ludus project
play

Ludus project: Securing your router with GT Kalin Ivanov & - PowerPoint PPT Presentation

Ludus project: Securing your router with GT Kalin Ivanov & Ondej Luk www.stratosphereips.org/ludus Stratosphere Lab Cybersecurity Part of AIC https://www.stratosphereips.org/ @StratosphereIPS @ondrej_lukas @StratoLudus


  1. Ludus project: Securing your router with GT Kalin Ivanov & Ondřej Lukáš www.stratosphereips.org/ludus

  2. Stratosphere Lab ● Cybersecurity Part of AIC ● https://www.stratosphereips.org/ @StratosphereIPS @ondrej_lukas @StratoLudus ● ludus@aic.f el.cvut.cz - Offjcial Ludus contact ● www.stratosphereips.org/ludus @RealKalin

  3. Plan ● Why Ludus? ● Defense as a game ● Collaborative defense ● External Security Metric ● Ludus tool

  4. Motivation and Goals of Ludus ● Collaboration with and TAČR ● Model attackers´ behaviour and use it to create better defense ● Protect users against attacks from the Internet ● Use honeypots in smart way ● Design External Metrics to capture the Security level of devices

  5. Honeypots in Ludus ● TARPIT - iptables module ● Honeypot as a Service* ● Minipot (Telnet) ● Extendable! * More infotion at https://haas.nic.cz/

  6. Troubles with Honeypots ● Where to put them?! ● Static and predictable ● How to use the data? ● Bringing your device in the spotlight?!

  7. Troubles with Honeypots ● Where to put them?! ● Static and predictable ● How to use the data? ● Bringing your device in the spotlight?!

  8. Do you want to play a game?

  9. Model of Attackers’ behaviour Change Change only both ports Change either port or IP 95% of points Change only IPs

  10. Game-Theoretical Approach ● ● Model attacks as a game Minimize attacker’s utility ● ● Find the optimal strategy Save resources

  11. Joining Forces with Others ● Information Sets ⇒ less information for ⇒ lower utility ● Constraints in number of honeypots

  12. Solving the game ● 2 65536 actions per router ● Finding equilibria in full game: NP-hard ● Simplification: ○ Zero-sum game(u attacker = -u defender ) ○ Limited number of port combinations (+ Nearest neighbour) ⇒ Linear program (solvable in P w.r.t. game tree size)

  13. You can’t manage what you can’t measure

  14. Data 2 Types: 1. Packet metadata 2. Suricata alert data Suricata signatures 1| Not Suspicious Traffic 2| Unknown Traffic 3| Potentially Bad Traffic 4| Attempted Information Leak 5| Information Leak 6| Large Scale Information Leak 7| Attempted Denial of Service 8| Denial of Service

  15. Dashboards Local dashboard for each user Publicly AAA Data (Anonymized, Aggregated, Available) Check out the public Kibana visualizations:

  16. Metrics ● Overall Security ● Honeypots/Production Ports ● Entropy of attack

  17. Example

  18. Example

  19. Example https://www.shodan.io/

  20. Ludus tool

  21. Ludus tool ● fully automated ● adapts and updates strategies ● anonymizes and visualizes data ● turris package: ludus https://doc.turris.cz/doc/cs/howto/installation https://github.com/stratosphereips/Ludus

  22. Q&A Thanks for your attention! @ondrej_lukas @RealKalin lukasond@fel.cvut.cz ivanokal@fel.cvut.cz https://www.stratosphereips.org/ludus

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend