SlideShare a Scribd company logo
1 of 13
Download to read offline
CYBER WARFARE 
SERIOUS GAMES 
Prateek Sachdev Vidit Gupta Reshmi Suresh! 
Faculty mentor: Kavita Vemuri
MOTIVATION 
✤ This game can be used in teaching/learning the 
application of defense strategies against cyber-crimes 
that involve worms.
OVERVIEW 
✤ Initially, the game has servers connected to each other 
through an open, unprotected network.! 
✤ The worm is present at one of the nodes of the 
network and slowly infects the entire network/the 
desired server using different algorithms depending 
upon it's AI component.
DELIVERABLE 1 
✤ Construction of graph based on user input.User may 
move the nodes around if required.! 
✤ Distinction of nodes using appropriate look for its 
current state.! 
✤ A console to enable user to do the following 
a) Delete a node from the graph 
b) Enable/Disable a firewall at some node
…Continued 
✤ A virus with a basic AI engine that enables it to do the 
following: 
a) Find the most appropriate node to attack (based on degree of node) 
b) Find the most suitable path to reach the destination (higher degree 
nodes preferred) 
c) Not move past IPS and look for alternative paths 
d)The virus moves at a particular gap of time and not instantaneously
DELIVERABLE 2 
✤ Multiple viruses each with it's own characteristics 
where 
a) They have varying pace of movement 
b) They have different kinds of AI 
c) They have different objectives! 
✤ Zones in the graph and classification based on type of 
servers.
…Continued 
! 
✤ 3. The user has following options 
a) Enable a limited number of IPS in such a way that one 
zone does not slow down it's communication 
b) Temporarily disable/ delete a certain node 
c) Add an edge between two nodes! 
✤ 4. Player can get information of a particular node! 
✤ 5. Multi agent system
DELIVERABLE 3 
✤ Add node : 
Usage : Press ‘v’ followed by a number defining the 
zone 
A new node with a unique identifier and zone number 
as given. It creates a force of attraction with the node it 
is connected to by an edge
…Continued 
✤ Score: 
Player has initial score of 1000 points. After each operation 
score decreases/increases by a factor based on the following: 
- IPS (Server priority) 
- Node Deletion (degree of node) 
- Enable/Disable Node 
- Edge addition 
- Virus intrusion
…Continued 
✤ Virus Attacking Articulation Points: 
Articulation points are essential to the graph as their 
removal renders the graph disconnected. 
- Virus gets all articulation points 
- Finds paths to all of them. 
- Takes the shortest path and starts following it 
Reference paper: Articulation Points - J. Mestre
…Continued 
✤ Select any combination of viruses: 
You can select any combination of viruses to start with. These can 
later be divided into different levels! 
✤ Multi-agent behavior: 
Viruses communicate with each other to make sure they choose 
paths that do not coincide to ensure maximum damage 
Reference paper: Multi Agent Simulation: Tahar Guerram, Dehimi, 
Nour El Houda
“DEMO”
“Thank you”

More Related Content

Viewers also liked

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-time
DataWorks Summit
 
Artificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & RecognitionArtificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & Recognition
ahmadali999
 

Viewers also liked (20)

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-time
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
Artificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & RecognitionArtificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & Recognition
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber Security
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 
Security Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture ItaliaSecurity Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture Italia
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Network Automation in Support of Cyber Defense
Network Automation in Support of Cyber DefenseNetwork Automation in Support of Cyber Defense
Network Automation in Support of Cyber Defense
 

Similar to Cyber Warfare Systems

Analyze the detected attacks and create a report that describes each.pdf
Analyze the detected attacks and create a report that describes each.pdfAnalyze the detected attacks and create a report that describes each.pdf
Analyze the detected attacks and create a report that describes each.pdf
ivylinvaydak64229
 
Multiplayer Networking Game
Multiplayer Networking GameMultiplayer Networking Game
Multiplayer Networking Game
Tanmay Krishna
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
Muqeed Abdul
 
metaploit framework
metaploit frameworkmetaploit framework
metaploit framework
Le Quyen
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 

Similar to Cyber Warfare Systems (20)

Analyze the detected attacks and create a report that describes each.pdf
Analyze the detected attacks and create a report that describes each.pdfAnalyze the detected attacks and create a report that describes each.pdf
Analyze the detected attacks and create a report that describes each.pdf
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Multiplayer Networking Game
Multiplayer Networking GameMultiplayer Networking Game
Multiplayer Networking Game
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
metaploit framework
metaploit frameworkmetaploit framework
metaploit framework
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure  BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
 
Netforts
Netforts Netforts
Netforts
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Thinking Outside the Sand[box]
Thinking Outside the Sand[box]Thinking Outside the Sand[box]
Thinking Outside the Sand[box]
 
HKUST Security Lab Opening Ceremony
HKUST Security Lab Opening CeremonyHKUST Security Lab Opening Ceremony
HKUST Security Lab Opening Ceremony
 
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
 
I017355767
I017355767I017355767
I017355767
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

Cyber Warfare Systems

  • 1. CYBER WARFARE SERIOUS GAMES Prateek Sachdev Vidit Gupta Reshmi Suresh! Faculty mentor: Kavita Vemuri
  • 2. MOTIVATION ✤ This game can be used in teaching/learning the application of defense strategies against cyber-crimes that involve worms.
  • 3. OVERVIEW ✤ Initially, the game has servers connected to each other through an open, unprotected network.! ✤ The worm is present at one of the nodes of the network and slowly infects the entire network/the desired server using different algorithms depending upon it's AI component.
  • 4. DELIVERABLE 1 ✤ Construction of graph based on user input.User may move the nodes around if required.! ✤ Distinction of nodes using appropriate look for its current state.! ✤ A console to enable user to do the following a) Delete a node from the graph b) Enable/Disable a firewall at some node
  • 5. …Continued ✤ A virus with a basic AI engine that enables it to do the following: a) Find the most appropriate node to attack (based on degree of node) b) Find the most suitable path to reach the destination (higher degree nodes preferred) c) Not move past IPS and look for alternative paths d)The virus moves at a particular gap of time and not instantaneously
  • 6. DELIVERABLE 2 ✤ Multiple viruses each with it's own characteristics where a) They have varying pace of movement b) They have different kinds of AI c) They have different objectives! ✤ Zones in the graph and classification based on type of servers.
  • 7. …Continued ! ✤ 3. The user has following options a) Enable a limited number of IPS in such a way that one zone does not slow down it's communication b) Temporarily disable/ delete a certain node c) Add an edge between two nodes! ✤ 4. Player can get information of a particular node! ✤ 5. Multi agent system
  • 8. DELIVERABLE 3 ✤ Add node : Usage : Press ‘v’ followed by a number defining the zone A new node with a unique identifier and zone number as given. It creates a force of attraction with the node it is connected to by an edge
  • 9. …Continued ✤ Score: Player has initial score of 1000 points. After each operation score decreases/increases by a factor based on the following: - IPS (Server priority) - Node Deletion (degree of node) - Enable/Disable Node - Edge addition - Virus intrusion
  • 10. …Continued ✤ Virus Attacking Articulation Points: Articulation points are essential to the graph as their removal renders the graph disconnected. - Virus gets all articulation points - Finds paths to all of them. - Takes the shortest path and starts following it Reference paper: Articulation Points - J. Mestre
  • 11. …Continued ✤ Select any combination of viruses: You can select any combination of viruses to start with. These can later be divided into different levels! ✤ Multi-agent behavior: Viruses communicate with each other to make sure they choose paths that do not coincide to ensure maximum damage Reference paper: Multi Agent Simulation: Tahar Guerram, Dehimi, Nour El Houda