Using Strategy Objectives for Network Security Analysis Elie - - PowerPoint PPT Presentation

using strategy objectives for network security analysis
SMART_READER_LITE
LIVE PREVIEW

Using Strategy Objectives for Network Security Analysis Elie - - PowerPoint PPT Presentation

Network Security Game Strategy Automated Analysis Conclusion Using Strategy Objectives for Network Security Analysis Elie Bursztein Stanford University / LSV, Ens-Cachan Inscrypt 2009 Elie Bursztein Using Strategy Objectives for Network


slide-1
SLIDE 1

Network Security Game Strategy Automated Analysis Conclusion

Using Strategy Objectives for Network Security Analysis

Elie Bursztein

Stanford University / LSV, Ens-Cachan

Inscrypt 2009

Elie Bursztein Using Strategy Objectives for Network Security Analysis 1 / 48

slide-2
SLIDE 2

Network Security Game Strategy Automated Analysis Conclusion

Introduction

Work purpose

Analyzing and anticipating computer networks attacks.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 2 / 48

slide-3
SLIDE 3

Network Security Game Strategy Automated Analysis Conclusion

Network complexity: The Pentagon Case

Huge network

◮ 15 000 LAN Networks ◮ 7 000 000 Computers

Huge Security problems

◮ Flash Drive banned due

to a virus spread (Nov 2008).

◮ 1500 computers taken

(Jun 2007)

Elie Bursztein Using Strategy Objectives for Network Security Analysis 3 / 48

slide-4
SLIDE 4

Network Security Game Strategy Automated Analysis Conclusion

Attack Complexity

Elie Bursztein Using Strategy Objectives for Network Security Analysis 4 / 48

slide-5
SLIDE 5

Network Security Game Strategy Automated Analysis Conclusion

Some Epic Failures

◮ 2004 Bouygues Telecom: 2 servers downs → 3 200 000

cellphones down

◮ 2005 Japan Mitsubishi: 1 computer infected → 40 MB of

confidential reports leaked on a P2P network

◮ 2007 Apple: 1 computer in the production line infected →

150 000 ipods infected by the trojan RavMonE.exe

Elie Bursztein Using Strategy Objectives for Network Security Analysis 5 / 48

slide-6
SLIDE 6

Network Security Game Strategy Automated Analysis Conclusion Attacks

Outline

Network Security Attacks Game Strategy Automated Analysis Conclusion

Elie Bursztein Using Strategy Objectives for Network Security Analysis 6 / 48

slide-7
SLIDE 7

Network Security Game Strategy Automated Analysis Conclusion Attacks

Vulnerabilities

◮ A vulnerability is a software bug that can be exploited by

attacker to gain privilege.

◮ An exploit is the piece of software that takes advantage of

a software bug.

◮ A 0day exploit is an exploit for an undisclosed vulnerability.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 7 / 48

slide-8
SLIDE 8

Network Security Game Strategy Automated Analysis Conclusion Attacks

Vulnerabilities as Step stones

◮ Large networks may

suffer multiple vulnerabilities

◮ Patches and

counter-measures need to be prioritized

◮ A minor vulnerability can

turn into a major hole when used as a step-stone

Elie Bursztein Using Strategy Objectives for Network Security Analysis 8 / 48

slide-9
SLIDE 9

Network Security Game Strategy Automated Analysis Conclusion Attacks

Illustration of a Complex attack

Exploit a bug in Firefox Install a trojan Stealth the web server password Upload a rogue page Stealth all user password

Elie Bursztein Using Strategy Objectives for Network Security Analysis 9 / 48

slide-10
SLIDE 10

Network Security Game Strategy Automated Analysis Conclusion Attacks

The Need for Automation

Attack analysis can’t be done by hand: network and attack are just too complex and big for that.

We need models and tools for this !

Elie Bursztein Using Strategy Objectives for Network Security Analysis 10 / 48

slide-11
SLIDE 11

Network Security Game Strategy Automated Analysis Conclusion Attacks

Attack Graph Frameworks

◮ 1998: Use of model-checking for host security [RS98] ◮ 2000: Use of model-cheking for network [RA00] ◮ 2004: First complete framework that constructs the attack

scenario [SW04]

◮ 2005: Mulval [Ou05] a framework based on Datalog. ◮ 2006: NetSpa [ALI06] a framework that scale up to 50 000

nodes.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 11 / 48

slide-12
SLIDE 12

Network Security Game Strategy Automated Analysis Conclusion Attacks

Time is the Essence

Network security is a race between Intruder and Administrator.

Windows of vulnerability

Exploit Released Patch Released Windows of Vulnerability Time Elie Bursztein Using Strategy Objectives for Network Security Analysis 12 / 48

slide-13
SLIDE 13

Network Security Game Strategy Automated Analysis Conclusion Attacks

The Need for Time

Without time meaningless actions are allowed in the model.

◮ Administrator can patch 1000 services instantly. ◮ Intruder can compromise 1000 services before the

administrator have a chance to react. Without time concurrent actions can’t be modeled. Ex: Administrator may patch a service while Intruder tries to exploit it.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 13 / 48

slide-14
SLIDE 14

Network Security Game Strategy Automated Analysis Conclusion Attacks

Time and Game

Model

Timed automaton game [AFHMS].

Property

Property can be written in Timed Alternating-Time Temporal Logic [AHK06].

Elie Bursztein Using Strategy Objectives for Network Security Analysis 14 / 48

slide-15
SLIDE 15

Network Security Game Strategy Automated Analysis Conclusion Attacks

Collateral Effects

DNS Internet Web Email DDOS Attack Dommage collatéral Dommage collatéral

Elie Bursztein Using Strategy Objectives for Network Security Analysis 15 / 48

slide-16
SLIDE 16

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Outline

Network Security Game Structure Rules Strategy Automated Analysis Conclusion

Elie Bursztein Using Strategy Objectives for Network Security Analysis 16 / 48

slide-17
SLIDE 17

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Dual layer structure

The Upper-layer is the timed automaton game, the Lower-layer represents the network state.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 17 / 48

slide-18
SLIDE 18

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Dual layer structure

The Upper-layer is the timed automaton game, the Lower-layer represents the network state.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 17 / 48

slide-19
SLIDE 19

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Lower-layer: the network state

The lower layer is composed of

◮ The dependency graph ◮ A set of states (atomic proposition)

Elie Bursztein Using Strategy Objectives for Network Security Analysis 18 / 48

slide-20
SLIDE 20

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Web Service Receipt

To build a web service you need:

◮ A HTTP frontend to serve the data

Elie Bursztein Using Strategy Objectives for Network Security Analysis 19 / 48

slide-21
SLIDE 21

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Web Service Receipt

To build a web service you need:

◮ A HTTP frontend to serve the data ◮ A SQL backend to store the data

Elie Bursztein Using Strategy Objectives for Network Security Analysis 19 / 48

slide-22
SLIDE 22

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Web Service Receipt

To build a web service you need:

◮ A HTTP frontend to serve the data ◮ A SQL backend to store the data ◮ A way to administrate the service

Elie Bursztein Using Strategy Objectives for Network Security Analysis 19 / 48

slide-23
SLIDE 23

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Web Service Receipt

To build a web service you need:

◮ A HTTP frontend to serve the data ◮ A SQL backend to store the data ◮ A way to administrate the service

Elie Bursztein Using Strategy Objectives for Network Security Analysis 19 / 48

slide-24
SLIDE 24

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

The Dependency graph

SQL SSH HTTP HTTP2

Elie Bursztein Using Strategy Objectives for Network Security Analysis 20 / 48

slide-25
SLIDE 25

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Set of States

SSH SQL HTTP1 HTTP2 Vulnerable ⊤ ⊥ ⊥ ⊥ Compromised ⊥ ⊥ ⊥ ⊥

Elie Bursztein Using Strategy Objectives for Network Security Analysis 21 / 48

slide-26
SLIDE 26

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-27
SLIDE 27

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-28
SLIDE 28

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

◮ p: The player that

executes the rule.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-29
SLIDE 29

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

◮ p: The player that

executes the rule.

◮ a: Rule name.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-30
SLIDE 30

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

◮ p: The player that

executes the rule.

◮ a: Rule name. ◮ c: Rule cost.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-31
SLIDE 31

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

◮ p: The player that

executes the rule.

◮ a: Rule name. ◮ c: Rule cost. ◮ ϕeff: Effects.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-32
SLIDE 32

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Syntax

Rule syntax: Γ : Pre ϕpre − → ∆, p, a, c Effect ϕeff

◮ ϕpre: Preconditions. ◮ ∆: Time required to

complete the action.

◮ p: The player that

executes the rule.

◮ a: Rule name. ◮ c: Rule cost. ◮ ϕeff: Effects.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 22 / 48

slide-33
SLIDE 33

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rules Syntax

F ::= A atomic propositions, in A | ⊤ true | ¬F negation | F ∧ F conjunction | ✸F

Elie Bursztein Using Strategy Objectives for Network Security Analysis 23 / 48

slide-34
SLIDE 34

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

✸ Semantics

✸Vulnerable: One of the successors is vulnerable. N1 N2

Elie Bursztein Using Strategy Objectives for Network Security Analysis 24 / 48

slide-35
SLIDE 35

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Rule Example

Γ : Pre Vulnerable − → 4, A, Patch, 500 Effect ¬Vulnerable ∧ ¬Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 25 / 48

slide-36
SLIDE 36

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

The Element of Surprise

if the opponent alters the service state during the player rule execution then the player is taken by suprise!

Block service 1 Time Attack service 1 Administator Intruder

Elie Bursztein Using Strategy Objectives for Network Security Analysis 26 / 48

slide-37
SLIDE 37

Network Security Game Strategy Automated Analysis Conclusion Structure Rules

Decidability

Decidability

Model-checking TATL over anticipation games is EXPTIME-Complete [BGL,ASIA’07].

Elie Bursztein Using Strategy Objectives for Network Security Analysis 27 / 48

slide-38
SLIDE 38

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Outline

Network Security Game Strategy What is a strategy ? Using strategy Play Example Automated Analysis Conclusion

Elie Bursztein Using Strategy Objectives for Network Security Analysis 28 / 48

slide-39
SLIDE 39

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

From counter-example to strategy

◮ An attack is a counter-example.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 29 / 48

slide-40
SLIDE 40

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

From counter-example to strategy

◮ An attack is a counter-example. ◮ Typically you end-up with many counter-examples.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 29 / 48

slide-41
SLIDE 41

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

From counter-example to strategy

◮ An attack is a counter-example. ◮ Typically you end-up with many counter-examples.

The problem

Which counter-example should the administrator look at first ?

Elie Bursztein Using Strategy Objectives for Network Security Analysis 29 / 48

slide-42
SLIDE 42

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

From counter-example to strategy

◮ An attack is a counter-example. ◮ Typically you end-up with many counter-examples.

The problem

Which counter-example should the administrator look at first ?

◮ Which attack is the most devastating ? ◮ What service to patch first ?

Elie Bursztein Using Strategy Objectives for Network Security Analysis 29 / 48

slide-43
SLIDE 43

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Costs and Rewards

To find the most meaningful counter-example we need some additional informations.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 30 / 48

slide-44
SLIDE 44

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Costs and Rewards

To find the most meaningful counter-example we need some additional informations.

◮ Cost: Each action has a cost.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 30 / 48

slide-45
SLIDE 45

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Costs and Rewards

To find the most meaningful counter-example we need some additional informations.

◮ Cost: Each action has a cost. ◮ Reward: Each network asset has a value.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 30 / 48

slide-46
SLIDE 46

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Costs and Rewards

To find the most meaningful counter-example we need some additional informations.

◮ Cost: Each action has a cost. ◮ Reward: Each network asset has a value.

O ::= O Objective ∈ φ | O ∧ O | MAX(O) maximize the value | MIN(O) minimize the value | O < x x ∈ N | O > x x ∈ N

Elie Bursztein Using Strategy Objectives for Network Security Analysis 30 / 48

slide-47
SLIDE 47

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Relation between Cost and Time

Assumption

The faster an action is, the more costly it is. Real world examples of this assumption:

◮ Exploit: 0day versus Public exploit. ◮ Response team: 24/24h versus 8h /day

Elie Bursztein Using Strategy Objectives for Network Security Analysis 31 / 48

slide-48
SLIDE 48

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Definition

Strategy objectives are a tuple: S = (Na, Pl, Ob, Or, Co)

◮ Na: Strategy name ◮ Pl: The player ◮ Ob: Numerical objectives ◮ Or: Strict preference order ◮ Co: Constraints.

Example

S = (Patch, A, Min(Cost) ∧ Max(OCost) , OCost > Cost, ¬Compromised)

Elie Bursztein Using Strategy Objectives for Network Security Analysis 32 / 48

slide-49
SLIDE 49

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Computing Assets value

◮ Using the same value for each asset. ◮ Assigning value by hand. ◮ Computing automatically the value with a ranking algorithm

[EB,INSCRYPT’08].

Elie Bursztein Using Strategy Objectives for Network Security Analysis 33 / 48

slide-50
SLIDE 50

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Which Objectives to choose ?

◮ Minimizing cost (patch) ◮ Maximizing reward (attack)

Elie Bursztein Using Strategy Objectives for Network Security Analysis 34 / 48

slide-51
SLIDE 51

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Which Objectives to choose ?

◮ Minimizing cost (patch) ◮ Maximizing reward (attack)

Wrong answer !

Player performs the best when his opponent makes mistakes. Game theory classical optimal criterion such as Nash equilibrium and Pareto optimality are not applicable.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 34 / 48

slide-52
SLIDE 52

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Dominant Strategy

The notion of dominant strategy was informally introduced in biology [H67] in 1967.

(Strictly) Dominant Strategy

The (strictly) dominant strategy is the player strategy that beats the maximum number of (every) opponent strategies.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 35 / 48

slide-53
SLIDE 53

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

The Lower Layer

SQL SSH HTTP HTTP2

SSH SQL HTTP1 HTTP2 Vulnerable ⊤ ⊥ ⊥ ⊥ Compromised ⊥ ⊥ ⊥ ⊥

Elie Bursztein Using Strategy Objectives for Network Security Analysis 36 / 48

slide-54
SLIDE 54

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

The Lower Layer

SQL SSH HTTP HTTP2

SSH SQL HTTP1 HTTP2 Value 1 100 10 10

Elie Bursztein Using Strategy Objectives for Network Security Analysis 36 / 48

slide-55
SLIDE 55

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Intruder Rules

Γ : Pre Vulnerable ∧ ¬Compromise − → 2, I, Exploit 0day, 20000 Effect Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 37 / 48

slide-56
SLIDE 56

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Intruder Rules

Γ : Pre Vulnerable ∧ ¬Compromise − → 2, I, Exploit 0day, 20000 Effect Compromise Γ : Pre Vulnerable ∧ ¬Compromise − → 10, I, Exploit Public, 500 Effect Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 37 / 48

slide-57
SLIDE 57

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Intruder Rules

Γ : Pre Vulnerable ∧ ¬Compromise − → 2, I, Exploit 0day, 20000 Effect Compromise Γ : Pre Vulnerable ∧ ¬Compromise − → 10, I, Exploit Public, 500 Effect Compromise Γ : Pre ¬Compromise ∧ ✸Compromised − → 1, I, Propagation, 5000 Effect Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 37 / 48

slide-58
SLIDE 58

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Intruder Rules

Γ : Pre Vulnerable ∧ ¬Compromise − → 2, I, Exploit 0day, 20000 Effect Compromise Γ : Pre Vulnerable ∧ ¬Compromise − → 10, I, Exploit Public, 500 Effect Compromise Γ : Pre ¬Compromise ∧ ✸Compromised − → 1, I, Propagation, 5000 Effect Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 37 / 48

slide-59
SLIDE 59

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Administrator Rules

Γ : Pre Vulnerable − → 4, A, Patch, 500 Effect ¬Vulnerable ∧ ¬Compromise

Elie Bursztein Using Strategy Objectives for Network Security Analysis 38 / 48

slide-60
SLIDE 60

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Strategy

S = (Attack, I, MAX(Reward) ∧ Max(OCost), OCost > Reward, Compromised)

Elie Bursztein Using Strategy Objectives for Network Security Analysis 39 / 48

slide-61
SLIDE 61

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2

Elie Bursztein Using Strategy Objectives for Network Security Analysis 40 / 48

slide-62
SLIDE 62

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2

T P Action Rule Target Succ Payoff Cost A choose Patch SSH ⊥

  • I

choose Exp 0 Day SSH ⊥

  • Elie Bursztein

Using Strategy Objectives for Network Security Analysis 40 / 48

slide-63
SLIDE 63

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 2

I execute Exp 0 Day SSH ⊥ 1 20000

Elie Bursztein Using Strategy Objectives for Network Security Analysis 40 / 48

slide-64
SLIDE 64

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 2

I choose propagation SQL SSH

  • Elie Bursztein

Using Strategy Objectives for Network Security Analysis 40 / 48

slide-65
SLIDE 65

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH SQL

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 3

I execute propagation SQL SSH 101 25000

Elie Bursztein Using Strategy Objectives for Network Security Analysis 40 / 48

slide-66
SLIDE 66

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH SQL

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 3

I choose propagation HTTP1 SQL

  • Elie Bursztein

Using Strategy Objectives for Network Security Analysis 40 / 48

slide-67
SLIDE 67

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH SQL HTTP

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 4

I execute propagation HTTP1 SQL 111 30000

Elie Bursztein Using Strategy Objectives for Network Security Analysis 40 / 48

slide-68
SLIDE 68

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SSH SQL HTTP

T P Action Rule Target Succ Payoff Cost A In Progress Patch SSH ⊥

  • 4

I choose propagation HTTP2 SQL

  • Elie Bursztein

Using Strategy Objectives for Network Security Analysis 40 / 48

slide-69
SLIDE 69

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SQL HTTP SSH

T P Action Rule Target Succ Payoff Cost 4 A execute Patch SSH SQL 1 500 I InProgress propagation HTTP2 SQL

  • Elie Bursztein

Using Strategy Objectives for Network Security Analysis 40 / 48

slide-70
SLIDE 70

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

SQL SSH HTTP HTTP2 SQL HTTP SSH HTTP2

T P Action Rule Target Succ Payoff Cost A ⊥ 1 500 5 I execute propagation HTTP2 SQL 121 35000

Elie Bursztein Using Strategy Objectives for Network Security Analysis 40 / 48

slide-71
SLIDE 71

Network Security Game Strategy Automated Analysis Conclusion What is a strategy ? Using strategy Play Example

Extending the model

We extended the anticipation game framework [EB,FAST’08] in

  • rder to model

◮ Multiples network cooperation ◮ Cost over the time (penalty) ◮ Timeline of events

Elie Bursztein Using Strategy Objectives for Network Security Analysis 41 / 48

slide-72
SLIDE 72

Network Security Game Strategy Automated Analysis Conclusion

Outline

Network Security Game Strategy Automated Analysis Conclusion

Elie Bursztein Using Strategy Objectives for Network Security Analysis 42 / 48

slide-73
SLIDE 73

Network Security Game Strategy Automated Analysis Conclusion

The Tool

We create an implementation in C (≈ 6500 lines) of the anticipation game framework called NetQi [EB,ATVA’08].

Elie Bursztein Using Strategy Objectives for Network Security Analysis 43 / 48

slide-74
SLIDE 74

Network Security Game Strategy Automated Analysis Conclusion

HomePage

Elie Bursztein Using Strategy Objectives for Network Security Analysis 44 / 48

slide-75
SLIDE 75

Network Security Game Strategy Automated Analysis Conclusion

Case study

Nb Nodes Nb Dep Strategy type Time 5200 27000 Defense Exact 2.4 sec 5200 27000 Intrusion Approximate 55 sec

Elie Bursztein Using Strategy Objectives for Network Security Analysis 45 / 48

slide-76
SLIDE 76

Network Security Game Strategy Automated Analysis Conclusion

Outline

Network Security Game Strategy Automated Analysis Conclusion

Elie Bursztein Using Strategy Objectives for Network Security Analysis 46 / 48

slide-77
SLIDE 77

Network Security Game Strategy Automated Analysis Conclusion

Conclusion

In this work we have

◮ Developed the notion of strategy ◮ Show how strategy allow to select the most interesting play ◮ Implemented the model in order to show the effectiveness

  • f the approach.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 47 / 48

slide-78
SLIDE 78

Network Security Game Strategy Automated Analysis Conclusion

Perspective

◮ Finding network key services. ◮ Using dynamic costs and rewards. ◮ Modeling various classes of attackers.

Elie Bursztein Using Strategy Objectives for Network Security Analysis 48 / 48