Building Virtual Environments for Security Analyses
of Complex Networked Systems
Mara Sorella, Ph.D.
Research center on Cyber Intelligence and Information Security (CIS)
Department of Computer, Control and Management Engineering
Sapienza University of Rome
Starting from the past decade, cyber attacks have become increasingly sophisticated,
stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative
interdisciplinary attack methods.
Introduction
Starting from the past decade, cyber attacks have become increasingly sophisticated,
stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative
interdisciplinary attack methods.
A common strategy is trying to play the role of the attacker and stress the network that is
aimed to protect. Another key aspect is personnel training.
Introduction
Starting from the past decade, cyber attacks have become increasingly sophisticated,
stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative
interdisciplinary attack methods.
A common strategy is trying to play the role of the attacker and stress the network that is
aimed to protect. Another key aspect is personnel training.
Need to have a separate, dedicated environment that should be able to:
▪ represent realistic scenarios that fit the security testing objectives
▪ support the definition of new scenarios and cyber threats in a cost and time-effective
manner
Introduction
Starting from the past decade, cyber attacks have become increasingly sophisticated,
stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative
interdisciplinary attack methods.
A common strategy is trying to play the role of the attacker and stress the network that is
aimed to protect. Another key aspect is personnel training.
Need to have a separate, dedicated environment that should be able to:
▪ represent realistic scenarios that fit the security testing objectives
▪ support the definition of new scenarios and cyber threats in a cost and time-effective
manner
Introduction
This is typically achieved by instrumenting virtual environments, referred as cyber ranges
Starting from the past decade, cyber attacks have become increasingly sophisticated,
stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative
interdisciplinary attack methods.
A common strategy is trying to play the role of the attacker and stress the network that is
aimed to protect. Another key aspect is personnel training.
Need to have a separate, dedicated environment that should be able to:
▪ represent realistic scenarios that fit the security testing objectives
▪ support the definition of new scenarios and cyber threats in a cost and time-effective
manner
Introduction
This is typically achieved by instrumenting virtual environments, referred as cyber ranges
Our Project: Motivation
Our Project: Motivation
▪ Research focus: threat modeling, network hardening algorithms
▪ Goal: test and evaluate our research products in realistic scenarios
Our Project: Motivation
▪ Research focus: threat modeling, network hardening algorithms
▪ Goal: test and evaluate our research products in realistic scenarios
▪ Issues
very few existing datasets available
limited information available
typically small scale networks (<10 nodes)
Our Project: Motivation
▪ Research focus: threat modeling, network hardening algorithms
▪ Goal: test and evaluate our research products in realistic scenarios
▪ Solution
A combination of techniques of network and security assessment, and
cloud technologies to enable the deployment of fully virtualized instances of computer
networks with high degree of affinity to actual reference scenarios
▪ Issues
very few existing datasets available
limited information available
typically small scale networks (<10 nodes)
Solution overview
Solution overview
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Solution overview
Testbed
Specification
Virtual Environment Infrastructure
Design choices
Major open source solutions: OpenNebula vs OpenStack
Private cloud management, Infrastructure as a Service platforms
Virtual Environment Infrastructure: IaaS
Major open source solutions: OpenNebula vs OpenStack
Private cloud management, Infrastructure as a Service platforms
vendor
stacks
Virtual Environment Infrastructure: IaaS
Major open source solutions: OpenNebula vs OpenStack
Private cloud management, Infrastructure as a Service platforms
- Complex, multitiered, vendor-driven
- Many subprojects, each with different maturity levels
vendor
stacks
Virtual Environment Infrastructure: IaaS
Major open source solutions: OpenNebula vs OpenStack
Private cloud management, Infrastructure as a Service platforms
- Complex, multitiered, vendor-driven
- Many subprojects, each with different maturity levels
- Ease of setup and use
- free, yet production ready
vendor
stacks
Virtual Environment Infrastructure: IaaS
Storage Layer
Maintaining VM OS Images (“templates”) repository: distributed/replicated filesystem
• Replicated mode: exact copies of the data are maintained on the bricks
• Fosters data locality at VM instantiation time
Storage Layer
Maintaining VM OS Images (“templates”) repository: distributed/replicated filesystem
• Replicated mode: exact copies of the data are maintained on the bricks
• Fosters data locality at VM instantiation time
/Images — GlusterFS mount point, OS images
/System — instantiated machines disks
/Files & Kernels — plain text files such as scripts
OpenNebula
Datastores
Storage Layer
Maintaining VM OS Images (“templates”) repository: distributed/replicated filesystem
Inter- and intra- LAN comms, across different physical nodes
Virtual switches: OpenVirtualSwitch, Linux Ethernet Bridge
• Keeps a MAC database:
tap0 — eth0
Network Layer
Inter/intra Virtual LAN communications across physical nodes
OVS
Software implementation of
a virtual multilayer network
switch
Inter- and intra- LAN comms, across different physical nodesNetwork Layer
OpenVirtualSwitch: software implementation of a virtual multilayer network switch
also enables efficient data
collection at the bridge level
SPAN (Switched Port Analyzer)
Virtual Infrastructure: Overview
Virtual Infrastructure: Overview
server 1 server 2 … server n
Virtual Infrastructure: Overview
server 1 server 2 … server n
oned
(master)
Virtual Infrastructure: Overview
server 1 server 2 … server n
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
server 1 server 2 … server n
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
switch (backbone)
server 1 server 2 … server n
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
firewall
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
firewall
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
firewall
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
firewall
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
EMULATION ENVIRONMENT INFRASTRUCTURE
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
firewall
switch (backbone)
server 1 server 2 … server n
br1
br2
br3
switch (service)
VIRTUAL TESTBED EMULATION ENVIRONMENT INFRASTRUCTURE
opennebula-kvm opennebula-kvmoned
(master)
Virtual Infrastructure: Overview
Testbed Design and Deployment
- Cyber range Laboratory
- Deploys a testbed starting from a YAML file (“infrastructure as a code”)
Automatic Testbed Deployment: Cylab
- Cyber range Laboratory
- Deploys a testbed starting from a YAML file (“infrastructure as a code”)
Automatic Testbed Deployment: Cylab
No opennebula provider
- Cyber range Laboratory
- Deploys a testbed starting from a YAML file (“infrastructure as a code”)
Automatic Testbed Deployment: Cylab
No opennebula provider
1. VLANs
A text-only configuration file (YAML representation)
A Testbed “spec”
A text-only configuration file (YAML representation)
Testbed
Specification
1. VLANs
2. VMs
A text-only configuration file (YAML representation)
A Testbed “spec”
A text-only configuration file (YAML representation)
Testbed
Specification
1. VLANs
2. VMs
A text-only configuration file (YAML representation)
A Testbed “spec”
A text-only configuration file (YAML representation)
+custom init script support
(CONTEXT / START_SCRIPT)
Testbed
Specification
1. VLANs
2. VMs
3. Virtual
Routers
A text-only configuration file (YAML representation)
A Testbed “spec”
A text-only configuration file (YAML representation)
+custom init script support
(CONTEXT / START_SCRIPT)
Testbed
Specification
1. VLANs
2. VMs
3. Virtual
Routers
4. Firewalls
A text-only configuration file (YAML representation)
A Testbed “spec”
A text-only configuration file (YAML representation)
+custom init script support
(CONTEXT / START_SCRIPT)
Testbed
Specification
Cylab:Architecture overview
Cylab:Architecture overview
Cylab:Architecture overview
Cylab:Architecture overview
service
installation
Applications
The infrastructure can support various activitiesApplications: Overview
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
The infrastructure can support various activitiesApplications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
3. Threat modeling & risk management
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
3. Threat modeling & risk management
• dynamic attack graph generation
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
3. Threat modeling & risk management
• dynamic attack graph generation
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
3. Threat modeling & risk management
• dynamic attack graph generation
• network hardening
• automatic attack path instantiation
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
[ICDCN ‘19] Tanasache, Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems
1. Cyber-range deployment for security training and testing
• cyber security scenario awareness
• incident management (detection, investigation, response)
2. Dataset generation
3. Threat modeling & risk management
• dynamic attack graph generation
• network hardening
• automatic attack path instantiation
The infrastructure can support various activities
case study [ICDCN ‘19]
Applications: Overview
Applications
Dataset Generation
Software agents deployed on the hosts, capturing
different behavioral patterns
Dataset Generation: benign traffic agents
Protocols
▪ HTTP/HTTPS
▪ SSH
▪ SMB
▪ SFTP
Software agents deployed on the hosts, capturing
different behavioral patterns
Dataset Generation: benign traffic agents
Protocols
▪ HTTP/HTTPS
▪ SSH
▪ SMB
▪ SFTP
Malicious activities performed in the testbed, covering a diverse set of attack
scenarios.
