and devices in a network
play

and Devices in a Network AIMS CONFERENCE 13. 7. 2017 Martin - PowerPoint PPT Presentation

Situational Awareness: Detecting Critical Dependencies and Devices in a Network AIMS CONFERENCE 13. 7. 2017 Martin Latovika lastovicka@ics.muni.cz 1 Situational Awareness The knowledge and understanding of the current situation. 2 3


  1. Situational Awareness: Detecting Critical Dependencies and Devices in a Network AIMS CONFERENCE 13. 7. 2017 Martin Laštovička lastovicka@ics.muni.cz 1

  2. Situational Awareness The knowledge and understanding of the current situation. 2

  3. 3

  4. 4

  5. Motivation ▪ Automatic building of situational awareness ▪ Ever-evolving threat landscape and network threats ▪ Threat impact estimation with respect to current situation 5

  6. Research Questions 1. How can device and its services be identified in a complex network using passive network monitoring? 2. How can device dependencies be detected in a network? 3. How can device importance be estimated from the perspective of reaction to cyber threats? 6

  7. RQ1: Device and Service Identification 7

  8. 8

  9. How? ▪ TCP stack ▪ Service identifier ▪ Specific domains ▪ Port ▪ HTTP hostname ▪ Traffic characteristics ▪ HTTPS SNI ▪ User-agent 9

  10. Methods ▪ Extended flows – IPFIX ▪ More information from L3, L4, L7 headers ▪ How to update? ▪ Machine learning ▪ Autonomous characteristics identification ▪ How to scale? 10

  11. RQ2: Detection of Device Dependencies 11

  12. How? ▪ Client-server communication ▪ Traffic characteristics 12

  13. RQ3: Importance Estimation 13

  14. How? ▪ Device identification ▪ Provided services ▪ Traffic statistics ▪ Number of dependencies ▪ Attack statistics 14

  15. Methods ▪ Graph algorithms ▪ Graph centrality ▪ Clique detection ▪ Analysis of attackers activities ▪ Type of attack ▪ Duration, repetition, number of targets 15

  16. Preliminary Results ▪ OS recognition in real network ▪ Experiments with flow based passive identification ▪ Encrypted traffic – ocsp protocol ▪ Graph-based data model ▪ Machines and relations ▪ Computations over data ▪ Attack targets analysis ▪ Generic attacks (scans) on workstations/dynamic ranges ▪ DoS, brute force attacks on servers 16

  17. Discussion Martin Laštovička lastovicka@ics.muni.cz Brno Ph.D. Talent Scholarship Holder – Funded by the Brno City Municipality 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend