Cyber Security: Evaluating the Effects of Attack Strategy and Base Rate through Instance-Based Learning

Size: px
Start display at page:

Download "Cyber Security: Evaluating the Effects of Attack Strategy and Base Rate through Instance-Based Learning"

Transcription

1 Cyber Security: Evaluating the Effects of Attack Strategy and Base Rate through Instance-Based Learning Aman Arora School of Computing and Electrical Engineering Indian Institute of Technology, Mandi, India Varun Dutt School of Computing and Electrical Engineering School of Humanities and Social Sciences Indian Institute of Technology, Mandi, India Abstract Cyber attacks, the disruption of normal operations in a computer network due to malicious events called cyber threats, are becoming widespread. In order to check the prevalence of cyber attacks the role of security analysts, human decision makers whose job is to prevent cyber attacks, is becoming extremely important. However, currently very little is known on how security analysts might respond to different attack strategies of an attacker in cyber attacks. Also, little is known on how the proportion of threats (i.e., base rate) in an attack scenario influences the analyst s timely and accurate detection of such attacks. In this paper, we use an existing cognitive model of the security analyst, based upon Instance-Based Learning Theory, and we evaluate the effects of attack strategy and base rate on the model s accurate and timely detection of cyber-attacks in a simulated scenario. The attack strategy was manipulated as: impatient (attacker injects all threats in the beginning of the scenario) and patient (attacker waits till the end of the scenario to inject threats); and, base rate was manipulated as: common (13 out of 25 scenario events (52%) were threats) and rare (3 out of 25 scenario events (12%) were threats). Results reveal that the attack strategy influences only the analyst s accuracy and not her timeliness; however, the base rate influences her timeliness and not the accuracy. We discuss the implications of our results for training analyst in their job. Keywords: cyber attacks; base rate; attack strategy; Instance-based Learning Theory; accuracy; timeliness. Introduction According to the U.S. White House, Cyberspace touches nearly every part of our daily lives. It is the broadband networks beneath us and the wireless signals around us, the local networks in schools, hospitals, work-places and business...today s world is more interconnected than ever before. These lines explicitly describe the inevitableness of Internet. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. As we are becoming more reliant on modern technology, we are also becoming more vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. With the prevalence of Anonymous and LulzSec hacking groups and other threats to corporate and national security, guarding against cyber attacks is becoming a significant part of IT governance, especially because most government agencies and private companies have moved to online systems (Sideman, 211). Thus, in a cyber-world like ours, we must have defenses to keep us safe. In order to create appropriate defenses against cyber attacks, the role security analysts, a human decision maker whose main role is to protect computer networks from cyber attacks, is becoming indispensable (Jajodia, Liu, Swarup, & Wang, 21). Given the growing demand, companies have started employing security analyst. However, currently not much emphasis has been laid on how different environmental factors (e.g., attack strategy and base rate) would affect the analyst s accurate and timely detection of cyber attacks. One of the researches done in this field indicates that the analyst s accurate and timely threat detection is likely to be a function of prior experiences with cyber attacks and tolerance to perceived threats (Dutt et al., in press; McCumber, 24; Salter, Saydjari, Schneier, & Wallner, 1998). Dutt et al. (in press) have given primary predictions about a simulated analyst s performance according to her experience and tolerance to threats (or risk-taking). These authors created a cognitive model of an analyst s decisions, based upon Instance-Based Learning Theory (IBLT; Gonzalez & Dutt, 211), and populated the model s memory with cyber threat and cyber non-threat experiences. The model s tolerance was determined by the number of events it perceived as threats before it declared the sequence of network events to be a cyber attack. Accordingly, a model with a greater proportion of threat experiences was more accurate and timely in detecting threats compared with one with a smaller proportion of such experiences; whereas, the tolerance did not influence model s accuracy and timeliness. Although Dutt et al. (in press) have highlighted the role of prior experience and risk-taking on cyber threat detection, it is unclear how their results would vary due to the nature of adversarial behaviors (an external factor). Thus, here we simulate an analyst s decision process through the computational model developed by Dutt et al. (in press) and derive predictions about analyst s decisions in scenarios that differ in adversarial behaviors. One characteristic of adversary s behavior is the attack strategy (patient or impatient) being followed to infiltrate the network. An impatient strategy is the strategy in which attacker passes all threat events in the beginning of a sequence of network events; whereas, a patient strategy will make attacker to 336

