SlideShare a Scribd company logo
PROACTIVE SCHEMES FOR MISSION ASSURANCE IN CRITICAL SYSTEMS Ruchika Mehresh Ph.D. Dissertation Proposal Defense Department of Computer Science and Engineering University at Buffalo, The State University of New York December 20, 2011 Advisor : Dr. Shambhu Upadhyaya Committee Members :  Dr. H. Raghav Rao Dr. Murat Demirbas
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INTRODUCTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INTRODUCTION Focus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION Prevention Detection Recovery
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INTRODUCTION
[object Object],[object Object],MOTIVATION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MOTIVATION
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Deception as a tool Component 1 Component 2 Component 3 Threat Model Solution Evaluation
[object Object],[object Object],[object Object],[object Object],[object Object],MOTIVATION
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
PROBLEM FORMULATION 1.  System type : Mission critical 2.  Last wall of defense : secure recovery phase for mission survivability 3.  Mission Survivability : Satisfy timeliness property 4.  Indefinite missions : time-independent security strength  5.  Focus : on event’s impact, not cause 6.  Attack model : basis for solution design 7.  Tamper-proof : ‘Who watches the watcher ?’  8. Effective Evaluation 9. Integrity over availability
PROBLEM FORMULATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
BACKGROUND National Counter Intelligence executive mentioned malicious sleeper code left behind by other nation-states Multi-stage delivery of malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Botnet ‘command and control’
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],BACKGROUND
BACKGROUND ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],BACKGROUND
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
SOLUTION DESIGN Component 1: Surreptitious intrusion detection by keeping the IDS tamper-proof  Component 2: Making the integrity signature invisible and accessible to the attacker  Component 3: Deception-based proactive recovery scheme, and multi-phase evaluation framework
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CONTRIBUTIONS
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],DECEPTION FOR DEFENSE
DECEPTION FOR DEFENSE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THREAT MODEL
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THREAT MODEL
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EXISTING SOLUTIONS
EXISTING SOLUTIONS ,[object Object],[object Object],[object Object],[object Object]
PROPOSED SOLUTION ,[object Object],[object Object],[object Object]
WHY MULTI-CORE ,[object Object],[object Object],[object Object]
SIMPLE ARCHITECTURE Intrusion detector or a crucial user space service Lightweight process monitor Direction  of Monitoring Process  i  runs on core  i , and 1≤i≤K, where  K  is the total number of cores on the processor Numbers from 1-K indicate the K cores of the host’s processor 2 3 4 5 6 1 K K-1
THREAT MODEL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FRAMEWORK TOPOLOGIES ,[object Object],[object Object],A circulant digraph C K (a 1 , . . . , a n ) with K vertices v 0 , . . . v K−1  and jumps a 1 , . . . , a n ,  0 < a i  < ⌊K/2⌋, is a directed graph such that there is a  directed edge each from all the vertices v j ±a i  mod K, for 1 < i < n  to the vertex v j , 0 < j <K – 1. It is also homogeneous i.e., every vertex has the same degree (number of incident edges), which is 2n, except when a i  =K/2 for some i, when the degree is 2n−1 Figure:  Circulant digraph with 8 process monitors running on 8 cores. One process monitor per core. This circulant digraph has a degree of incidence 3 and jumps {1,2} 3 5 4 6 7 8 2 1
FRAMEWORK TOPOLOGIES ,[object Object],[object Object],[object Object],Figure: Adaptive topology when cores 2 and K are heavily loaded 1 K-1 … . … . 4 3 K 2
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ATTACK SCENARIOES
EVALUATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EVALUATION – TIME OVERHEAD Figure: Time Overhead (Initial setup time for the kqueue subsystem to get loaded) for circulant digraph topology with  8 process monitors ,[object Object]
EVALUATION – TAMPER RESISTANCE Figure: Alerts generated for killing process monitors in sequential order without delay, under light system load Figure: Alerts generated for killing process monitors in sequential order without delay, under heavy system load
CONCLUSION ,[object Object],[object Object],[object Object],[object Object]
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THREAT MODEL
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THREAT MODEL
THREAT MODEL
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],COMPONENTS 2 AND 3 “ Hiding detection?” AND “Deception-based recovery”
Coordinator Replica 1 Replica 2 Replica 3 Replica n Workload Workload Workload Workload Workload Replica 3 R R R R Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature Need at least a duplex system H C H C H C H C Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature
HARDWARE SIGNATURE GENERATION
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
PERFORMANCE ANALYSIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MULTI-STEP EVALUATION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MULTI-STEP EVALUATION
MULTI-STEP APPROACH
RESULTS
RESULTS
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object]
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],REVISITING SOLUTION DESIGN Intrusion  Detection  System Symptoms to Script mapping (Smart box) Smart Script Repository
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
REMAINING WORK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
DISSERTATION OUTLINE Chapters Topic s Chapter 1 Introduction Chapter 2 Background Chapter 3 Problem Formulation Chapter 4 Surreptitious intrusion detection by keeping the IDS tamper-proof (For both centralized and decentralized environment) Chapter 5 Making the integrity signature invisible and accessible to the attacker (For both centralized and decentralized environment) Chapter 6 Deception-based secure proactive scheme (For both centralized and decentralized environment) Chapter 7 Evaluation Chapter 8 Conclusion
PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CONCLUSION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],REFERENCES
 

More Related Content

What's hot

Reseach proposal presentation
Reseach proposal presentationReseach proposal presentation
Reseach proposal presentation
syazalinah
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence format
Adil Mehmoood
 
Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26 Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26
Hermes Huang
 
Research questions and research objectives
Research questions and research objectivesResearch questions and research objectives
Research questions and research objectives
National Institute of Technology Karnataka( NITK ),Surathkal
 
Dissertation defense ppt
Dissertation defense ppt Dissertation defense ppt
Dissertation defense ppt
Dr. James Lake
 
Proposal defense slideshow
Proposal defense slideshowProposal defense slideshow
Proposal defense slideshowCoby Long
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposalguest349908
 
Doctorate Dissertation Proposal
Doctorate Dissertation ProposalDoctorate Dissertation Proposal
Doctorate Dissertation Proposal
Maurice Dawson
 
Research Methodology Module-02
Research Methodology Module-02Research Methodology Module-02
Research Methodology Module-02
Kishor Ade
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefenceCatie Chase
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense Presentation
David Onoue
 
Prepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationPrepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationChristian Glahn
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 
Najmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence PresentationNajmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence Presentation
Najmul Hoda
 
My Dissertation Proposal Defense
My Dissertation Proposal DefenseMy Dissertation Proposal Defense
My Dissertation Proposal Defense
Laura Pasquini
 
M.S. Thesis Defense
M.S. Thesis DefenseM.S. Thesis Defense
M.S. Thesis Defense
pbecker1987
 
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...Donna Madison-Bell
 
Questionnaire data collection tool dr majdi
Questionnaire data collection tool dr majdiQuestionnaire data collection tool dr majdi
Questionnaire data collection tool dr majdi
Dr. Majdi Al Jasim
 
Oral proposaldefense
Oral proposaldefenseOral proposaldefense
Oral proposaldefense
mfinkenberg
 

What's hot (20)

Reseach proposal presentation
Reseach proposal presentationReseach proposal presentation
Reseach proposal presentation
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence format
 
Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26 Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26
 
Research questions and research objectives
Research questions and research objectivesResearch questions and research objectives
Research questions and research objectives
 
Dissertation defense ppt
Dissertation defense ppt Dissertation defense ppt
Dissertation defense ppt
 
Proposal defense slideshow
Proposal defense slideshowProposal defense slideshow
Proposal defense slideshow
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
 
Doctorate Dissertation Proposal
Doctorate Dissertation ProposalDoctorate Dissertation Proposal
Doctorate Dissertation Proposal
 
Research Methodology Module-02
Research Methodology Module-02Research Methodology Module-02
Research Methodology Module-02
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis Defence
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense Presentation
 
Prepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationPrepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense Presentation
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 
Najmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence PresentationNajmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence Presentation
 
My Dissertation Proposal Defense
My Dissertation Proposal DefenseMy Dissertation Proposal Defense
My Dissertation Proposal Defense
 
M.S. Thesis Defense
M.S. Thesis DefenseM.S. Thesis Defense
M.S. Thesis Defense
 
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...
A Qualitative Phenomenological Study on Prison Volunteers in California’s Cor...
 
Questionnaire data collection tool dr majdi
Questionnaire data collection tool dr majdiQuestionnaire data collection tool dr majdi
Questionnaire data collection tool dr majdi
 
Oral proposaldefense
Oral proposaldefenseOral proposaldefense
Oral proposaldefense
 

Similar to Proposal defense presentation

The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...franco_bb
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
IJNSA Journal
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docx
LaticiaGrissomzz
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Crawsec
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Nihal Jani
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
Joey Hernandez
 
Threat modeling demystified
Threat modeling demystifiedThreat modeling demystified
Threat modeling demystified
Priyanka Aash
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
aryan532920
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
bartholomeocoombs
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
Matthew Rosenquist
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
ch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.pptch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.ppt
YusufYusufKurniawan
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
MrNitinJainSETAssist
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
ssuser6602e0
 

Similar to Proposal defense presentation (20)

The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docx
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Threat modeling demystified
Threat modeling demystifiedThreat modeling demystified
Threat modeling demystified
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
APT - Project
APT - Project APT - Project
APT - Project
 
ch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.pptch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.ppt
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 

More from Ruchika Mehresh

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
Ruchika Mehresh
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeRuchika Mehresh
 
Dissertation Proposal Abstract
Dissertation Proposal AbstractDissertation Proposal Abstract
Dissertation Proposal Abstract
Ruchika Mehresh
 

More from Ruchika Mehresh (7)

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
 
PNUTS
PNUTSPNUTS
PNUTS
 
Centrifuge
CentrifugeCentrifuge
Centrifuge
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Dissertation Proposal Abstract
Dissertation Proposal AbstractDissertation Proposal Abstract
Dissertation Proposal Abstract
 
Pnuts
PnutsPnuts
Pnuts
 
Pnuts Review
Pnuts ReviewPnuts Review
Pnuts Review
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Proposal defense presentation

  • 1. PROACTIVE SCHEMES FOR MISSION ASSURANCE IN CRITICAL SYSTEMS Ruchika Mehresh Ph.D. Dissertation Proposal Defense Department of Computer Science and Engineering University at Buffalo, The State University of New York December 20, 2011 Advisor : Dr. Shambhu Upadhyaya Committee Members : Dr. H. Raghav Rao Dr. Murat Demirbas
  • 2. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 3. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Deception as a tool Component 1 Component 2 Component 3 Threat Model Solution Evaluation
  • 11.
  • 12. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 13. PROBLEM FORMULATION 1. System type : Mission critical 2. Last wall of defense : secure recovery phase for mission survivability 3. Mission Survivability : Satisfy timeliness property 4. Indefinite missions : time-independent security strength 5. Focus : on event’s impact, not cause 6. Attack model : basis for solution design 7. Tamper-proof : ‘Who watches the watcher ?’ 8. Effective Evaluation 9. Integrity over availability
  • 14.
  • 15. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 21. SOLUTION DESIGN Component 1: Surreptitious intrusion detection by keeping the IDS tamper-proof Component 2: Making the integrity signature invisible and accessible to the attacker Component 3: Deception-based proactive recovery scheme, and multi-phase evaluation framework
  • 22.
  • 23. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 24.
  • 25.
  • 26. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. SIMPLE ARCHITECTURE Intrusion detector or a crucial user space service Lightweight process monitor Direction of Monitoring Process i runs on core i , and 1≤i≤K, where K is the total number of cores on the processor Numbers from 1-K indicate the K cores of the host’s processor 2 3 4 5 6 1 K K-1
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. EVALUATION – TAMPER RESISTANCE Figure: Alerts generated for killing process monitors in sequential order without delay, under light system load Figure: Alerts generated for killing process monitors in sequential order without delay, under heavy system load
  • 41.
  • 42. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 43.
  • 44. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 45.
  • 47. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 48.
  • 49. Coordinator Replica 1 Replica 2 Replica 3 Replica n Workload Workload Workload Workload Workload Replica 3 R R R R Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature Need at least a duplex system H C H C H C H C Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature Periodic checkpoint Hardware Signature
  • 51. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 52.
  • 53.
  • 54.
  • 58.
  • 59. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 60.
  • 61. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 62.
  • 63. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 64. DISSERTATION OUTLINE Chapters Topic s Chapter 1 Introduction Chapter 2 Background Chapter 3 Problem Formulation Chapter 4 Surreptitious intrusion detection by keeping the IDS tamper-proof (For both centralized and decentralized environment) Chapter 5 Making the integrity signature invisible and accessible to the attacker (For both centralized and decentralized environment) Chapter 6 Deception-based secure proactive scheme (For both centralized and decentralized environment) Chapter 7 Evaluation Chapter 8 Conclusion
  • 65. PRESENTATION OUTLINE Introduction Motivation Problem Formulation Background Solution Remaining Work Dissertation Outline Conclusion Threat Model Solution Evaluation Deception as a tool Component 1 “ Who watches the watcher” Component 2 “ Hiding detection” Component 3 “ Deception-based recovery”
  • 66.
  • 67.
  • 68.  

