re re thinking ne network security in the presence of
play

Re Re-thinking Ne Network Security in the Presence of Unknown Ne - PowerPoint PPT Presentation

Re Re-thinking Ne Network Security in the Presence of Unknown Ne Network Elements Soo-Jin Moon 4 th year Ph.D. Student Carnegie Mellon University Advisor: Vyas Sekar Research Area: Network Security A Vulnerable Network! Networks: explosion


  1. Re Re-thinking Ne Network Security in the Presence of Unknown Ne Network Elements Soo-Jin Moon 4 th year Ph.D. Student Carnegie Mellon University Advisor: Vyas Sekar Research Area: Network Security

  2. A Vulnerable Network! Networks: explosion of unknown network elements à leave gaps for attacks Network functions End-user devices Applications 2

  3. A Vulnerable Network! Networks: explosion of unknown network elements à leave gaps for attacks Network functions End-user devices Applications Motivating Question How do we secure networks composed of network elements whose security implications are unknown? 3

  4. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Methodologies Automatically infer behavioral models (e.g., state machine) • Automatically discover potential attack vectors • 4

  5. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Methodologies Automatically infer behavioral models (e.g., state machine) • Automatically discover potential attack vectors • From black-box observations 5

  6. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Purposes Automatic patching • Verification and testing • Understand adversaries’ capabilities à • Proactively mitigate adversaries from inferring the system 6

  7. My Work Inferring the behavioral models of network elements Alembic: Black-box Model Inference for Stateful Network Functions. • (Under submission) Model Alembic Network function Discovering potential attack vectors AmpMap: Map of Amplification-Inducing Queries to Network Servers. • (In preparation) 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend