SlideShare a Scribd company logo
1 of 8
www.cci.msstate.edu
A Model-Integrated Approach to
Designing Self-Protecting Systems
Stefano Iannucci, Member, IEEE, Sherif Abdelwahed, Senior Member, IEEE,
Andrea Montemaggio, Melissa Hannis, Leslie Leonard, Jason S. King, John A. Hamilton, Jr., Senior Member, IEEE
Presented by:
Andrea Montemaggio
Research Engineer II, CCI
a.montemaggio@msstate.edu
Funding for this work was partially provided by
the U.S. Army Engineer Research and Development Center (ERDC)
under contract W912HZ-17-C-0019
www.cci.msstate.edu
Automation
New Demand in Cyber Security
Past and Present
• Independent heterogeneous security
components
• Manual correlation of security events
• Manual planning and execution of the defense
strategy
• Sometimes, static attack/response mapping
The Future: Autonomic Security Management
• Automatic learning of system and attacker’s
behavior
• Prediction of the system evolution and of the
attacker strategy
• Proactive and automatic defense with security
components orchestration or choreography
www.cci.msstate.edu
MAPE loop for Cyber Security domain
Autonomic Security Management
Monitor
Information
Gathering
NIDS
Event
LOG
Event
HIDS
Event
Analyze
Event Manager
Plan
Defense Strategy
Planner
Execute
Policy Executor
Response
Policy
Distributed System
Response Policy Execution
Event
Stream
Sensors Effectors
Different
Event Streams
www.cci.msstate.edu
System model design workflow with GME1
Model-Integrated Approach
Components
and Topology
Attributes Actions Security Policy
[1] Generic Modeling Environment, http://www.isis.vanderbilt.edu/Projects/gme.
www.cci.msstate.edu
System model to Markov Decision Process (MDP)
Model-Integrated Approach
System Model
Interpretation and
Transformation
MDP Planning
XSLTXML
JAXB
Transformation
MDP BURLAP2
[2] Brown-UBMC Reinforcement Learning and Planning Java library, http://burlap.cs.brown.edu.
Plan
www.cci.msstate.edu
“The curse of dimensionality” (Bellman, 1957)
Challenges
Model Reduction
Theorem. All the attributes that do not directly or
indirectly affect the security policy can be
eliminated.
• Optimal solutions are preserved.
• Off-line application: does not depend on the
system state.
• Complexity is bound to the security policy, not
the whole model.
Richard E. Bellman
Hey, you’ve got a problem here.
The state space grows exponentially with the number of attributes in your model!
Knowledge-Based Heuristics
Knowledge coming from sensors (system state) is
leveraged to determine the set of attributes to
keep.
• More aggressive state space reduction, at the
cost of producing sub-optimal solutions.
• On-line application: depend on the system
state.
www.cci.msstate.edu
Building a reduced model to counter the attack’s effects
Attack Scope Heuristic
The smaller the attack scope, the more effective the
reduction is (less variables are retained).
A case showing that the planned solution may be sub-
optimal.
www.cci.msstate.edu
Thank you for your time.
Andrea Montemaggio
a.montemaggio@msstate.edu
Mississippi State University
2 Research Blvd
Starkville, MS 39759
USA
How to reach me
Autonomic Computing for
Cyber Security
Model-Integrated
approach
Model Interpretation:
building a Markov
Decision Process
MDP-based planning:
complexity issues and
mitigation strategies
Attack scope heuristic:
experimental data

More Related Content

Similar to ICSE 2019 A Model-Integrated Approach to Desiging Self Protecting Systems

Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Harnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfHarnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfCIOWomenMagazine
 
Technology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryTechnology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryCR Group
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centerVenkat Projects
 
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...Andrea Montemaggio
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Security_by_Design.pptx
Security_by_Design.pptxSecurity_by_Design.pptx
Security_by_Design.pptxAshuPatel64
 
Security_by_Design.pdf
Security_by_Design.pdfSecurity_by_Design.pdf
Security_by_Design.pdfAshuPatel64
 
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)Vladimir Kochetkov
 
AI The Future of Proactive Cybersecurity.pptx
AI The Future of Proactive Cybersecurity.pptxAI The Future of Proactive Cybersecurity.pptx
AI The Future of Proactive Cybersecurity.pptxElSayedSanad1
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...IEEEMEMTECHSTUDENTSPROJECTS
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionJK Tech
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber securitycsandit
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...cscpconf
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 

Similar to ICSE 2019 A Model-Integrated Approach to Desiging Self Protecting Systems (20)

Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Harnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfHarnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdf
 
Technology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryTechnology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk Advisory
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Security_by_Design.pptx
Security_by_Design.pptxSecurity_by_Design.pptx
Security_by_Design.pptx
 
Security_by_Design.pdf
Security_by_Design.pdfSecurity_by_Design.pdf
Security_by_Design.pdf
 
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
 
AI The Future of Proactive Cybersecurity.pptx
AI The Future of Proactive Cybersecurity.pptxAI The Future of Proactive Cybersecurity.pptx
AI The Future of Proactive Cybersecurity.pptx
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber security
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

ICSE 2019 A Model-Integrated Approach to Desiging Self Protecting Systems

  • 1. www.cci.msstate.edu A Model-Integrated Approach to Designing Self-Protecting Systems Stefano Iannucci, Member, IEEE, Sherif Abdelwahed, Senior Member, IEEE, Andrea Montemaggio, Melissa Hannis, Leslie Leonard, Jason S. King, John A. Hamilton, Jr., Senior Member, IEEE Presented by: Andrea Montemaggio Research Engineer II, CCI a.montemaggio@msstate.edu Funding for this work was partially provided by the U.S. Army Engineer Research and Development Center (ERDC) under contract W912HZ-17-C-0019
  • 2. www.cci.msstate.edu Automation New Demand in Cyber Security Past and Present • Independent heterogeneous security components • Manual correlation of security events • Manual planning and execution of the defense strategy • Sometimes, static attack/response mapping The Future: Autonomic Security Management • Automatic learning of system and attacker’s behavior • Prediction of the system evolution and of the attacker strategy • Proactive and automatic defense with security components orchestration or choreography
  • 3. www.cci.msstate.edu MAPE loop for Cyber Security domain Autonomic Security Management Monitor Information Gathering NIDS Event LOG Event HIDS Event Analyze Event Manager Plan Defense Strategy Planner Execute Policy Executor Response Policy Distributed System Response Policy Execution Event Stream Sensors Effectors Different Event Streams
  • 4. www.cci.msstate.edu System model design workflow with GME1 Model-Integrated Approach Components and Topology Attributes Actions Security Policy [1] Generic Modeling Environment, http://www.isis.vanderbilt.edu/Projects/gme.
  • 5. www.cci.msstate.edu System model to Markov Decision Process (MDP) Model-Integrated Approach System Model Interpretation and Transformation MDP Planning XSLTXML JAXB Transformation MDP BURLAP2 [2] Brown-UBMC Reinforcement Learning and Planning Java library, http://burlap.cs.brown.edu. Plan
  • 6. www.cci.msstate.edu “The curse of dimensionality” (Bellman, 1957) Challenges Model Reduction Theorem. All the attributes that do not directly or indirectly affect the security policy can be eliminated. • Optimal solutions are preserved. • Off-line application: does not depend on the system state. • Complexity is bound to the security policy, not the whole model. Richard E. Bellman Hey, you’ve got a problem here. The state space grows exponentially with the number of attributes in your model! Knowledge-Based Heuristics Knowledge coming from sensors (system state) is leveraged to determine the set of attributes to keep. • More aggressive state space reduction, at the cost of producing sub-optimal solutions. • On-line application: depend on the system state.
  • 7. www.cci.msstate.edu Building a reduced model to counter the attack’s effects Attack Scope Heuristic The smaller the attack scope, the more effective the reduction is (less variables are retained). A case showing that the planned solution may be sub- optimal.
  • 8. www.cci.msstate.edu Thank you for your time. Andrea Montemaggio a.montemaggio@msstate.edu Mississippi State University 2 Research Blvd Starkville, MS 39759 USA How to reach me Autonomic Computing for Cyber Security Model-Integrated approach Model Interpretation: building a Markov Decision Process MDP-based planning: complexity issues and mitigation strategies Attack scope heuristic: experimental data

Editor's Notes

  1. There’s a new demand in Cyber Security: automation. Every day, system administrators face new cyber attacks and most of the tasks along the cyber threat management process are still performed manually or require human intervention, especially in the Intrusion Response phase. While a lot of research has been done on the Intrusion Detection phase, very few exists on the Intrusion Response phase, and most of the available tools address the problem providing a static mapping between a certain attack signature and a specific response. However, the increasing complexity of the enterprise systems to be protected, as well as the huge growth of cyber threats make this process overwhelming for any security professional. Instead, our research tries to attack the problem from a different angle, trying to apply the concepts of the Autonomic Computing initiative to the Cyber Security domain.
  2. The reference framework on top of that we built the Autonomic Security Management system is the MAPE loop for Autonomic Computing. In the context on Cyber Security, we have the enterprise system we want to protect which is instrumented with several sensors capable of gathering different kind of information at runtime. For instance, think about these sensors as the monitoring systems and the Intrusion Detection Systems you already have in place. All the information coming from the sensors is collected in the Monitor phase of the MAPE loop. Afterwards, the different information streams are aggregated into a unified view: the system state. Hence, the Analyzer component constantly evaluates the system state stream against the security policy that has been defined for the system to tell if the system is safe or not. When the security policy is not satisfied, a system state is considered unsafe, and a change request is issued. The Planner component catches the change request and plans a defense strategy, which is a sequence of actions to protect the system. Finally, this sequence of actions is passed to the Executor component, that interprets it and oversees its execution on the system. All the phases make use of some knowledge about the system to protect: this knowledge is encoded into a system model.
  3. The system model is designed with the Generic Modeling Environment tool from Vanderbilt University, according to the following workflow. Firstly, the components of the system and their topology are defined. Secondly, for each component the attributes must be defined, in terms of variable name and type. Afterwards, all the actions that can be performed on the various components are specified: an action is defined by its name, a Boolean expression over the system attributes that defines the pre-conditions that must hold in a certain state for the action to be executable in that state, and a probability distribution of post-conditions that model the impact of the action on the system state. Finally, the security policy for the system is defined through a Boolean expression over the system attributes. The evaluation of this expression against a certain system state determines if the system is safe or not.
  4. Our approach to planning is based on Reinforcement Learning so, for a given a system model, we must build and solve a Markov Decision Process to deliver a defense plan to bring the system from the unsafe state that triggered the planning to a safe one. The process of building an MDP from a GME model starts from the XML representation produced by GME and goes through an interpretation and transformation stage that produces an MDP instance suitable to be solved with the open-source Java library BURLAP. Once the problem is solved, the plan is ready to be picked-up by the Executor and run onto the system.
  5. As Richard Bellman kindly reminds us, this approach suffers of the “curse of dimensionality”, so the state space grows exponentially with the number of attributes used to model the system. This is true, so we developed several techniques to mitigate the impact of this problem and keep the MDP-based approach feasible for the domain of interest. The first one is an off-line model reduction technique that eliminates all the attributes that do not affect the security policy, preserving the possibility to find optimal solutions. The same attribute elimination technique can be applied in an on-line fashion, thus leveraging some knowledge gathered at run time. As an example, given a certain attack, instead of solving the MDP for all the attributes, we can build a reduced MDP model by keeping only the attributes included in the attack scope.
  6. Here we have some experimental results for this heuristic: the solid line is relative to the full MDP model, while the dashed line is relative to the reduced model built for the given attack scope. On the left we can see the effectiveness of the reduction of the explored state space, while on the right side we depict a case of sub-optimality of the solution.