Editor's Notes

  1. - Hacking community as it is, has been gathering momentum with dedicated forums that not only provide powerful, ready-to-use tools to script kiddies, but also an excellent communication medium for the professionals -Example: Electricity in hospitals
  2. Mission survivability: doesn’t differentiate between benign or malign cause
  3. Mode 1: A short running mission with a definite timeline Usually for such missions, final phase is the most crucial. If we hold off the aggressive behavior of an attacker for long enough, while still maintaining the mission integrity, we can assure mission survivability. Mode 2: A long running mission with an unbounded timeline In long running missions, it may not be possible to hold off the attacker forever. This is especially true for mission critical systems with infinite timelines (like, web based businesses). A full system recovery will be essential. However, as we will see later in Section 4, recovery can be attacked if we recover the system to the same vulnerable state that was exploited before. Thus, the need is to identify the precise vulnerability that resulted in the exploit and close it during the recovery. Such analysis takes time and hence a smart solution will buy the defender more time, without triggering a change in attacker’s rational behavior. If not, the defender can risk the attacker executing his contingency plans
  4. Multi-stage delivery of malware Botnet’s stealthy command and control execution model Stealth features of Stuxnet sniffs for a specific configuration and inert itself if it does not find it. limited spread (one to three) Erases itself on a specific date on which it erases itself. Spread in industry “ Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating ”
  5. Recovery based: Assumes system is compromised as soon as it goes online
  6. mapping and vulnerability analysis of US critical infrastructure to plan for future attacks Rapid adoption of technology like smart grids more vulnerable due to automation and remote access people working on the smart grid are not concerned about security. “ The emergence of Stuxnet points to an overriding need for critical infrastructure companies to acknowledge the changes in the cyber threat landscape and focus attention not only on denial-of-service attacks, but also on more sophisticated threats, like stealthy infiltration from state-sponsored actors or cyber-extortionists. As our research has shown, the critical infrastructure sector has been slow to adjust to this realization.” cyber-security experts concerned about the surveillance of U.S. power grid by other nation states. A classified 2008 Defense Science Board Report highlights the cyber vulnerabilities in the US electric grid. Potential opponents have been observed to engage in cyber-reconnaissance of US critical infrastructure electrical utilities to plan for attack. A statistic reported by this survey shows a stable and high number of perceived nation-sate network attacks against domestic critical infrastructure. Cyber security experts concerned about international surveillance Potential opponents have been observed to engage in cyber-reconnaissance of US critical infrastructure electrical utilities to plan for attack
  7. Knapp and Boulton and make a strong case for why cyber warfare is not just a military domain issue now. They study trends that demonstrate the transformation of information warfare from primarily a military-domain related issue to an industry-related issue. Coporate spionage Nation states avoiding direct confrotation Terrorism, extortion and hacktivism Baskerville discusses the expansion of information warfare to electronic business domain. He discusses the asymmetric warfare theory and how it relates to information warfare. Attackers are not restricted by time to develop exploit as much as defenders are. Another asymmetry is attacker’s advantage of stealth. Therefore, a defense system needs to be agile and adaptive in order to balance out this asymmetry.
  8. Component 1: Surreptitious intrusion detection by keeping the IDS tamper-proof Component 2: Making the integrity signature invisible and accessible to the attacker Component 3: deception-based proactive recovery scheme, and multi-phase evaluation framework
  9. Antivirus virus (retrovirus) Attacks/disables or infects the antivirus Software assets become defenseless Attacks bypass AV protection Called “argument-switch” attack, exploits driver hooks the AV programs use Send benign code and later swap with malicious payload E.g., remove McAfee and install malware Easier to do in a multi-thread, multi-core setup
  10. AMD SimNow is installed on Ubuntu which is the host operating system. Inside AMD SimNow, we run a guest operating system, i.e., FreeBSD. All experiments run on this guest operating system. This system is configured to use emulated hardware of AMD Awesim 800Mhz 8-core processor with 1024 MB RAM. We use kernel level filters to implement process monitoring. This is because inter-process communication support provided by UNIX-like systems (like pipes or sockets) does not suffice for our framework. Inter-process communication delivers messages only between two live processes. However, we require that a communication (alert) be initiated when a process is terminated. For this purpose, we use an event delivery/notification subsystem called Kqueue, which falls under the FreeBSD family of system calls. Under this setup, a process monitor interested in receiving alerts/notifications about another process creates a new kernel event queue (kqueue) and submits the process identifier of the monitored process. Specified events (kevent) when generated by the monitored process are added to the kqueue of the process monitor. Kevent in our implementation is the termination of the monitored process. Process monitors can then retrieve this kevent from their kqueues at any time. A process monitor can monitor multiple processes in parallel using POSIX threads.
  11. The initial setup time is defined as the time taken for the kqueue subsystem to get loaded before an attacker tries to subvert the process monitors. This is the only major time delay this system has been observed to incur. Initial setup time increases linearly with increasing degree of incidence. With 8 process monitors in a circulant digraph topology, the worst case initial setup delay of 0.3ms is obtained with a maximum degree of incidence.
  12. We experimented with different circulant digraph topologies with varying number of process monitors and degree of incidence, as shown in the table. We experiment with the worst case scenario where the attacker already knows the correct order of the nodes in this topology. We assume that he also identifies the windows of vulnerability and uses them to his advantage (again, the worst case). In the figure, the number of alerts generated shows the sensitivity of this framework toward a crash attack executed using SIGKILL, under light system load.
  13. Composability : The functionalities of the potential sub-modules can be composed to provide the functionalities of their parent module. Sufficiency : The functionalities of the potential sub-modules collectively describe the entire set of functionalities of their parent module.
  14. For our analysis, checkpoint interval is assumed to be 1 hour. Fig. 2 presents the execution times for the four Scimark workloads on a logarithmic scale. It can be seen that the execution time overhead increases only a little when the system transitions from Case 1 to Case 2 (i.e., employing the proposed scheme as a preventive measure). For instance, an application that runs for 13.6 hours for Case 1 will incur an execution time overhead of only 13.49 minutes in moving to Case 2. However, the execution time overhead increases somewhat rapidly when the system transitions from Case 2 to Case 3. The increase in execution overhead will be substantial only if there are too many faults/attacks present, which is not very common. Fig. 3 shows the percentage increase in execution times of various workloads when the system transitions from a lower case to a higher one. It is assumed that these executions do not have any interactions (inputs/outputs) with the external environment. The percentage increase in execution time is only around 1.6% for all the workloads when system transitions from Case 1 to Case 2. The overhead for a transition from Case 1 to Case 3 (with mean time to failure, M =10 hours) is around 9%. These percentages indicate acceptable overheads in most fault tolerant systems.
  15. Need for extending the framework to a decentralized environment: As with all centralized architectures, the framework that we developed has a single point of failure. Its trusted computing base is limited only to the coordinator. This can be advantageous because it is easier to ensure whether a single system is running tamper-free or not. However, since it will be connected to compromised systems during a mission cycle, we cannot assume that it will stay secure forever. Thus, we would like to go beyond our extreme dependence on this single entity. While moving towards decentralization, we will conduct a detailed investigation about the various candidate topologies, the candidate voting procedures, the limited trusted computing base, etc. A user will submit his job randomly to multiple replicas in this decentralized framework. Similarly, it will obtain information from randomly selected multiple replicas and will perform a majority voting. Following are the prime areas that we will investigate for building the solution: Choosing the topology The topology can range from anything completely decentralized, to cluster formation, to even having a trusted computing base with multiple coordinators. We add a replica to the blacklist till either the mission is complete or the suspected replica has been completely profiled and believed to be uncompromised. This is because if we keep adding replicas to the blacklist aggressively and predictably, we may risk availability of the service and it can lead to a denial of service attack. Thus, we predict that there will be some centralized components in the new framework because it will not be very efficient to have each replica profile every other replica.   Choosing the secure, distributed voting algorithm We plan to leverage features from [49] and other secure voting algorithms to reach a distributed consensus about the integrity status of replicas. Since the system requirements here are very different from any of the work done before, we will have to modify the presented algorithms in order to suit our purpose. Reputation-based mechanisms We will investigate the possibility of using reputation mechanisms as a substitute for blacklisting. Possible use of Nexus In an ideal environment, COTS paradigm is most useful since stronger system could be built without depending on any dedicated or specially designed components. However, the proposed solution requires some minimal intervention to harvest the built-in redundant logics in a chip. So, as an alternative solution, we propose software approaches such as the Nexus platform [50] to achieve the same effect of trusted monitoring using the built-in hardware.
  16. Status