RESEARCH PAPER

Download Report

Transcript RESEARCH PAPER

Research Paper
Course 60-592
Instructor: Dr. Aggrawal
PAPERS

Active Vulnerability Assessment of Computer Networks by
Simulation of Complex Remote Attacks
Igor Kotenko
St. Petersburg Institute for Informatics and Automation, 39, 14th Liniya, Russia

Formal Framework for Modeling and Simulation of DDoS
Attacks Based on Teamwork of Hackers-Agents
Igor Kotenko, Alexey Alexeev, Evgeny Man’kov
St. Petersburg Institute for Informatics and Automation, 39, 14th Liniya, Russia
Network Security
Security Assurance
 We Have seen



Practical tools
We will see
Underlying approach
 Theoretical Concepts


With reference to Attack Simulator
Goal Of Paper

Development
Of General Approach
 Mathematical Models
 Software Simulation Tool

For active analysis of computer network
vulnerabilities
Security Assurance

Important Problem
Increasing Significance of information
 Potentially devastating
Consequences


Complex
Growing Size
 Inter-Connectivity of Networks
 Number of Users
 Availability of Information

Attack Modeling and
Simulation Approach





Malefactors intention and attack task
specification
Application Ontology “Computer Network
Attacks”
Formal Grammar Based Framework
State Machine based representation of
attack generation
Formal Model of Attacked Computer
Network
Malefactors Intentions

R - Reconnaissance


Aiming at getting information about
the network (host)
I – Implantation And Threat
Realization
List of Malefactor’s Intentions
1-6
R type
7-12 I type
Attack Task Specification

A Top Level attack Goal
Specified as <Network (host) address,
Malefactors Intention, Known Data,
Attack Object >
 Known Data specifies the information
about attacked computer network.
 Attack Object corresponds to optional
variable defining more exactly attack
target

Hierarchy of Attacks

Two Subsets

Upper Level ( Macro-level attacks)

Lower Level (Micro Level attacks)
Relations
Part Of – decomposition relationship
 Kind Of – specialization relationship
 Seq Of – specifying sequence of
relationship
 Example Of – type of object (specific
sample of Object)

Mathematical Model of
Attack Intentions

Formal Grammar
Particular intentions inter-connected
through substitution operations
 Ma = < {Gi}, {Su} >
 Gi = < Vn, Vt, S, P, A >
 {Gi} – formal Grammar
 {Su} – substitution

State Machines

States





First (Initial)
Intermediate
End (Final)
Transition Arcs – can be carried out only
under specific circumstances
Examples of State Machines


Implantation and Threat Realization
Identification of Hosts
Factors

Malefactors Strategy

Depends on results of intermediate
actions

Reason – not possible to generate
complete sequence of malefactor’s
actions before-hand
Attack Simulator Implementation

Multi Agent System
Network Agent – simulates a attacked
computer network
 Hacker Agent – performs attacks
against computer networks


Technology- MASDK (Multi Agent
System Development Kit)
Key Components of Hacker Agent






Kernel of Hacker Agent
 It calls specification of attack task
 Computes next state machine transition
Script Component – specifies set of scripts that can be
executed by state machines
Attack Task Specification Component – provides user
with interface to specify attack attributes
Probabilistic decision making model – used to determine
hackers agent further action in attack generation
Network Traffic Generator – forms flow of network
packets
Attack Scenario Visualization – for visual representation
of attack progress
Key Component of Network Agent

Kernel of Network Agent






Functions used for specification of network configuration
through user interface
Computation of network’s response to an attacking action
State Machines Model – specifies the network agent
behavior ( communication functionality)
Network Configuration Specification Component – is
used for a set of user interfaces for configuration of
network to be attacked
Firewall Model component – determines firewall’s
response to action
Network response component – network’s (host’s)
response messages to attack
Component Models of Network Agent and Hacker Agent
Experiments with Attack Simulator

Goals of experiment

Checking a computer network security
policy at stages of conceptual and
logic design network security system.

Checking security policy of a real life
computer network
Factors affecting attack efficacy
Protection Degree of Network firewall
(PNF)
 Protection degree of Personal Firewall
(PPF)
 Protection Parameters of attacked
host(PP)
 Hackers Knowledge of Network (KN)

Attack outcome parameters
Number of Attack steps (NS)
 Percentage of Intent realization (PIR)
 Percentage of Attack realization(PAR)
 Percentage of Firewall Blocking(PFB)
 Percentage of Reply Absence (PRA)

Example

Realization of Intention CVR

Protection of attacked host – Strong

Hacker’s Knowledge – Good
Changes of Attack Outcome Parameters
Conclusion (Paper I)
Paper presents formal approach to
active vulnerability assessment based
on modeling and simulation of remote
computer network attacks
 Multi agent system
 Tries to give a standard procedure for
security assurance

PAPER II
Formal Framework for Modeling and Simulation of DDoS
Attacks Based on Teamwork of Hackers-Agents
Igor Kotenko, Alexey Alexeev, Evgeny Man’kov
St. Petersburg Institute for Informatics and Automation, 39,
14th Liniya, Russia

Concern

Growth of
• Number
• Capacity of DDOS attacks
Goals of Paper
 Goals
Of Paper
 Development
for formal
framework for modeling
 Elaboration of Formal
Specification of a representative
spectrum
 Implementation of software
development tools
Teamwork

Joint Intention Theory

Shared Plans theory

Combined theory of Agents
Creation of Hackers Agent






Forming the subject domain ontology
Determining the agents team structure
Defining the agents interaction-andcoordination mechanisms
Specifying the agents actions plans
Assigning roles and allocating plans
between agents
Realizing the teamwork by set of statemachines
Structure

Client


Masters


Supervises a sub-team of masters
Each master supervises a group of
demons
Demons

Execute immediate attack actions
against victim hosts
Suggested Mechanisms
Maintenance and Action coordination
 Monitoring and restoration of agent
functionality
 Maintenance of Communication
Selectivity

Plan Of DDoS

Preliminary


Basic


Reconnaissance and Installation of
Agents
Realization of DDoS attack by joint
action of agents
Final

Visualization of attack results
Formal Model of Attacked Networks

Represented as Quadruple





MA = <Mcn,{Mhi}, Mp, Mhr>
Mcn – model of computer network structure
{Mhi} – model of host resources
Mp – model of computation of success
probablilites
Mhr – model of host reaction in response to
attacks Input -> Output [& post condition]
Attack Simulation Tool Implementation
MASDK – Multi-Agent System
Development Kit
 Why Use Attack Simulator

Checking a computer network security
policy at stages of conceptual and
logical design.
 Checking security of real life computer
network

Conclusion (Paper II)
Paper presents formal paradigm for
modeling and simulation
 Presents a structure of team of agents
 Above approach used for evaluation
of computer network security
 Analysis of both efficiency and
effectiveness of security policy against
DDoS attacks

References





F.Cohen, “Simulating Cyber Attacks, Defenses, and
Consequences”, IEEE Symposium on Security and
Privacy,Berkeley, CA, 1999
V.Gorodetski, and I.Kotenko, “Attacks against Computer
Network: Formal Grammar-based Framework and Simulation
Tool”, Lecture
V.Gorodetski, O.Karsayev, I.Kotenko, and A.Khabalov,
“Software Development Kit for Multi-agent Systems Design and
Implementation”, Lecture Notes in Artificial Intelligence, Vol.
2296, Springer Verlag, 2002.
M.Tambe, “Towards Flexible Teamwork”, Journal ofArtificial
Intelligence Research, No.7, 1997.
M.Tambe, and D.V.Pynadath, “Towards Heterogeneous Agent
Teams”, Lecture Notes in Artificial Intelligence,Vol.2086, 2001
Questions and Comments
THANK YOU
Presented By
Ashutosh Sood