Towards Modelling Information Security with Key-Challenge Petri Nets Teijo Venäläinen

Slides:



Advertisements
Similar presentations
COMPUTER NETWORK TOPOLOGIES
Advertisements

Computer Network Topologies
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
Objektorienteret Middleware Presentation 2: Distributed Systems – A brush up, and relations to Middleware, Heterogeneity & Transparency.
1 CS 106, Winter 2009 Class 4, Section 4 Slides by: Dr. Cynthia A. Brown, Instructor section 4: Dr. Herbert G. Mayer,
XML Documentation of Biopathways and Their Simulations in Genomic Object Net Speaker : Hungwei chen.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
1 Petri Nets H Plan: –Introduce basics of Petri Net models –Define notation and terminology used –Show examples of Petri Net models u Calaway Park model.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Lecture 11 Reliability and Security in IT infrastructure.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
A Value-Based Approach for Quantifying Scientific Problem Solving Effectiveness Within and Across Educational Systems Ron Stevens, Ph.D. IMMEX Project.
Chapter 3 : Software Process and Other Models Juthawut Chantharamalee Curriculum of Computer Science Faculty of Science and Technology, Suan Dusit University.
CSC230 Software Design (Engineering)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
 1  GSLM System Simulation Yat-wah Wan Room: B317; ywan; Ext: 3166.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Network Simulation Internet Technologies and Applications.
Systems Analysis Laboratory Helsinki University of Technology e-Learning Negotiation Analysis Harri Ehtamo Raimo P Hämäläinen Ville Koskinen Systems Analysis.
University of Toronto Department of Computer Science © 2001, Steve Easterbrook CSC444 Lec22 1 Lecture 22: Software Measurement Basics of software measurement.
1 Conceptual Modeling of User Interfaces to Workflow Information Systems Conceptual Modeling of User Interfaces to Workflow Information Systems By: Josefina.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
Describing Methodologies PART II Rapid Application Development*
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
程建群 博士(Dr. Jason Cheng) 年03月
COMPUTER SYSTEM.
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
Introduction to Neural Networks. Neural Networks in the Brain Human brain “computes” in an entirely different way from conventional digital computers.
FPGA-Based System Design: Chapter 6 Copyright  2004 Prentice Hall PTR Topics n Design methodologies.
 Topology Topology  Different types of topology Different types of topology  bus topologybus topology  ring topologyring topology  star topologystar.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Unit-1 Introduction Prepared by: Prof. Harish I Rathod
The McGraw- AS Computing LAN Topologies. The McGraw- Categories of LAN Topology.
Evaluation of the XL Routing Algorithm in Multiple Failure Conditions Nguyen Cao Julie Morris Khang Pham.
ICONS Project & Creating Simulations for Classroom Use Beth Blake and Kathie Young Institute for Instructional Technology University of Maryland June 24,
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Future Work  Improve diagnosis of a modeled system’s weaknesses  Save and load profiles of potential intruders to the system, such as the average script.
Introduction to MATLAB 7 MATLAB Programming for Engineer Hassan Migdadi Spring 2013.
1 Copyright  2001 Pao-Ann Hsiung SW HW Module Outline l Introduction l Unified HW/SW Representations l HW/SW Partitioning Techniques l Integrated HW/SW.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Computer Simulation of Networks ECE/CSC 777: Telecommunications Network Design Fall, 2013, Rudra Dutta.
A Framework for Integrating Technology Mark Grabe.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
Performance Task Overview Introduction This training module answers the following questions: –What is a performance task? –What is a Classroom Activity?
Hybrid Intelligent Systems for Network Security Lane Thames Georgia Institute of Technology Savannah, GA
1 Software Testing and Quality Assurance Lecture 17 - Test Analysis & Design Models (Chapter 4, A Practical Guide to Testing Object-Oriented Software)
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
Session 1: Technology Development August 15 NSF Workshop.
1 Visual Computing Institute | Prof. Dr. Torsten W. Kuhlen Virtual Reality & Immersive Visualization Till Petersen-Krauß | GUI Testing | GUI.
Week 8 Computational Level
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Computer Network Topologies
Chapter 1- Introduction
Lecture 1: Introduction CS 765: Complex Networks
NOX: Towards an Operating System for Networks
Worm Origin Identification Using Random Moonwalks
Application of network flow: Protecting coral reef ecosystems
Community detection in graphs
Optimization Techniques for Natural Resources SEFS 540 / ESRM 490 B
A Real-time Intrusion Detection System for UNIX
Development & Evaluation of Network Test-beds
Computer communications
Network Architecture By Dr. Shadi Masadeh 1.
MECH 3550 : Simulation & Visualization
Presentation transcript:

Towards Modelling Information Security with Key-Challenge Petri Nets Teijo Venäläinen

Contents  Introduction  Various modelling methods  Graph based modelling  Key-Challenge Petri Nets

Introduction  Since 7/2006 in Information Technology Research Institute (ITRI), Agora, JYU  Doctoral studies since 2009  Goal is to find a method for measuring information security (IS)  Modelling and Simulation (M&S)

Motivation for testing/modelling  Testing a system in use is not a feasible option => damage  Real system must be replicated (modelled) somehow  Testing is done with the modelled system  How accurately does the model represent the real system?

Resulting information  For the whole system or a single component, the following results are interesting: –Mean time between failure (against attacks) –Success probability of attacks –Damage (performance degradation, money, …) –Attack route i.e. how the attack progresses –And more …

Testing methods  There are different methods, where varies [1] –”target audience” –Human involement during testing –Detail level  Role playing, ”Packet wars”, network design tools  Mathematical modelling, state machines, graph based modelling

Role playing  Scenario-based training exercises  High abstraction level  Test the strategic decision making process of personnel and organizations  Computers not necessary, ”pencil & paper”  Target audience: high level decision makers  Does not provide technical IS information

”Packet wars”  Real network with real users, a dedicated test network in a laboratory  Two teams: attackers and defenders  Highly accurate method but costly  Target audience: IS professionals

Network design tools  Accurate modelling of networks and normal activities  Attack modelling is limited => limited results  No human involvement during testing, only simulation  Target audience: IS professionals, network designers

Mathematical modelling, state machines, graph based models  Also approximations of the real system  Provide results faster through simulation  Cheap  Easily modifyable

Modelling & simulation Model System description Simulation

Graph based modelling  Network attack is usually a series of interdependent actions leading to a goal (= breach in security)  Actions are illustrated using nodes and arcs => an attack graph (AG)  Assign conditions (e.g. probability) on traversing between nodes  Usually attacker’s point of view  Simulate by starting from a node and moving towards the goal node(s)

Attack tree Source [2]

Challenges  The system must be described at adequate level of accuracy. Scalability with large networks?  Valid input parameters (From where? How?)  Usability  Attacker’s and defender’s interaction (game theory?)  Creating graphs is labor intensive => automatic tools

Petri Nets  Place (input/output): holds tokens  Arc: connects places and transitions  Transition: lets token pass through if conditions are met  Token: moves from place to place

Key-Challenge Petri Nets (KCPN)  A modelling method under development  Based on Petri-nets  KCPN graph is created using network and vulnerability information  Conditions for transitions = key-challenge –challenge = security measure –key = means to circumvent/break the security measure

KCPN: overview  Hierarchical i.e. modelling may be performed using various abstration levels  Modular structure  Place = network device or attack action  Arc = physical connection of devices or causal relation of attack actions  Transition = challenge (security measure)

KCPN: simulation  Attacker collects keys that allow him to progress in the graph  Variables may be assigned for transitions –Probability of being detected –Duration of an attack action (time distribution) –Cost, skill level, etc.  It is possible to perform an attack action without required keys but with a greater cost/duration

KCPN: results  Simulation results include: –Probability of success of an entire attack –The most vulnerable attack path –The duration of the entire attack  Results may be used as input data within the model (simulate modules independently)

KCPN: example  Two hierarchy levels: –Topology level (physical world) –Attack action level (abstract world)  Multiple network devices lumped into a single node (Hosts)  Devices with similar connections, OS, software, etc. => lumped together

KCPN: the physical network

KCPN: the graph

Sources  [1] J. Saunders. Simulation Approaches in Information Security Education. Proceedings of 6th National Colloquium for Information System Security Education,  [2] Bruce Schneier. Attack Trees. SANS Network Security rees.pdf

Thank You!