NETWORK DEFENCE USING ATTACKER-DEFENDER INTERACTION MODELLING - - PowerPoint PPT Presentation

network defence using attacker defender interaction
SMART_READER_LITE
LIVE PREVIEW

NETWORK DEFENCE USING ATTACKER-DEFENDER INTERACTION MODELLING - - PowerPoint PPT Presentation

NETWORK DEFENCE USING ATTACKER-DEFENDER INTERACTION MODELLING Wednesday 22 nd June, 2016 Jana Medkov Pavel eleda Research Problem Automated selection of response actions Network Defence Using Interaction Modelling Page 2 / 12 Research


slide-1
SLIDE 1

NETWORK DEFENCE USING ATTACKER-DEFENDER INTERACTION MODELLING

Wednesday 22nd June, 2016

Jana Medková

Pavel Čeleda

slide-2
SLIDE 2

Research Problem

Automated selection of response actions

Network Defence Using Interaction Modelling Page 2 / 12

slide-3
SLIDE 3

Research Problem

Automated selection of response actions

The cyber attacks grow both in number and speed

Network Defence Using Interaction Modelling Page 2 / 12

slide-4
SLIDE 4

Research Problem

Automated selection of response actions

The cyber attacks grow both in number and speed Network security still lacks an efficient attack response system capable of running autonomously

Network Defence Using Interaction Modelling Page 2 / 12

slide-5
SLIDE 5

Research Problem

Automated selection of response actions

The cyber attacks grow both in number and speed Network security still lacks an efficient attack response system capable of running autonomously Cyber attack and defence is very complex

We are always uncertain about the state of the network We don’t know the attacker’s objectives and previous actions (and whether he is an attacker at all) The number of attack vectors is ever growing

Network Defence Using Interaction Modelling Page 2 / 12

slide-6
SLIDE 6

Attack Response

Network Defence Using Interaction Modelling Page 3 / 12

slide-7
SLIDE 7

Attack Response

Network Defence Using Interaction Modelling Page 3 / 12

slide-8
SLIDE 8

Attack Response

security event Logs History Knowlegde

Network Defence Using Interaction Modelling Page 3 / 12

slide-9
SLIDE 9

Attack Response

security event Logs History Knowlegde

Network Defence Using Interaction Modelling Page 3 / 12

slide-10
SLIDE 10

Attack Response

security event Logs History Knowlegde reconfiguration

Network Defence Using Interaction Modelling Page 3 / 12

slide-11
SLIDE 11

Attack Response

security event Logs History Knowlegde reconfiguration Observe Act Orient Decide

Network Defence Using Interaction Modelling Page 3 / 12

slide-12
SLIDE 12

Attack Response

security event Logs History Knowlegde reconfiguration Observe Act Orient Decide

IDS

Network Defence Using Interaction Modelling Page 3 / 12

slide-13
SLIDE 13

Attack Response

security event Logs History Knowlegde reconfiguration Observe Act Orient Decide

IDS SIEM

Network Defence Using Interaction Modelling Page 3 / 12

slide-14
SLIDE 14

Attack Response

security event Logs History Knowlegde reconfiguration Observe Act Orient Decide

IDS SIEM SDN

Network Defence Using Interaction Modelling Page 3 / 12

slide-15
SLIDE 15

Attack Response

security event Logs History Knowlegde reconfiguration Observe Act Orient Decide

IDS SIEM SDN ?

Network Defence Using Interaction Modelling Page 3 / 12

slide-16
SLIDE 16

Research Goal Utilizing a model of interaction between an attacker and a defender to create more refined network defence strategy

Network Defence Using Interaction Modelling Page 4 / 12

slide-17
SLIDE 17

Research Goal Utilizing a model of interaction between an attacker and a defender to create more refined network defence strategy

Select response based on received security events and knowledge of the network Include the attacker’s motivation in the decision process

Network Defence Using Interaction Modelling Page 4 / 12

slide-18
SLIDE 18

Research Topics

Research Question I

How can we model the interaction between an attacker and a defender?

Network Defence Using Interaction Modelling Page 5 / 12

slide-19
SLIDE 19

Research Topics

Research Question I

How can we model the interaction between an attacker and a defender? Research areas Modelling the interaction between an attacker and a defender

model the interaction reasonable input parameters

  • ptimal actions for defender and attacker

computational feasibility for large networks

Network Defence Using Interaction Modelling Page 5 / 12

slide-20
SLIDE 20

Research Topics

Research Question II

How can we use the model to form a network defence strategy?

Network Defence Using Interaction Modelling Page 6 / 12

slide-21
SLIDE 21

Research Topics

Research Question II

How can we use the model to form a network defence strategy? Research areas Network defence strategy

response action based on observed security alerts unknown state of the network unknown objective and past actions of an attacker

Network Defence Using Interaction Modelling Page 6 / 12

slide-22
SLIDE 22

Research Topics

Research Question II

How can we use the model to form a network defence strategy? Research areas Network defence strategy

response action based on observed security alerts unknown state of the network unknown objective and past actions of an attacker

Strategy verification

KYPO - cloud-based testbed for simulation of cyber attacks

Network Defence Using Interaction Modelling Page 6 / 12

slide-23
SLIDE 23

Research Topics

Research Question III

Can the human instinct and experience be included in the defence strategy?

Network Defence Using Interaction Modelling Page 7 / 12

slide-24
SLIDE 24

Research Topics

Research Question III

Can the human instinct and experience be included in the defence strategy? Research areas How can the response selection benefit from human input

what in the model or strategy can be made more accurate

Network Defence Using Interaction Modelling Page 7 / 12

slide-25
SLIDE 25

Research Topics

Research Question III

Can the human instinct and experience be included in the defence strategy? Research areas How can the response selection benefit from human input

what in the model or strategy can be made more accurate

Merging the human intuition into decision output

how can we make it more accurate

Network Defence Using Interaction Modelling Page 7 / 12

slide-26
SLIDE 26

Proposed Approach

Modelling the interaction between an attacker and a defender Game theory toolset Use existing or modified model Optimal attacker’s and defender’s strategy

Network Defence Using Interaction Modelling Page 8 / 12

slide-27
SLIDE 27

Proposed Approach

Modelling the interaction between an attacker and a defender Game theory toolset Use existing or modified model Optimal attacker’s and defender’s strategy Estimating model parameters Formal network description

the topology of the network the hosts and services present in the network the required levels of confidentiality, availability and integrity interdependence of services

Formal description of attacks and responses

Network Defence Using Interaction Modelling Page 8 / 12

slide-28
SLIDE 28

Proposed Approach

Network defence strategy Maintain beliefs to manage uncertainty

the current state of the network the attacker’s past actions the attacker’s objective

Precomputed optimal responses Best response action in a given situation

Network Defence Using Interaction Modelling Page 9 / 12

slide-29
SLIDE 29

Proposed Approach

Strategy verification Cloud-based testbed for simulating cyber attacks Computer Security Incident Response Team (CSIRT) training exercises

Network Defence Using Interaction Modelling Page 10 / 12

slide-30
SLIDE 30

Proposed Approach

Strategy verification Cloud-based testbed for simulating cyber attacks Computer Security Incident Response Team (CSIRT) training exercises Adding human intuition to decision output Black-Litterman model in economy Formal description of human input Updating beliefs based on input

Network Defence Using Interaction Modelling Page 10 / 12

slide-31
SLIDE 31

Summary

Network security requires an efficient autonomous system which would select a response action based on observed security events

Network Defence Using Interaction Modelling Page 11 / 12

slide-32
SLIDE 32

Summary

Network security requires an efficient autonomous system which would select a response action based on observed security events Currently automated network defence systems react only in unambiguous situations and the rest of the events must be investigated by security experts

Network Defence Using Interaction Modelling Page 11 / 12

slide-33
SLIDE 33

Summary

Network security requires an efficient autonomous system which would select a response action based on observed security events Currently automated network defence systems react only in unambiguous situations and the rest of the events must be investigated by security experts

Network Defence Using Interaction Modelling Page 11 / 12

slide-34
SLIDE 34

Summary

Network security requires an efficient autonomous system which would select a response action based on observed security events Currently automated network defence systems react only in unambiguous situations and the rest of the events must be investigated by security experts We propose to model the interaction between an attacker and a defender to comprehend how the attacker’s goals affect his actions and use the model as a basis for a more refined network defence strategy

Network Defence Using Interaction Modelling Page 11 / 12

slide-35
SLIDE 35

THANK YOU FOR YOUR ATTENTION!

Jana Medková

medkova@ics.muni.cz