh What are…. Graduate Attributes? What’s in it for me?
ODBC : What is it and how does it work with MDS ?.
WJEC Applied ICT Spreadsheet Skills 1.Introduction to Financial Modelling Definition A model is a program which has been developed to copy the way.
®® Microsoft Windows 7 for Power Users Tutorial 13 Using the Command-Line Environment.
Recent Addition to EMu 2013 European User Conference.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
ODBC  Topics  MDS ODBC Account  Now have ability to create and manipulate your own reports, with your data, using various reporting tools.  Access.
Understanding Perfmon The Performance Testing Tool >>>>>>>>>>>>>>>>>>>>>>
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Linux Networking and Security
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
1 HTML Forms
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
1 EndNote X2 Your Bibliographic Management Tool 29 September 2009 Humanities and Social Sciences Resource Teams.
Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
Developing A Brilliant You
Misc Text From choice, a world of possibilities eIMS Service Statistic Reports Caribbean Workshop, September 2006.
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
SC’13: Hands-on Practical Hybrid Parallel Application Performance Engineering Analysis report examination with CUBE Markus Geimer Jülich Supercomputing.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 8 1 Microsoft Office Access 2003 Tutorial 8 – Integrating Access with the.
Project 2: Windows Logging. UTSA IS 6353 Incident Response Ranum on Forensics “The real value of intrusion detection is diagnosing what is going on…never.
GRAPH ANALYSIS AND VISUALIZATION PART 1. History of Graph 1735.
ALLOY: A Formal Methods Tool Glenn Gordon Indiana University of Pennsylvania COSC 481- Formal Methods Dr. W. Oblitey 26 April 2005.
Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
Using Visual Basic.NET Programming Tools in the AIS Course Training Session Brian R. Kovar Kansas State University 7 th AIS Educator Annual Meeting June.
PRESENTED BY : Bhupendra Singh
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Chapter 4 Attribute Data.
VCE Computing Units 1 & 2.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Advanced Analytics Using Enterprise Miner
MANAGING DATA RESOURCES
Course Lab Introduction to IBM Watson Analytics
Automated test.
Presentation transcript:

Future Work  Improve diagnosis of a modeled system’s weaknesses  Save and load profiles of potential intruders to the system, such as the average script kiddie, a professional cracker, or a common burglar  Model and diagnose a real life system, most likely a local computer network Abstract This project aims to model network security systems and develop network security analysis tools. Systems are modeled under the concept of an “attack tree”, an approach to security modeling developed by Bruce Schneier, a professional in the fields of cryptography and security 1. Security analysis benefits from an attack tree modeling approach; given the right tools, a modeling environment can help a user find the biggest holes in a system’s security or best methods of fortification. An attack tree modeling language and model interpreters have been developed using Vanderbilt's Generic Modeling Environment (GME). The Attack Tree Toolbox Security Analysis of Systems Using Model-Integrated-Computing  Allows user to input search conditions for filtering paths, such as Cost to attack < 5000  Populates a list box with all applicable paths  Lets user view and sort paths based on various statistics  Allows user to highlight paths in the model and/or create a separate model for the path Allows the user to import or export a model in XML or export the model into Graphviz, a separate program for displaying graphs. Figure 1: The AttackTree MetaModel Figure 2: Use of the Analysis interpreter Figure 3: Viewing of a model exported to Graphviz Legend: Citations 1. Schneier, Bruce. “Attack Trees.“ Dec August (Attack tree acquired from first source.) Analysis Interpreter (Main Interpreter) Collapse Interpreter Based on the object selected by the user, either collapses the branch starting at that node into a model or expands the model into the original branch. Dispatch Interpreter Modeling Specifications Objects and Relations  “Node”: an event in an attack path  “Attack tree”: a container that can hold nodes and their connections  “Node to node connection”: a directed relationship between nodes; the source node is essentially a requirement for the destination node  “Attack tree to node connection”: a relationship similar to that of nodes; used when branches of a tree have been collapsed to a container Attributes of Objects Attributes for only nodes:  “Type”: either AND or OR AND -> all attached nodes are required OR -> only one attached node is required  “Goal”: does node represent the goal of the attack? Attributes for both nodes and trees:  “Cost to attack”: how much an attack on the object would cost the attacker  “Damage cost”: how much an attack on the object would cost the owner(s) of a system  “Technical ability”: a rating from of the skill required to achieve the attack  “Probability of apprehension”: the risk a potential attacker would run of being caught SIPHER Students: Marty Henderson, Blake Sheridan Graduate Student Mentor: Jan Werner