2 wait till the end to inject the threats in a sequence of network events. We also consider proportion of threat events (i.e., base rate; common or rare) that an attacker uses to attack a network. A common base rate is when the attacker uses a large number of threat events in a cyber attack; however, a rare base rate is when the analyst uses only a smaller number of threat events in a cyber attack. Next, a cyber-infrastructure and an IBL model of analyst s cyber threat detection are detailed. Then, we describe the manipulations in the attack scenarios and detail the results of our manipulations. We close this paper by presenting a discussion of our findings and their implications to training human analysts in their job. Cyber Infrastructure A corporate network may consist of different types of servers and multiple layers of firewalls. We used a simplified network configuration consisting of a web server, a fileserver, and two firewalls (Ou, Boyer, & McQueen, 26; Xie, Li, Ou, & Levy, 21). An external firewall ( firewall 1 in Figure 1) controls the flow of traffic between the Internet and the Demilitarized zone (DMZ; a subnetwork that separates the Internet from the company s internal LAN network). Second firewall ( firewall 2 in Figure 1) controls the traffic between the webserver and the fileserver, a company s internal LAN network. The webserver interacts with outside world and it is behind the DMZ. FileServer contains necessary information that internal users (employees) use to do their daily operations. FileServer is connected to workstations, which employees use as a medium to interact with the fileserver and are authorized to run executable files resting on the fileserver. Generally, an attacker is identified as a computer on the Internet that is trying to gain access to the internal corporate servers and workstations. For this cyber-infrastructure, attackers follow a pattern of island-hopping attack (Jajodia et al., 21; pp. 3), where the webserver is compromised first, and then it is used to originate attacks on the fileserver and other company workstations. An attacker, in order to gain access to fileserver, will need to pass at least 3 events (to get to webserver, fileserver, and then to execute binaries inside fileserver). Because of this reason, we define the rare base rate to contain 3 threats out of total 25 network events (as it is minimum an attacker may require). The model discussed in this paper is presented with different cyber events in a sequence, where these events follow an attacker s strategy, i.e., the sequence of events are a combination of a base rate and timing strategy. Attack sequences may be classified as rare-impatient, rare-patient, common-impatient and common-patient depending upon the combination of attack strategies being followed by attacker. Rare-impatient attack sequence contains 3 out of total 25 network events as threats and are all being injected in the beginning. Rare-patient also contains 3 threats but here these are being injected in the end of sequence of 25 network events. Figure 1: An Example Attack Scenario. In common-impatient attack sequence there are 13 threats out of total 25 network events and these are being injected with impatient strategy, i.e., all of them are being injected in the beginning of the sequence; however, in common-patient attack sequence these 13 threats are being injected at the end of sequence. Nature of these attack sequences is not known to the model; however, the model is able to get alerts corresponding to some network events (that are regarded as threats) generated from the intrusiondetection system (IDS) (Jajodia et al., 21). Out of 25 events, some are threats that are initiated by an attacker (the rest of the events are initiated by inside users). The model does not know which events are generated by the attacker and which are generated by corporate employees. By perceiving network events in a sequence as threats or nonthreats, the model needs to identify, as early and accurately as possible, whether the sequence constitutes a cyber attack. Instance-Based Learning Theory (IBLT) IBLT is a theory of how people make decisions from experience in dynamic environments (Gonzalez & Dutt, 211). Computational models based on IBLT have been shown to generate accurate predictions of human behavior in many dynamic decision-making situations similar to those faced by analysts (Dutt et al., in press; Dutt & Gonzalez, 212; Gonzalez & Dutt, 211; Gonzalez et al., 211). IBLT proposes that every decision situation is represented as an experience called an instance that is stored in memory. Each instance in memory is composed of two parts: situation (S) (the knowledge of attributes that describe an event), a Decision (D) (the action taken in such situation), and utility (U) (a measure of expected result of a decision that is to be made for an event). For a situation 337

