ncl facilitating cybersecurity experimentation as a
play

NCL: Facilitating Cybersecurity Experimentation as a Community - PowerPoint PPT Presentation

NCL: Facilitating Cybersecurity Experimentation as a Community Liang Zhenkai National Cybersecurity R&D Lab (NCL) National Cybersecurity R&D Lab National Cybersecurity R&D Lab (NCL) Shared national infrastructure of


  1. NCL: Facilitating Cybersecurity Experimentation as a Community Liang Zhenkai National Cybersecurity R&D Lab (NCL)

  2. National Cybersecurity R&D Lab • National Cybersecurity R&D Lab (NCL) – Shared national infrastructure of Singapore for cyber-security research & development • Objectives – Simplify research and experimentation effort – Provide realistic testing environment – Enrich users' testing and validation • Offered services – Infrastructure, Ready-to-use Environments, Data

  3. Services of NCL Environments Infrastructure Data • 200 • Ready-to-Use • Data vulnerability Servers collection configuration • Software • Malware • Malware defined • Akamai runtime network • Data • Cyber Range • GPU hosting components Servers and access • Flexible control network • IMPACT topology dataset

  4. Life Cycle of Cyber Security Research Research Setup Attack Analysis Solution Description Goal: Reuse existing configuration efforts

  5. NCL Infra from User’s View NCL Infrastructure Data Repo

  6. Virtual Enterprise Network

  7. Catalog of Vulnerabilities

  8. The WannaCry Ransomware • Outbreak on May 12, 2017 – Infected more than 300,000 computers over 150 countries. – Encrypting user files – Asking for Bitcoin • Target vulnerability CVE-2017-0143 (MS17- 010) – Vulnerability in SMB (port 445), originally exploited in ETERNALBLUE – Patch released on March 14, 2017 by Microsoft

  9. Virtual Enterprise Network

  10. WannaCry Network Behavior • Kill switch – www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com • HTTPS request to a few IPs – 199.254.238.52 – 154.35.175.225 – 128.31.0.39 – ....... • Random probing of next target – Local network first, then external network – Different interval of probing, 10 – 25 per second

  11. More Network Behaviors • Propagate but never connect with TOR servers • DB349B97C37D22F5EA1D1841E3C89EB4 • Never propagate but do connect with TOR servers • 509C41EC97BB81B0567B059AA2F50FE8 • Query a domain first, and do nothing if no response • 8DD63ADB68EF053E044A5A2F46E0D2CD

  12. WannaCry System Behaviors • Malware related files appear • Background of desktop changes • Encrypted files ‘*.WNCRY’ appear • Notification window appears • Original files disappear

  13. Variants of System Behavior • Different order of events • Different filename extension of encrypted files • E.g. ‘*.wry’ of 8DD63ADB68EF053E044A5A2F46E0D2CD • Different notification windows and backgrounds of deskop

  14. Life Cycle of Cyber Security Research Research Setup Attack Analysis Solution Description Goal: Reuse existing Goal: Share and reuse configuration efforts research knowledge

  15. Facilitating Research • A community-maintained resource set on NCL to support research – E.g. network behavior modeling, binary analysis to identify vulnerability for zero-days.

  16. NCL as a Knowledge Base • With automated vulnerability setup, we can gather knowledge of experiments • E.g., three level of information – CVE description – Executable environment – Analysis results from research projects

  17. The NCL Platform Flexible Ready-to-use Infrastructure Environments NCL Platform http://ncl.sg Data and data Community management Knowledge Base

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend