Lehrstuhl Netzarchitekturen und Netzdienste
Institut für Informatik Technische Universität München
Attack Taxonomies and Ontologies
Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014
Attack Taxonomies and Ontologies Seminar Future Internet - - PowerPoint PPT Presentation
Lehrstuhl Netzarchitekturen und Netzdienste Institut fr Informatik Technische Universitt Mnchen Attack Taxonomies and Ontologies Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014 2013 in Numbers 552 78 62
Lehrstuhl Netzarchitekturen und Netzdienste
Institut für Informatik Technische Universität München
Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014
HIER THEMA EINTRAGEN
2
2013 2012
New Vulnerabilities +28%
SSL and TLS protocol renogotiation vulnerabilities were most commonly exploited.
IDENTITIES EXPOSED
MILLION
PERCENT
OF WEBSITES WITH VULNERABILITIES
PERCENT
GROWTH OF DATA BREACHES FROM 2012
Symantec Security Threat Report 2014 ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
3
Increased…
To protect against attacks we need
Traditional security is not enough to defend against the latest generation of malware[1].“
[1]Gavin Reid, director of threat intelligence for Cisco
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
4
A taxonomy is a system of classification which allows the unique identification of object
Bishop, M., Bailey, D.;1996
A taxonomy…
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
5
PLANT KINGDOM Mosses Seed Bearing Plants Algae Spore Bearing Plants Ferns Flowering Plants Gymnosperms ANIMAL KINGDOM Multicellular Animals Unicellular Animals Invertebrates Vertebrates … … …
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
6
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
7
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
8
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
9
attack impacts on security principles
path by which an attack is lauched
attack targets such as hardware, software or users
weaknesses and flaws of the system
defence and prevention methods
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
10
attack impacts on security principles
path by which an attack is lauched
attack targets such as hardware, software or users
weaknesses and flaws of the system
defence and prevention methods
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
11
attack impacts on security principles
path by which an attack is lauched
attack targets such as hardware, software or users
weaknesses and flaws of the system
defence and prevention methods
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
12
attack impacts on security principles
path by which an attack is lauched
attack targets such as hardware, software or users
weaknesses and flaws of the system
defence and prevention methods
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
13
attack impacts on security principles
path by which an attack is lauched
attack targets such as hardware, software or users
weaknesses and flaws of the system
defence and prevention methods
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
14
A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.
Attack Impact Attack Vector Attak Target Vulnerability Defense Availability Integrity UDP Buffer Overflow Worm (Malicious code) DoS MS SQL server 2000 (Software - Network) CVE-2002-0649 (Implementation) Patch System
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
15
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
16
An ontology consists of… An ontology is an explicit specification of conceptualization.
Gruber, T. R., 1993
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
17
relationships between classes
semantic and syntax (RDF, OWL)
sharing of knowledge
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
18
Thing Human Animal Woman Man Mother Father
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
19
Thing Human Animal Woman Man Mother Father hasChild hasHusband
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
20
Thing Human Animal Woman Man Mother Father hasChild hasHusband
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
21
The SQL Slammer is a computer worm and has the attack vectors buffer overflow and denial of service. The attack is enabled by the vulnerabilities due to implementation flaws. Threatened targets are networks. If a Slammer attack succeeds he can cause further DoS attacks.
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
22
‚ vulnerabilities(Attack Vector)
Monitoring component collects data(traffic, requests, packets) and alerting system provides response on attempted attack and countermeasures
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
23
information architecture.
limitiations.
focusing on different fields of research.
create a flexible, extensible and standard classification scheme.
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
24
University Davis, Department of Computer Science, 1996
computer attacks for security assessment Journal of Shanghai Jiaotong University (Science), 18. Jg., pages 554-562, 2013
acquisition, 5. Jg., Nr. 2, pages 199-220, 1993
intrusion detection, In: Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, pages 113-135, 2003
using an Ontology, In: Proceedings of the 7th International Conference on Information Warfare and Security. Academic Conferences Limited, pages 331-324, 2012
ATTACK TAXONOMIES AND ONTOLOGIES
HIER THEMA EINTRAGEN
25
Natascha Abrek abrek@in.tum.de Fakultät für Informatik Informatik VIII: Lehrstuhl für Netzarchitekturen und Netzdienste
ATTACK TAXONOMIES AND ONTOLOGIES