Web attack - Drupal
Ransomware Attack (WannaCry)
We collected a publicly released dataset containing complete network traces, enriched with labeled
features
Dataset Generation: cyber attacks
LAN1 LAN2
br1 br1
LAN3
br2 br2
LAN1
Data collection: network traffic
LAN1 LAN2
br1 br1
LAN3
br2 br2
LAN1
Data collection: network traffic
LAN1 LAN2
br1 br1
LAN3
br2 br2
LAN1
Data collection: network traffic
For each network to be monitored, OVS port mirroring (SPAN) allows to mirror the traffic from all VM
network interfaces toward a specific output port (1 x br x node)
LAN1 LAN2
br1 br1
LAN3
br2 br2
LAN1
Data collection: network traffic
For each network to be monitored, OVS port mirroring (SPAN) allows to mirror the traffic from all VM
network interfaces toward a specific output port (1 x br x node)
Information to be gathered from the virtual testbed include:
• routing tables
• system logs
• firewall rules
• ACLs from network devices
• installed applications (+CVE)
• running services
• open ports
This info is using an out-of-band “management” interface for each machine
Data collection: metadata
Toward a flexible and fully automated testbed
▪ Service + host behavior on-demand installation
Ansible server + Catalog server
Ongoing work
Toward a flexible and fully automated testbed
▪ Service + host behavior on-demand installation
Ansible server + Catalog server
▪ Terraform Integration (opennebula provider)
Ongoing work
Toward a flexible and fully automated testbed
▪ Service + host behavior on-demand installation
Ansible server + Catalog server
▪ Terraform Integration (opennebula provider)
Ongoing work
fork
fork
Toward a flexible and fully automated testbed
▪ Service + host behavior on-demand installation
Ansible server + Catalog server
▪ Terraform Integration (opennebula provider)
Ongoing work
fork
fork
oneuser
oneacl
onehost
onecluster
API support still lacking:
…
OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of Complex Networked Systems - Mara Sorella - Sapienza Univ. of Rome

OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of Complex Networked Systems - Mara Sorella - Sapienza Univ. of Rome

  • 1.
    Building Virtual Environmentsfor Security Analyses of Complex Networked Systems Mara Sorella, Ph.D. Research center on Cyber Intelligence and Information Security (CIS) Department of Computer, Control and Management Engineering Sapienza University of Rome
  • 2.
    Starting from thepast decade, cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative interdisciplinary attack methods. Introduction
  • 3.
    Starting from thepast decade, cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative interdisciplinary attack methods. A common strategy is trying to play the role of the attacker and stress the network that is aimed to protect. Another key aspect is personnel training. Introduction
  • 4.
    Starting from thepast decade, cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative interdisciplinary attack methods. A common strategy is trying to play the role of the attacker and stress the network that is aimed to protect. Another key aspect is personnel training. Need to have a separate, dedicated environment that should be able to: ▪ represent realistic scenarios that fit the security testing objectives ▪ support the definition of new scenarios and cyber threats in a cost and time-effective manner Introduction
  • 5.
    Starting from thepast decade, cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative interdisciplinary attack methods. A common strategy is trying to play the role of the attacker and stress the network that is aimed to protect. Another key aspect is personnel training. Need to have a separate, dedicated environment that should be able to: ▪ represent realistic scenarios that fit the security testing objectives ▪ support the definition of new scenarios and cyber threats in a cost and time-effective manner Introduction This is typically achieved by instrumenting virtual environments, referred as cyber ranges
  • 6.
    Starting from thepast decade, cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted, featuring zero-day exploits and highly creative interdisciplinary attack methods. A common strategy is trying to play the role of the attacker and stress the network that is aimed to protect. Another key aspect is personnel training. Need to have a separate, dedicated environment that should be able to: ▪ represent realistic scenarios that fit the security testing objectives ▪ support the definition of new scenarios and cyber threats in a cost and time-effective manner Introduction This is typically achieved by instrumenting virtual environments, referred as cyber ranges
  • 7.
  • 8.
    Our Project: Motivation ▪Research focus: threat modeling, network hardening algorithms ▪ Goal: test and evaluate our research products in realistic scenarios
  • 9.
    Our Project: Motivation ▪Research focus: threat modeling, network hardening algorithms ▪ Goal: test and evaluate our research products in realistic scenarios ▪ Issues very few existing datasets available limited information available typically small scale networks (<10 nodes)
  • 10.
    Our Project: Motivation ▪Research focus: threat modeling, network hardening algorithms ▪ Goal: test and evaluate our research products in realistic scenarios ▪ Solution A combination of techniques of network and security assessment, and cloud technologies to enable the deployment of fully virtualized instances of computer networks with high degree of affinity to actual reference scenarios ▪ Issues very few existing datasets available limited information available typically small scale networks (<10 nodes)
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
    Major open sourcesolutions: OpenNebula vs OpenStack Private cloud management, Infrastructure as a Service platforms Virtual Environment Infrastructure: IaaS
  • 22.
    Major open sourcesolutions: OpenNebula vs OpenStack Private cloud management, Infrastructure as a Service platforms vendor stacks Virtual Environment Infrastructure: IaaS
  • 23.
    Major open sourcesolutions: OpenNebula vs OpenStack Private cloud management, Infrastructure as a Service platforms - Complex, multitiered, vendor-driven - Many subprojects, each with different maturity levels vendor stacks Virtual Environment Infrastructure: IaaS
  • 24.
    Major open sourcesolutions: OpenNebula vs OpenStack Private cloud management, Infrastructure as a Service platforms - Complex, multitiered, vendor-driven - Many subprojects, each with different maturity levels - Ease of setup and use - free, yet production ready vendor stacks Virtual Environment Infrastructure: IaaS
  • 25.
    Storage Layer Maintaining VMOS Images (“templates”) repository: distributed/replicated filesystem
  • 26.
    • Replicated mode:exact copies of the data are maintained on the bricks • Fosters data locality at VM instantiation time Storage Layer Maintaining VM OS Images (“templates”) repository: distributed/replicated filesystem
  • 27.
    • Replicated mode:exact copies of the data are maintained on the bricks • Fosters data locality at VM instantiation time /Images — GlusterFS mount point, OS images /System — instantiated machines disks /Files & Kernels — plain text files such as scripts OpenNebula Datastores Storage Layer Maintaining VM OS Images (“templates”) repository: distributed/replicated filesystem
  • 28.
    Inter- and intra-LAN comms, across different physical nodes Virtual switches: OpenVirtualSwitch, Linux Ethernet Bridge • Keeps a MAC database: tap0 — eth0 Network Layer Inter/intra Virtual LAN communications across physical nodes OVS Software implementation of a virtual multilayer network switch
  • 29.
    Inter- and intra-LAN comms, across different physical nodesNetwork Layer OpenVirtualSwitch: software implementation of a virtual multilayer network switch also enables efficient data collection at the bridge level SPAN (Switched Port Analyzer)
  • 30.
  • 31.
  • 32.
    server 1 server2 … server n Virtual Infrastructure: Overview
  • 33.
    server 1 server2 … server n oned (master) Virtual Infrastructure: Overview
  • 34.
    server 1 server2 … server n opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 35.
    server 1 server2 … server n opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 36.
    switch (backbone) server 1server 2 … server n opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 37.
    switch (backbone) server 1server 2 … server n br1 br2 br3 opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 38.
    switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 39.
    firewall switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 40.
    firewall switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 41.
    firewall switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 42.
    firewall switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) EMULATION ENVIRONMENT INFRASTRUCTURE opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 43.
    firewall switch (backbone) server 1server 2 … server n br1 br2 br3 switch (service) VIRTUAL TESTBED EMULATION ENVIRONMENT INFRASTRUCTURE opennebula-kvm opennebula-kvmoned (master) Virtual Infrastructure: Overview
  • 44.
  • 45.
    - Cyber rangeLaboratory - Deploys a testbed starting from a YAML file (“infrastructure as a code”) Automatic Testbed Deployment: Cylab
  • 46.
    - Cyber rangeLaboratory - Deploys a testbed starting from a YAML file (“infrastructure as a code”) Automatic Testbed Deployment: Cylab No opennebula provider
  • 47.
    - Cyber rangeLaboratory - Deploys a testbed starting from a YAML file (“infrastructure as a code”) Automatic Testbed Deployment: Cylab No opennebula provider
  • 48.
    1. VLANs A text-onlyconfiguration file (YAML representation) A Testbed “spec” A text-only configuration file (YAML representation) Testbed Specification
  • 49.
    1. VLANs 2. VMs Atext-only configuration file (YAML representation) A Testbed “spec” A text-only configuration file (YAML representation) Testbed Specification
  • 50.
    1. VLANs 2. VMs Atext-only configuration file (YAML representation) A Testbed “spec” A text-only configuration file (YAML representation) +custom init script support (CONTEXT / START_SCRIPT) Testbed Specification
  • 51.
    1. VLANs 2. VMs 3.Virtual Routers A text-only configuration file (YAML representation) A Testbed “spec” A text-only configuration file (YAML representation) +custom init script support (CONTEXT / START_SCRIPT) Testbed Specification
  • 52.
    1. VLANs 2. VMs 3.Virtual Routers 4. Firewalls A text-only configuration file (YAML representation) A Testbed “spec” A text-only configuration file (YAML representation) +custom init script support (CONTEXT / START_SCRIPT) Testbed Specification
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
    The infrastructure cansupport various activitiesApplications: Overview
  • 59.
    1. Cyber-range deploymentfor security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) The infrastructure can support various activitiesApplications: Overview
  • 60.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 61.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation 3. Threat modeling & risk management The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 62.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation 3. Threat modeling & risk management • dynamic attack graph generation The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 63.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation 3. Threat modeling & risk management • dynamic attack graph generation The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 64.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation 3. Threat modeling & risk management • dynamic attack graph generation • network hardening • automatic attack path instantiation The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 65.
    [ICDCN ‘19] Tanasache,Sorella, Bonomi, Rapone, Meacci. Building an emulation environment for cyber security analyses of complex networked systems 1. Cyber-range deployment for security training and testing • cyber security scenario awareness • incident management (detection, investigation, response) 2. Dataset generation 3. Threat modeling & risk management • dynamic attack graph generation • network hardening • automatic attack path instantiation The infrastructure can support various activities case study [ICDCN ‘19] Applications: Overview
  • 66.
  • 67.
    Software agents deployedon the hosts, capturing different behavioral patterns Dataset Generation: benign traffic agents Protocols ▪ HTTP/HTTPS ▪ SSH ▪ SMB ▪ SFTP
  • 68.
    Software agents deployedon the hosts, capturing different behavioral patterns Dataset Generation: benign traffic agents Protocols ▪ HTTP/HTTPS ▪ SSH ▪ SMB ▪ SFTP
  • 69.
    Malicious activities performedin the testbed, covering a diverse set of attack scenarios. Web attack - Drupal Ransomware Attack (WannaCry) We collected a publicly released dataset containing complete network traces, enriched with labeled features Dataset Generation: cyber attacks
  • 70.
    LAN1 LAN2 br1 br1 LAN3 br2br2 LAN1 Data collection: network traffic
  • 71.
    LAN1 LAN2 br1 br1 LAN3 br2br2 LAN1 Data collection: network traffic
  • 72.
    LAN1 LAN2 br1 br1 LAN3 br2br2 LAN1 Data collection: network traffic For each network to be monitored, OVS port mirroring (SPAN) allows to mirror the traffic from all VM network interfaces toward a specific output port (1 x br x node)
  • 73.
    LAN1 LAN2 br1 br1 LAN3 br2br2 LAN1 Data collection: network traffic For each network to be monitored, OVS port mirroring (SPAN) allows to mirror the traffic from all VM network interfaces toward a specific output port (1 x br x node)
  • 74.
    Information to begathered from the virtual testbed include: • routing tables • system logs • firewall rules • ACLs from network devices • installed applications (+CVE) • running services • open ports This info is using an out-of-band “management” interface for each machine Data collection: metadata
  • 75.
    Toward a flexibleand fully automated testbed ▪ Service + host behavior on-demand installation Ansible server + Catalog server Ongoing work
  • 76.
    Toward a flexibleand fully automated testbed ▪ Service + host behavior on-demand installation Ansible server + Catalog server ▪ Terraform Integration (opennebula provider) Ongoing work
  • 77.
    Toward a flexibleand fully automated testbed ▪ Service + host behavior on-demand installation Ansible server + Catalog server ▪ Terraform Integration (opennebula provider) Ongoing work fork fork
  • 78.
    Toward a flexibleand fully automated testbed ▪ Service + host behavior on-demand installation Ansible server + Catalog server ▪ Terraform Integration (opennebula provider) Ongoing work fork fork oneuser oneacl onehost onecluster API support still lacking: …