A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya Department of Computer Science and.

Slides:



Advertisements
Similar presentations
Systems Security Engineering An Updated Paradigm INCOSE Enchantment Chapter November 8, 2006 John W. Wirsbinski.
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
By Hiranmayi Pai Neeraj Jain
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Cyber Principles November 2010 Bob Gourley. The 12 Principles of Cyber Conflict 1. Know the enemy: Bad actors in the world are bad actors in cyberspace.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Overview FAA IT & ISS R&D: Security Today Security Tomorrow Marshall Potter Chief Scientist for Information Technology Federal Aviation Administration.
Randy Marchany VA Tech Computing Center
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Securing Information Systems
A First Course in Information Security
SEC835 Database and Web application security Information Security Architecture.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
APT29 HAMMERTOSS Jayakrishnan M.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
National Computational Science University of Illinois at Urbana-Champaign 1 “Enabling Proactive Prediction, Avoidance, and Diagnosis by Providing Situational.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
Research Direction Introduction
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Social Network-Based Botnet Command- and-Control: Emerging Threats and Countermeasures Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail:
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Easy3s Smart Cop antivirus Total Security for Internet ERA.
Surveillance and Security Systems Cyber Security Integration.
A lustrum of malware network communication: Evolution & insights
DISA Global Operations
Panel Discussion: C4I Solutions for Combating
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
An Urgent National Imperative
Four Generations of Security Devices Putting IDS in Context
Evolution Of Cybersecurity
Ruchika Mehresh and Shambhu Upadhyaya
Ruchika Mehresh and Shambhu Upadhyaya
Institute for Cyber Security Overview
Final Conference 18 Set 2018.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Honeypots Visit for more Learning Resources 1.
Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
CyberPaths Interdisciplinary Modules
Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3
Presentation transcript:

A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY

Organization Motivation Problem Statement Introduction Framework Work in progress Conclusion 2

Motivation 3 The Asymmetric warfare Kind of sophisticated attacks happening lately:  Botnets, command and control  Operation Aurora  Stuxnet

Problem Statement How to enable critical systems to survive the next-generation of sophisticated attacks 4 Deception

Introduction Survivability is the ability of a system to perform its mission (essential operations) in presence of attacks, faults or accidents Focus on how to survive an attack – Does not focus on source or type of attack 5

Introduction Survivability involves four phases: – Prevention against faults/attacks – Detection of faults/attacks – Recovery from faults/attacks – Adaptation/Evolution to avoid future attacks Timeliness property 6

Introduction 7  Next-generation attack assessment  Formal requirements  Deception as a tool of defense  Proposed framework

Solution 8 Underlying pattern in sophisticated attacks [6] Features: 1.Multi-shot 2.Stealth 3.Contingency plan Underlying pattern in sophisticated attacks [6] Features: 1.Multi-shot 2.Stealth 3.Contingency plan

Formal system requirements 9  Recognizing the smart adversary  Prevention  Surreptitious detection  Effective recovery with adaptation  Zero-day attacks

Formal system requirements 10  Conserving timeliness property  Non-verifiable deception

Deception as tool of defense Preventive deception – Hiding, Distraction, Dissuasion Detection – Honeypot farm Recovery – Concealing the detection till an effective patch has been worked out 11

Framework 12

Work in progress Design issues Controlling the feedback loop Smart-box design – Assess the nature of the traffic flow – Map AIOS to a honeypot 13

Conclusion Deception based survivability solution against sophisticated attacks Dealing with zero-day attacks while conserving timeliness property Stronger recovery with surreptitious detection 14

References 1.E. Nakashima and J. Pomfret. China proves to be an aggressive foe in cyberspace, November M. Ramilli and M. Bishop. Multi-stage delivery of malware. 5th International Conference on Malicious and Unwanted Software (MALWARE), E. J. Kartaltepe, J. A. Morales, S. Xu, and R. Sandhu. Social network based botnet command-and-control: emerging threats and countermeasures. Proceedings of the 8th international conference on Applied cryptography and network security (ACNS), pages 511–528, M. Labs and M. F. P. Services. Protecting your critical assets, lessons learned from operation aurora. Technical report, M. J. Gross. A declaration of cyber-war, April K. A. Repik. Defeating adversary network intelligence efforts with active cyber defense techniques. Master’s thesis, Graduate School of Engineering and Management, Air Force Institute of Technology, A. D. Lakhani. Deception techniques using honeypots. Master’s thesis, MSc Thesis, ISG, Royal Holloway, University of London,

Thank You For questions and comments, – Ruchika Mehresh – Shambhu Upadhyaya 16