implementing security control loops in security
play

Implementing Security Control Loops in Security Autonomous Response - PowerPoint PPT Presentation

Introduction Research Questions Proof of Concept Results Conclusions Questions? Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov SNE University of Amsterdam & TNO Supervisors: Marc X. Makkes


  1. Introduction Research Questions Proof of Concept Results Conclusions Questions? Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov SNE University of Amsterdam & TNO Supervisors: Marc X. Makkes & Robert J. Meijer July 3, 2014 Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  2. Introduction Research Questions Proof of Concept Results Conclusions Questions? Why was this research conducted? Introduction Imagine your banking website or application does not work! Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  3. Introduction Research Questions Proof of Concept Results Conclusions Questions? Why was this research conducted? Introduction Imagine your banking website or application does not work! ANNOYING!!! Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  4. Introduction Research Questions Proof of Concept Results Conclusions Questions? Why was this research conducted? Introduction Imagine your banking website or application does not work! ANNOYING!!! • A way for adopting the best countermeasures technologies which are available • Support for very complex networks • Easier organizing the security of company networks • Faster response times Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  5. Introduction Research Questions Proof of Concept Results Conclusions Questions? How can we do that? Introduction • Software Defined Networks (SDNs) are out there... • Implementing Security as a Service (SaaS) • By using control loops • Share security modules with other companies and organizations Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  6. Introduction Research Questions Proof of Concept Results Conclusions Questions? What will be the result? Introduction Security Autonomous Response Networks - Software Defined Networks that adjust themselves in order take care of security threats and risks Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  7. Introduction Research Questions Proof of Concept Results Conclusions Questions? Research Questions How could a security control loop be implemented as a software solution? • What properties should the implementation of a Security Autonomous Response Network have, in order to make it beneficial and effective against security threats? • How can a Security Autonomous Response Network decide on which response will be better to execute in a given situation? Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  8. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  9. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  10. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  11. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  12. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Control Loop • Creating topology • Testing the Network • Start Services • Start Control Loop • Collect TCP Connections Statistics • Check Number Of Connections • (Determine Potential Attacks) • (Create New Server) • (Redirect Traffic To It) Moving resources to new server Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  13. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  14. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  15. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  16. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  17. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  18. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  19. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  20. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Control Loop • Creating topology • Testing the Network • Start Services • Start Control Loop • Collect TCP Connections Statistics • Check Number Of Connections • (Determine Potential Attacks) • (Collect Bandwidth Statistics) • (Adjust Rate Limits) • (Implement New Rate Determine potential attacks vectors Limits) Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  21. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Isolation Results Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  22. Introduction Research Questions Proof of Concept Results Conclusions Questions? Attack Limiting Results Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  23. Introduction Research Questions Proof of Concept Results Conclusions Questions? Conclusions (What properties should the implementation of a Security Autonomous Response Network have, in order to make it beneficial and effective against security threats?) • Software Modularity - Scalability, Reusable and pluggable modules • Company Infrastructure Modularity - Flexibility, More options for responses to security threats Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  24. Introduction Research Questions Proof of Concept Results Conclusions Questions? Conclusions (How can a Security Autonomous Response Network decide on which response will be better to execute in a given situation?) Responses to security threats should be: • Classified - based on which problems they can solve • Rated - based on their effectiveness Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

  25. Introduction Research Questions Proof of Concept Results Conclusions Questions? Questions Please ask your questions now, thank you! Implementing Security Control Loops in Security Autonomous Response Networks Hristo Dimitrov

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend