survey of cyber moving targets second edition
play

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward - PowerPoint PPT Presentation

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry H. Okhravi Presenter: Jinghui Liao Outline Cyber Kill Chain Attack technique Moving-targets technique


  1. Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry H. Okhravi Presenter: Jinghui Liao

  2. Outline ´ Cyber Kill Chain ´ Attack technique ´ Moving-targets technique ´ Weakness

  3. Cyber Kill Chain ´ Reconnaissance ´ Access ´ Exploit Development ´ Attack Launch ´ Persistence

  4. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  5. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  6. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Leakage of cryptographic keys from memory(WannaCry) ´ Side-channel attacks(spectre meltdown)

  7. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  8. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Exhaust or manipulate shared resources ´ Denial-of-service using CPU saturation

  9. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  10. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  11. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ buffer overflow ´ script injection ´ SQL injection

  12. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  13. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Timing ´ Ordering ´ Arguments ´ Return-oriented programming (ROP)

  14. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  15. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Fake identity ´ Man-in-the-middle ´ Phishing

  16. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  17. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Compromise authentication process ´ Cross-site scripting

  18. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  19. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  20. ATTACK TECHNIQUES ´ Data Leakage Attacks ´ Resource Attacks ´ Injection ´ Code Injection ´ Control Injection ´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

  21. https://www.bloomberg.com/news/features/2018- 10-04/the-big-hack-how-china-used-a-tiny-chip-to- infiltrate-america-s-top-companies

  22. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  23. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  24. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Format ´ Syntax ´ Encoding ´ Encryption ´ Representation

  25. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  26. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Instructions ´ Order ´ Grouping ´ Format

  27. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  28. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  29. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Code ´ Libraries ´ Stack/heap ´ Functions

  30. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  31. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Interface presented by the operating system

  32. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  33. Moving-Targets ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ OS version ´ CPU architecture ´ OS instance ´ Platform data format

  34. Moving-Targets ´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks

  35. Moving-Targets ´ Dynamic Runtime Environment ´ Address Space Randomization ´ Instruction Set Randomization ´ Dynamic Platforms ´ Dynamic Networks ´ Protocols ´ Addresses

  36. WEAKNESSES ´ Overcome Movement ´ Predict Movement ´ Limit Movement ´ Disable Movement

  37. Thank you!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend