1
Combinatorial Analysis Utilizing Logical Dependencies Residing On Networks (CAULDRON)
Outline
- Problem
- Approach
- Integration with IDSs
- Demo
Outline Problem Approach Integration with IDSs Demo 1 Attack - - PDF document
Combinatorial Analysis Utilizing Logical Dependencies Residing On Networks (CAULDRON) Outline Problem Approach Integration with IDSs Demo 1 Attack 160 158 47 Target Vulns Vulns Vulns 107 Vulns Vulnerability Scanner 60
1
2
Vulnerability Scanner
3
Vulnerability Scanner 41 Vulns 15 Vulns 160 Vulns 158 Vulns 47 Vulns 60 Vulns 107 Vulns
Attack Target
External Attacker
– Elapsed time: 00:48:07 – Total security holes found: 255 – High severity: 40 – Low severity: 117 – Informational: 98
Jewels?
3
4
8
The reality – security concerns are highly interdependent.
Simply Listing Problems Misses the Big Picture!
5
6
Firewall Attacker Web Server Mail Server Hub NT4.0 IIS Linux attack tools 10.10.100.10 10.10.101.10 10.10.100.20 Linux wu_ftpd
7
8
9
10
Solution 1 Solution 1 Solution 1 Solution 1 Solution 1 Solution 1 Solution 2 Solution 2 Solution 2 Solution 2
11
No impact No impact
12
23
24
Attack Target
External Attacker
13
25 26
14
27
15
16
32 What-If Protect Detect
Network
17
33
Security Metrics Alarm Correlation And Attack Response Sensor Placement Network Hardening
34
NSA DHS FAA AFOSR AFRL NRO DISA JIOC
18 FAA CSIRC Deployment, Leesburg, VA FAA CSIRC Deployment, Leesburg, VA
35
FAA Headquarters
network
– Resulting attack “roadmap” provides context for optimal defenses – Transforms volumes of isolated facts into manageable, actionable results
configuration
network security
36
19