I would like to thank Louis P. Wilder and Dr. Joseph Trien for the opportunity to work on this project and for their continued support. The Research Alliance.

Slides:



Advertisements
Similar presentations
Khammar Mrabit Director Office of Nuclear Security
Advertisements

Attack Graphs for Proactive Digital Forensics Tara L. McQueen Delaware State University Louis P. Wilder Computational Sciences and Engineering Division.
First Lego League of Tennessee Quentoria Leeks Fisk University Research Alliance in Math and Science Computer Applications and Web Technologies Networking.
Managed by UT-Battelle for the Department of Energy 1 Mathematical Modeling of Fatty Acid Oxidation in Skeletal Muscle Cells Sheds New Light on Obesity.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Cluster Computing Applications Project: Parallelizing BLAST The field of Bioinformatics needs faster string matching algorithms. What Exactly is BLAST?
Lecture 11 Reliability and Security in IT infrastructure.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
O AK R IDGE N ATIONAL L ABORATORY U.S. D EPARTMENT OF E NERGY Cluster Computing Applications Project Parallelizing BLAST Research Alliance of Minorities.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
INTRUSION DETECTION SYSTEM
Module 8: Implementing Administrative Templates and Audit Policy.
The Evaluation of an Embedded System for First Responders Nicholas Brabson The University of Tennessee David Hill Computational Sciences and Engineering.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Website Hardening HUIT IT Security | Sep
eScan Total Security Suite with Cloud Security
Weigh-in-Motion User Manual For WIM Integrated System Cindy Lopez City University of New York – York College Research Alliance in Math and Science Computational.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Methods  OpenGL Functionality Visualization Tool Functionality 1)3D Shape/Adding Color1)Atom/element representations 2)Blending/Rotation 2)Rotation 3)Sphere.
Tiffany M. Marshall Saint Mary-of-the-Woods College Mentors : Tim McKnight Measurement Science and Systems.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Integrating Visualization Peripherals into Power-Walls and Similar Tiled Display Environments James Da Cunha Savannah State University Research Alliance.
The Effects of Radio Propagation in the Workplace Carolyn Jo Shields Research Alliance in Math and Science Information Technology Services Division, Oak.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
United States Grid Security and Reliability Control in High Load Conditions Christopher Lanclos—Mississippi Valley State University Research Alliance in.
OAK RIDGE NATIONAL LABORATORY U.S. DEPARTMENT OF ENERGY Parallel Solution of 2-D Heat Equation Using Laplace Finite Difference Presented by Valerie Spencer.
POSTER TEMPLATES BY: Meta data - data that provides information about data.Meta data - data that provides information about.
Introduction Relationship between climate and health widely studied Climatic temperature stress increases cardiovascular disease risk Solar UV radiation.
Lionel F. Lovett, II Jackson State University Research Alliance in Math and Science Computer Science and Mathematics Division Mentors: George Ostrouchov.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Managed by UT-Battelle for the Department of Energy 1 Integrated Catalogue (ICAT) Auto Update System Presented by Jessica Feng Research Alliance in Math.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Event Management & ITIL V3
O AK R IDGE N ATIONAL L ABORATORY U.S. D EPARTMENT OF E NERGY A Comparison of Methods for Aligning Genomic Sequences Ja’Nera Mitchom Fisk University Research.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
Parametric Study of Mechanical Stress in Abdominal Aortic Aneurysms (AAA) Erin A. Lennartz Virginia Polytechnic Institute and State University Research.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Managed by UT-Battelle for the Department of Energy Flux Coupling Machines and Switched Reluctance Motors to Replace Permanent Magnets in Electric Vehicles.
Ali Alhamdan, PhD National Information Center Ministry of Interior
METHODS CT scans were segmented and triangular surface meshes generated using Amira. Antiga and Steinman’s method (2004) for automatically extracting parameterized.
The Research Alliance in Math and Science program is sponsored by the Office of Advanced Scientific Computing Research, Office of Science, U.S. Department.
Topic 5: Basic Security.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
CCSM3 / HadCM3 Under predict precipitation rate near equator regions CCSM3 under predicts greater in SE U.S. than HadCM3 Methodology and Results Interpolate.
Advanced Brain-Wave Analysis For Early Diagnosis of Alzheimer’s Disease (AD) Jaron Murphy The Ohio State University Research Alliance in Math and Science.
July What is the eCost TMS Solution ? Benefits & Features Explore the eCost Software Smart Storage Device (SSD9000 / SSD9001) - Buffers DX10 Dongle.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Managed by UT-Battelle for the Department of Energy 1 Decreasing the Artificial Attenuation of the RCSIM Radio Channel Simulation Software Abigail Snyder.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
Role Of Network IDS in Network Perimeter Defense.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Managed by UT-Battelle for the Department of Energy 1 United States Grid Security and Reliability Control in High Load Conditions Presented to Associate.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Regression Testing for CHIMERA Jessica Travierso Austin Peay State University Bronson Messer National Center for Computational Sciences August 2009.
Regression Testing for CHIMERA Jessica Travierso Austin Peay State University Research Alliance in Math and Science National Center for Computational Sciences,
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Introduction to Digital Forensics
Presentation transcript:

I would like to thank Louis P. Wilder and Dr. Joseph Trien for the opportunity to work on this project and for their continued support. The Research Alliance in Math and Science program is sponsored by the Office of Advanced Scientific Computing Research, U.S. Department of Energy. The work was performed at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC under Contract No. De-AC05-00OR This work has been authored by a contractor of the U.S. Government, accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes. Attack Graphs for Proactive Digital Forensics Tara L. McQueen Delaware State University Research Alliance in Math and Science Computational Sciences and Engineering Division Mentor: Louis P. Wilder Cyber Security Maintaining confidentiality, availability and access of information Identifying legitimate Users Requests Tasks Preserving information integrity Mending network vulnerabilities Cyber Protection Growing need as fraudulent activity increases Affecting industries dependent on Networks Computer Systems Internet Hacking Gaining unauthorized Access Control Data Using technical knowledge and exposed information Cleaning tracks Preventing is difficult and expensive USB Exploits Take milliseconds to initiate (in and out) Collect confidential documents Send worm through network Execute applications automatically Easy to develop, retrieve and unleash Occur unknowingly Proactive Digital Forensics Anticipating hacker/exploit path Detecting hacker/exploit in progress Collecting proper data immediately for judicial efforts Enhancing security Attack Graphs Communicate information about threats Display combinations of vulnerabilities Show vulnerabilities as vertices Express hierarchical constraints via edges USB Exploit Attack Graph Theoretical Proactive Design All computers/nodes on network use Splunk Splunk’s additional behavior configurations stem from attack graphs Attack graphs designed for all known exploits Plug-in device triggered Real-time alerts sent after trigger Instant in depth recording of “suspicious” activity Splunk Analyzes/monitors IT infrastructure Records and indexes data Logs Configurations Scripts Alerts Messages Operates in real-time Search, navigate, graph and report data Splunk with Attack Graphs Targets specific attacks paths Allows unlimited attack types Provides systematic and proactive approach Event logs and Registry Standard on Windows Monitors events Application Security System Identifies operations and information Essential for Attack Graph Purpose Increase cyber security and protection Identify possible cyber attacks as they occur Examine Universal Serial Bus (USB) exploits Create attack graph of USB exploit Explore event logs and registry data Investigate theoretical proactive design Future work Create plug-in Implement design on test network Run trial exploit Research and prepare other exploits/attacks Fig. 1 USB exploit attack graph Fig. 2 Windows XP Event Viewer Fig. 4 Proactive Digital Forensic Design Fig. 3 Splunk