Title: Research Paper
1Research Paper
Course 60-592 Instructor Dr. Aggrawal
2PAPERS
- Active Vulnerability Assessment of Computer
Networks by Simulation of Complex Remote Attacks - Igor Kotenko
- St. Petersburg Institute for Informatics and
Automation, 39, 14th Liniya, Russia - Formal Framework for Modeling and Simulation of
DDoS Attacks Based on Teamwork of Hackers-Agents - Igor Kotenko, Alexey Alexeev, Evgeny
Mankov - St. Petersburg Institute for Informatics
and Automation, 39, 14th Liniya, Russia -
3Network Security
- Security Assurance
- We Have seen
- Practical tools
- We will see
- Underlying approach
- Theoretical Concepts
- With reference to Attack Simulator
4Goal Of Paper
- Development
- Of General Approach
- Mathematical Models
- Software Simulation Tool
- For active analysis of computer network
- vulnerabilities
5Security Assurance
- Important Problem
- Increasing Significance of information
- Potentially devastating Consequences
- Complex
- Growing Size
- Inter-Connectivity of Networks
- Number of Users
- Availability of Information
6Attack Modeling and Simulation Approach
- Malefactors intention and attack task
specification - Application Ontology Computer Network Attacks
- Formal Grammar Based Framework
- State Machine based representation of attack
generation - Formal Model of Attacked Computer Network
7Malefactors Intentions
- R - Reconnaissance
- Aiming at getting information about the network
(host) - I Implantation And Threat Realization
8List of Malefactors Intentions 1-6 R type
7-12 I type
9Attack Task Specification
- A Top Level attack Goal
- Specified as ltNetwork (host) address, Malefactors
Intention, Known Data, Attack Object gt - Known Data specifies the information about
attacked computer network. - Attack Object corresponds to optional variable
defining more exactly attack target
10Hierarchy of Attacks
- Two Subsets
- Upper Level ( Macro-level attacks)
- Lower Level (Micro Level attacks)
11Relations
- Part Of decomposition relationship
- Kind Of specialization relationship
- Seq Of specifying sequence of relationship
- Example Of type of object (specific sample of
Object)
12(No Transcript)
13Mathematical Model of Attack Intentions
- Formal Grammar
- Particular intentions inter-connected through
substitution operations - Ma lt Gi, Su gt
- Gi lt Vn, Vt, S, P, A gt
- Gi formal Grammar
- Su substitution
14State Machines
- States
- First (Initial)
- Intermediate
- End (Final)
- Transition Arcs can be carried out only under
specific circumstances - Examples of State Machines
- Implantation and Threat Realization
- Identification of Hosts
15Factors
- Malefactors Strategy
- Depends on results of intermediate actions
- Reason not possible to generate complete
sequence of malefactors actions before-hand
16Attack Simulator Implementation
- Multi Agent System
- Network Agent simulates a attacked computer
network - Hacker Agent performs attacks against computer
networks - Technology- MASDK (Multi Agent System Development
Kit)
17Key Components of Hacker Agent
- Kernel of Hacker Agent
- It calls specification of attack task
- Computes next state machine transition
- Script Component specifies set of scripts that
can be executed by state machines - Attack Task Specification Component provides
user with interface to specify attack attributes - Probabilistic decision making model used to
determine hackers agent further action in attack
generation - Network Traffic Generator forms flow of network
packets - Attack Scenario Visualization for visual
representation of attack progress
18Key Component of Network Agent
- Kernel of Network Agent
- Functions used for specification of network
configuration through user interface - Computation of networks response to an attacking
action - State Machines Model specifies the network
agent behavior ( communication functionality) - Network Configuration Specification Component
is used for a set of user interfaces for
configuration of network to be attacked - Firewall Model component determines firewalls
response to action - Network response component networks (hosts)