3 involving securing a network from threats, the situation attributes are those that can discriminate between threat and non-threat events: the IP address of a computer (web-server, file-server, or workstation, etc.) where the event occurred, the directory location in which the event occurred, whether the IDS raised an alert corresponding to the event, and whether the operation carried out as part of the event(e.g., a file execution) by a user of the network (which could be an attacker) succeeded or failed. In the IBL model of a analyst, an instance s S part refers to the situation attributes defined above; and the U slot refers to the expectation in memory that a network event is a threat or not. For example, an instance could be defined as [webserver, c:\, malicious code, success; threat], where webserver, c:\, malicious code, and success constitutes the instance s S part; and threat is the instance s U part (the decision being binary: threat or not, is not included in this model). An instance is retrieved in the recognition phase from memory according to an activation mechanism (Gonzalez et al., 23; Lejarraga et al., in press). The activation of an instance i in memory is defined using a simplified version of ACT-R s activation equation: where i refers to the i th instance that is pre-populated in memory, and i = 1,2, constitutes the total number of prepopulated instances in memory; B i is the base-level learning mechanism and reflects both the recency and frequency of use for the i th instance since the time it was created; and is the noise value that is computed and added to an instance i s activation at the time of its retrieval attempt from memory. The B i equation is given by: ( { } In this equation, the frequency effect is provided by, the number of retrievals of the i th instance from memory in the past. The recency effect is provided by, the time since the th past retrieval of the i th instance (in equation 2, t denotes the current event number in the scenario). The d is the decay parameter and has a default value of.5 in the ACT-R architecture, and this is the value we assume for the IBL model. refers to the similarity between the attributes of the situation and the attributes of the i th instance. is defined as, Table 1: The coded values in the S part of instances in memory and attributes of a situation event. Attributes Values Codes IP Webserver 1 ) Fileserver 2 Workstation 3 Directory Missing value -1 1 File X 1 Alert Present 1 Absent Operation Successful 1 Unsuccessful is the similarity component and represents the mismatch between a situation's attributes and the situation (S) part of an instance i in memory. The k is the total number of attributes for a situation event that are used to retrieve the instance i from memory. The value of k=4 as there are 4 attributes (IP, directory, alert, and operation) that characterize a situation in the network. The match scale ( ) reflects the amount of weighting given to the similarity between an instance i s situation part l and the corresponding situation event s attribute. is generally a negative integer with a common value of -1. for all situation slots k of an instance i, and we assume this value for the. The or match similarities represents the similarity between the value l of a situation event s attribute and the value in the corresponding situation part of an instance i in memory. Typically, is defined using a squared distance between the situation event s attributes and the corresponding instance's situation slots (Shepard, 1962). Thus, is equal to the sum of squared differences between a situation event s attributes and the corresponding instance's S part. In order to find the sum of these squared differences, the situation events attributes and the values in the corresponding S part of instances in memory were coded using numeric codes. Table 1 shows the codes assigned to the S part of instances and the situation events attributes. The noise value (Anderson & Lebiere, 1998; Gonzalez & Dutt, 211) is defined as ( ) where, is a random draw from a uniform distribution bounded in [, 1] for an instance i in memory. We set the parameter s in an IBL model to make it a part of the activation equation (equation 1). The s parameter has a default value of.25 in the ACT-R architecture, and we assume this default value in the IBL model. We used IBLT to study the accurate and timely detection of threats by cyber analysts because IBLT is known to make better decisions compared to other models and techniques. Basava, Ramakrishna and Varun in there paper Cyber Situation Awareness: Rational Methods versus Instance- Based Learning Theory for Cyber Threat Detection; ICCM 338

4 in this conference compare IBLT with Naïve Bayes classifier which is a rational approach to make decisions. There results depict that Naïve Bayes approach is poor in terms of timeliness and accuracy as compared to the IBLT. Hence, we ran our experiments with IBLT to study the interaction of base rate and attack strategy in timely and accurate detection of cyber attacks. Experiments The IBL model used here has been taken from Dutt et al. (in press). This model is presented with sequences of network events that represent four strategies (commonpatient, common-impatient, rare-patient, rare-impatient) of the attacker with tolerance fixed at 5% of base rate. All sequences contained 25 network events. Model s memory was pre-populated with instances that represent analysts with different experiences and the model was fixed to use tolerance level of.5. The IBL model retrieved instance with highest activation and made a decision about an event being a threat or a non-threat. We use only 5 simulations of the model as they were sufficient for generating stable model results (Dutt et al., in press). We ran 5 simulations (each simulation consisting of 25 network events) and the model s effectiveness was evaluated using its accuracy and detection timing in four groups defined by: strategy (patient and impatient) and base rate (common and rare). Accuracy was determined by computing the d (Z(hitrate) Z(false-alarmrate)), hitrate (hits/(hits + misses)), and false-alarm rate = (falsealarms/(false-alarms + correct-rejections)) (Wickens, 21) over the course of 25 network events and averaged across the 5 simulations. The decision of the model for each network event was marked as a hit if an instance with its U slot indicated a threat for an actual threat event in the sequence. Similarly, the model s decision was marked as a false-alarm if an instance with its U slot indicated a threat for an actual non-threat event in the sequence. Hits and false-alarms were calculated for all events before model declared a cyber attack and stopped, or when all the 25 events had occurred (whichever came first). Furthermore, detection timing was calculated in each simulation as the proportion of attack steps, defined as 1% - the percentage of threat events out of a total 25 that have occurred after which the model classifies the event sequence as a cyber attack and stops. Therefore, higher percentages of attacks steps would indicate the model to be timelier in detecting cyber attacks. Accuracy As shown in Figure 2, it was seen that d corresponding to common base rate (-.26) was greater than that for the rare base rate (-.75). So, the base rate did influence the model s accuracy (d ). Furthermore, as shown in Figure 3, the accuracy for the impatient strategy (d = 3.48) was greater than that for the patient strategy (d = -4.25). Thus, attack strategy also influenced the accuracy. However, the base rate did not play as big a role as that played by strategy (see Figure 4). Strategy was found to influence accuracy and its effect was irrespective of the base rate. From Figure 4, an impatient strategy had a greater d (common-impatient = 4.23, rare-impatient = 2.72) compared to a patient strategy (common-patient = -4.28, rare-patient = -4.23) Figure 2: Accuracy(d ) as affected by base rate d' d' Figure 3: Accuracy(d ) as affected by strategy. Common Rare Impatient Patient Results We will be explaining the results obtained with the help of figures presented in this paper from Figure 2 to Figure 7. Each of these figures is a histogram where y axis corresponds to accuracy or timeliness as mentioned across respective figure and the bars represents attack scenario, those can be decoded by the legend in each figure. 339

5 Figure 4: Accuracy(d ) as affected by different combinations of base rate and strategy Timeliness After running the model it was observed that the timeliness (Figure 5) for the rare scenario (36%) was higher than that for the common scenario (47%). Thus, timeliness was influenced by base rate. However, strategy did not influence timeliness, as can be seen from Figure 6 both strategies have almost same timeliness (impatient strategy with timeliness of 42% and patient strategy with timeliness of 41%). This means that strategy plays no role in the time it takes to determine if there is an attack. Interaction of base rate and strategy in determining the timeliness was evaluated in Figure 7. Timeliness for common scenarios (common-patient = 36%, common-impatient = 35%) were lower than that in the rare scenarios (rare-patient = 46%, rare-impatient = 49%). Also, timeliness did not vary much for both strategies in both scenarios. Thus, there is only an influence base rate on timeliness and not of strategy on timeliness: The rare base rate caused model to be timelier. Thus, to conclude, timeliness was affected by base rate d' 47 Timeliness (%) Common Patient Figure 5: Timeliness as affected by base rate Common Impatient Rare Patient Rare Impatient Common Rare Timeliness (%) Figure 6: Timeliness as affected by strategy Timeliness (%) 49 Impatient Patient Common Patient Common Impatient Rare Patient Rare Impatient Figure 7: Timeliness as affected by different combinations of base rate and strategy. Discussion and Conclusions In this paper, we studied the effects of base rate and attack strategy on the model s accurate and timely detection of cyber-attacks. Such an analysis is important as unlike the cognitive factors (recency and tolerance) that are under the direct control of analyst, the environmental factors (attack strategy and base rate) are controlled by the attacker and outside the direct control of the analyst. We find that both these environmental factors, being outside the control of the analyst, influence the analyst s accuracy or timeliness. First, the analyst s accuracy was influenced by the strategy. The model was more accurate when the strategy was impatient compared to when it was patient. The likely reason for this result is that an impatient strategy s early threats increase the activation of threat instances in the model s memory early on. Therefore, the increase in activation is likely to make the model perform more accurately against an impatient strategy compared to a patient strategy. Second, the timeliness was influenced by the base rate: The model was timelier for the rare base rate compared to the common base rate. This observation can be explained based upon the definition of base rate, i.e., the proportion of threats being passed among the 25 network events. If the 34

6 proportion of threats is less (i.e., in rare scenario), it will take less time for the model to declare a sequence of network events as an attack compared to when the proportion of threats is more (i.e., in the common scenario). The activation of threat instances is likely increase faster for the scenario with the rare base rate compared with the scenario with the common base rate (because the instances with the rare base rate are fewer in number and easy to identify). This increase in activation in the rare scenario would cause these activated instances to be retrieved from memory often, causing the model to stop early. Our results have important implications for training analysts in their job. First, as both the base rate and strategy influence the cyber threat detection, it is prudent to train analysts on scenarios that differ in both these environmental factors. Second, it is expected that analyst should be trained in the common scenario and for a patient attack strategy as in these cases the model s performance was the poorest. In these experiments, we overlooked the effects of tolerance (risk-taking) by setting it up at 5% of base rate. However, one expects that the model s tolerance would likely vary from one individual to another. More specifically, the model s ability would likely be influenced by its risk-taking and varying the tolerance may have significant effects on the model s accurate and timely detection of cyber-attacks. Thus, the next step in this research would be to introduce tolerance as another parameter and see its interaction with base rate and strategy. We plan to undertake this idea as part of our ongoing research on this topic. Jajodia, S., Liu, P., Swarup, V., & Wang, C. (21). Cyber situational awareness. New York, NY: Springer. McCumber, J. (24). Assessing and managing security risk in IT systems: A structured methodology. Boca Raton, FL: Auerbach Publications. Ou, X., Boyer, W. F., & McQueen, M. A. (26). A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp ). Alexandria, VA: ACM. doi: / Salter, C., Saydjari, O., Schneier, B., & Wallner, J. (1998). Toward a secure system engineering methodology. In Proceedings of New Security Paradigms Workshop (pp. 2-1). Charlottesville, VA: ACM. doi: / Shepard, R.N. (1962). The analysis of proximities: multidimensional scaling with an unknown distance function. Part I. Psychometrika, 27, Sideman, A. (211). Agencies must determine computer security teams in face of potential federal shutdown. Retrieved from Wickens, T. D. (21). Elementary signal detection theory. New York, NY: Oxford University Press, USA. Xie, P., Li, J. H., Ou X., Liu, P., & Levy, R. (21). Using Bayesian networks for cyber security analysis. In Proceedings of the 21 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp ). Hong Kong, China: IEEE Press. doi: 1.119/DSN Acknowledgements We are very thankful to Dr. Varun Dutt, Assistant Professor, Indian Institute of Technology, Mandi for guiding us in difficult times on this project. Also, we are grateful to the Indian Institute of Technology, Mandi for providing the necessary capital and financial resources that made this project possible in the first place. This research was also partially supported by the Multidisciplinary University Research Initiative Award on Cyber Situation Awareness (MURI; #W911NF ) from Army Research Office to Cleotilde Gonzalez, Carnegie Mellon University, USA. References Anderson, J. R., & Lebiere, C. (1998). The atomic components of thought. Hillsdale, NJ: Lawrence Erlbaum Associates. Dutt, V., Ahn, Y. S., & Gonzalez, C. (in press). Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory. Human Factors. Dutt, V., & Gonzalez, C. (212). Cyber Situation Awareness through Instance- Based Learning: Modeling the Security Analyst in a Cyber-Attack Scenario. In C. Onwubiko & T. Owens (Eds.), Situational Awareness in Computer Network Defense: Principles, Methods and Applications (pp ). Hershey, PA: IGI Global. Gonzalez, C., & Dutt, V. (211). Instance-based learning: Integrating decisions from experience in sampling and repeated choice paradigms. Psychological Review, 118(4), doi: 1.137/a24558 Gonzalez, C., Dutt, V., & Lejarraga, T. (211). A loser can be a winner: Comparison of two instance-based learning models in a market entry competition. Games, 2(1), doi: 1.339/g

Cognitive Model of the Security Analyst in a Simple Cyber-Attack

Cognitive Model of the Security Analyst in a Simple Cyber-Attack Cyber Situation Awareness: Modeling the Security Analyst in a cyber-attack scenario through Instancebased Learning Varun Dutt 1,1, Young-Suk Ahn 1, Cleotilde Gonzalez 1, 1 Dynamic Decision Making Laboratory,

More information

Situational Awareness in Computer Network Defense:

Situational Awareness in Computer Network Defense: Situational Awareness in Computer Network Defense: Principles, Methods and Applications Cyril Onwubiko Research Series Limited, UK Thomas John Owens Brunel University, UK Report Documentation Page Form

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

ALDR: A New Metric for Measuring Effective Layering of Defenses

ALDR: A New Metric for Measuring Effective Layering of Defenses ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs Department of Computer Science Columbia University boggs@cs.columbia.edu Salvatore J. Stolfo Department of Computer Science

More information

When does ignorance make us smart? Additional factors guiding heuristic inference.

When does ignorance make us smart? Additional factors guiding heuristic inference. When does ignorance make us smart? Additional factors guiding heuristic inference. C. Philip Beaman (c.p.beaman@reading.ac.uk) Rachel McCloy (r.a.mccloy@reading.ac.uk) Philip T. Smith (p.t.smith@reading.ac.uk)

More information

Intrusion Tolerance to Mitigate Attacks that Persist

Intrusion Tolerance to Mitigate Attacks that Persist Intrusion Tolerance to Mitigate Attacks that Persist Arun Sood Professor (Computer Science) and Co-Director International Cyber Center George Mason University, Fairfax, VA asood@gmu.edu The variety and

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

SecurityMetrics Vision whitepaper

SecurityMetrics Vision whitepaper SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Honeypot as the Intruder Detection System

Honeypot as the Intruder Detection System Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information

VEA-bility Security Metric: A Network Security Analysis Tool

VEA-bility Security Metric: A Network Security Analysis Tool VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University tupper@cs.dal.ca A. Nur Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract In this work, we propose

More information

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering

More information

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders

More information

Attack graph analysis using parallel algorithm

Attack graph analysis using parallel algorithm Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA

More information

Understanding SCADA System Security Vulnerabilities

Understanding SCADA System Security Vulnerabilities Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen

More information

ADC Survey GLOBAL FINDINGS

ADC Survey GLOBAL FINDINGS ADC Survey GLOBAL FINDINGS CONTENTS Executive Summary...4 Methodology....8 Finding 1: Attacks Getting More Difficult to Defend... 10 Finding 2: Attacks Driving High Costs to Organizations.... 14 Finding

More information

Virtual Terrain: A Security-Based Representation of a Computer Network

Virtual Terrain: A Security-Based Representation of a Computer Network Virtual Terrain: A Security-Based Representation of a Computer Network Jared Holsopple* a, Shanchieh Yang b, Brian Argauer b a CUBRC, 4455 Genesee St, Buffalo, NY, USA 14225; b Dept. of Computer Engineering,

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning

Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, VOL. 2, NO. 3, AUGUST 2011 177 Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning Varun Dutt Department of Social and Decision Sciences,

More information

Adversary-Driven State-Based System Security Evaluation

Adversary-Driven State-Based System Security Evaluation Adversary-Driven State-Based System Security Evaluation Elizabeth LeMay, Willard Unkenholz, Donald Parks, Carol Muehrcke*, Ken Keefe, William H. Sanders Information Trust Institute, Coordinated Science

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

Cyber Security Assessment of Enterprise-Wide Architectures

Cyber Security Assessment of Enterprise-Wide Architectures Cyber Security Assessment of Enterprise-Wide Architectures Mathias Ekstedt, Associate Prof. Industrial Information and Control Systems KTH Royal Institute of Technology Agenda Problem framing Management/design

More information

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

A B S T R A C T. Index Terms : Framework, threats, skill, social engineering, risks, insider. I. INTRODUCTION

A B S T R A C T. Index Terms : Framework, threats, skill, social engineering, risks, insider. I. INTRODUCTION A Framework to Mitigate the Social Engineering Threat to Information Security Rakesh Kumar*, Dr Hardeep Singh. Khalsa college for women, Amritsar, Guru Nanak Dev University, Amritsar rakeshmaster1980@rediffmail.com*,

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.279

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment

A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment Dongwan Kang*, Taeeun Kim, Jooyoung Kim, Hwankuk Kim Security Industry Technology Division KISA(Korea Internet&Security

More information

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

Dissecting the Learning Behaviors in Hacker Forums

Dissecting the Learning Behaviors in Hacker Forums Dissecting the Learning Behaviors in Hacker Forums Alex Tsang Xiong Zhang Wei Thoo Yue Department of Information Systems, City University of Hong Kong, Hong Kong inuki.zx@gmail.com, xionzhang3@student.cityu.edu.hk,

More information

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy

More information

Intelligent. Data Sheet

Intelligent. Data Sheet Cisco IPS Software Product Overview Cisco IPS Software is the industry s leading network-based intrusion prevention software. It provides intelligent, precise, and flexible protection for your business

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

EXPLORING VULNERABILITIES IN NETWORKED TELEMETRY

EXPLORING VULNERABILITIES IN NETWORKED TELEMETRY EXPLORING VULNERABILITIES IN NETWORKED TELEMETRY Authors: Felix Shonubi, Ciara Lynton, Joshua Odumosu, Daryl Moten Advisors: Dr. Richard Dean, Dr. Farzad Moazzami and Dr. Yacob Astatke Department of Electrical

More information

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Report on Cyber Security Alerts Processed by CERT-RO in 2014 Section III - Cyber-Attacks Evolution and Cybercrime Trends Report on Cyber Security Alerts Processed by CERT-RO in 2014 Romanian National Computer Security Incident Response Team office@cert-ro.eu The

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary. Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

IT Security Risks & Trends

IT Security Risks & Trends IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health

More information

SIEM is only as good as the data it consumes

SIEM is only as good as the data it consumes SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

September 20, 2013 Senior IT Examiner Gene Lilienthal

September 20, 2013 Senior IT Examiner Gene Lilienthal Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

More information

How To Understand The Security Posture Of Home Internet Users In Australia

How To Understand The Security Posture Of Home Internet Users In Australia AusCERT Home Users Computer Security Survey 2008 Kathryn Kerr Manager, Analysis and Assessments 1 Agenda Scope Purpose Methodology Key findings Conclusion Copyright 2007 AusCERT 2 Survey scope Random sample

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Enterprise Apps: Bypassing the Gatekeeper

Enterprise Apps: Bypassing the Gatekeeper Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

VOIP Attacks On The Rise

VOIP Attacks On The Rise VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.

More information

Case Study: Security Implementation for a Non-Profit Hospital

Case Study: Security Implementation for a Non-Profit Hospital Case Study: Security Implementation for a Non-Profit Hospital The Story Security Challenges and Analysis The Case The Clone Solution The Results The Story About the hospital A private, not-for-profit hospital

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

COMP3441 Lecture 9: Security Architecture

COMP3441 Lecture 9: Security Architecture COMP3441 Lecture 9: Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 6, 2014 Overview Security Design Principles Security Architecture Security Design in the

More information

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY Tazin Malgundkar 1,Madhuri Rao 2 and Dr. S.S. Mantha 3 1 Student, Computer Engineering, Thadomal Shahani Engineering College, Bandra, Mumbai, India.

More information

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard (Approved by the Information Strategy and Governance Committee in December 2013) INTERNAL Date of Issue: 2013-12-24 Document Control

More information

How To Configure Virtual Host with Load Balancing and Health Checking

How To Configure Virtual Host with Load Balancing and Health Checking How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article

More information

Pretend or Prevent? Intranet. Internet Router IDS Hub Firewall. Overview. Recognizing attacks. Intercepting attacks. White Paper

Pretend or Prevent? Intranet. Internet Router IDS Hub Firewall. Overview. Recognizing attacks. Intercepting attacks. White Paper Overview Pretend or Prevent? No matter what it s called, if a network security system doesn t shoot first and ask questions later, it doesn t qualify as intrusion prevention by Jon Ramsey Intrusion detection

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi

More information

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Doyourwebsitebot defensesaddressthe changingthreat landscape?

Doyourwebsitebot defensesaddressthe changingthreat landscape? WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Practical Steps To Securing Process Control Networks

Practical Steps To Securing Process Control Networks Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.

More information

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments External Scanning and Penetration Testing in PCI DSS 3.0 Gary Glover, Sr. Director of Security Assessments About SecurityMetrics Helping organizations comply with mandates, avoid security breaches, and

More information

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats

More information