response messages to attack
19Component Models of Network Agent and Hacker Agent
20Experiments with Attack Simulator
- Goals of experiment
- Checking a computer network security policy at
stages of conceptual and logic design network
security system. - Checking security policy of a real life computer
network
21Factors affecting attack efficacy
- Protection Degree of Network firewall (PNF)
- Protection degree of Personal Firewall (PPF)
- Protection Parameters of attacked host(PP)
- Hackers Knowledge of Network (KN)
22Attack outcome parameters
- Number of Attack steps (NS)
- Percentage of Intent realization (PIR)
- Percentage of Attack realization(PAR)
- Percentage of Firewall Blocking(PFB)
- Percentage of Reply Absence (PRA)
23Example
- Realization of Intention CVR
- Protection of attacked host Strong
- Hackers Knowledge Good
24Changes of Attack Outcome Parameters
25Conclusion (Paper I)
- Paper presents formal approach to active
vulnerability assessment based on modeling and
simulation of remote computer network attacks - Multi agent system
- Tries to give a standard procedure for security
assurance
26PAPER IIFormal Framework for Modeling and
Simulation of DDoS Attacks Based on Teamwork of
Hackers-Agents Igor Kotenko, Alexey Alexeev,
Evgeny Mankov St. Petersburg Institute for
Informatics and Automation, 39, 14th Liniya,
Russia
- Concern
- Growth of
- Number
- Capacity of DDOS attacks
27Goals of Paper
- Goals Of Paper
- Development for formal framework for modeling
- Elaboration of Formal Specification of a
representative spectrum - Implementation of software development tools
28Teamwork
- Joint Intention Theory
- Shared Plans theory
- Combined theory of Agents
29Creation of Hackers Agent
- Forming the subject domain ontology
- Determining the agents team structure
- Defining the agents interaction-and-coordination
mechanisms - Specifying the agents actions plans
- Assigning roles and allocating plans between
agents - Realizing the teamwork by set of state-machines
30Structure
- Client
- Supervises a sub-team of masters
- Masters
- Each master supervises a group of demons
- Demons
- Execute immediate attack actions against victim
hosts
31Suggested Mechanisms
- Maintenance and Action coordination
- Monitoring and restoration of agent functionality
- Maintenance of Communication Selectivity
32Plan Of DDoS
- Preliminary
- Reconnaissance and Installation of Agents
- Basic
- Realization of DDoS attack by joint action of
agents - Final
- Visualization of attack results
33Formal Model of Attacked Networks
- Represented as Quadruple
- MA ltMcn,Mhi, Mp, Mhrgt
- Mcn model of computer network structure
- Mhi model of host resources
- Mp model of computation of success
probablilites - Mhr model of host reaction in response to
attacks Input -gt Output post condition
34Attack Simulation Tool Implementation
- MASDK Multi-Agent System Development Kit
- Why Use Attack Simulator
- Checking a computer network security policy at
stages of conceptual and logical design. - Checking security of real life computer network
35Conclusion (Paper II)
- Paper presents formal paradigm for modeling and
simulation - Presents a structure of team of agents
- Above approach used for evaluation of computer
network security - Analysis of both efficiency and effectiveness of
security policy against DDoS attacks
36References
- F.Cohen, Simulating Cyber Attacks, Defenses, and
Consequences, IEEE Symposium on Security and
Privacy,Berkeley, CA, 1999 - V.Gorodetski, and I.Kotenko, Attacks against
Computer Network Formal Grammar-based Framework
and Simulation Tool, Lecture - V.Gorodetski, O.Karsayev, I.Kotenko, and
A.Khabalov, Software Development Kit for
Multi-agent Systems Design and Implementation,
Lecture Notes in Artificial Intelligence, Vol.
2296, Springer Verlag, 2002. - M.Tambe, Towards Flexible Teamwork, Journal
ofArtificial Intelligence Research, No.7, 1997. - M.Tambe, and D.V.Pynadath, Towards Heterogeneous
Agent Teams, Lecture Notes in Artificial
Intelligence,Vol.2086, 2001
37Questions and Comments
-
- THANK YOU
-
- Presented By
- Ashutosh Sood
-