Information Game of Public Firewall Rules
|
|
|
- Carmella Burns
- 10 years ago
- Views:
Transcription
1 Information Game of Public Firewall Rules Qi Liao Department of Computer Science and Engineering University of Notre Dame Zhen Li Department of Economics and Management Albion College Aaron Striegel Department of Computer Science and Engineering University of Notre Dame Abstract Firewalls are among the most important components in network security. Traditionally, the rules of the firewall are kept private under the assumption that privacy of the ruleset makes attacks on the network more difficult. We posit that this assumption is no longer valid in the Internet of today due to two factors: the emergence of botnets reducing probing difficulty and second, the emergence of distributed applications where private rules increase the difficulty of troubleshooting. We argue that the enforcement of the policy is the key, not the secrecy of the policy itself. In this paper, we demonstrate through the application of game theory that public firewall rules when coupled with false information (lying) are not only viable but actually better. I. INTRODUCTION Firewalls play a significant role in defending an enterprise network security and have been widely adopted in almost every organization [1]. Many security problems associated with networking can be mitigated by deploying a firewall [2] coupled with other security devices such as Intrusion Detection/Prevention Systems (IDS/IPS) and others [3]. Firewalls are and will continue to be important components in enterprise networks to defend against untrusted network intrusion. Since the inception of the firewall, the general practice of the enterprise network administrator has been to hide the firewall configuration information, to which we refer as private firewalls. The conventional wisdom is the less information released to the outsider, the better of the security of the network. For the network environment at the time, such an assumption was not entirely unreasonable. Networks by in large were considerably slower and adversaries tended to only have a limited group of machines from which to clumsily probe to try to infer the open network services. In contrast, the environment of the adversaries of today has shifted considerably. Many techniques have emerged that can carefully craft packets for fooling and penetrating firewalls or to reconstruct firewall rules by probing adaptively based on the firewall response [4], [5]. Furthermore, the dramatic increase in scale of the general Internet itself and the emergence of botnets has reduced the cost of probing, be it in time or machine exposure, to almost nothing. The private nature of firewall rules is further complicated by significant increases in the complexity and scale of the applications running on the network [6]. Rather than having relatively simple point-to-point requirements, applications have generally trended towards decentralization and distributed dependencies for optimal operation. As an active firewall can present security risks in and of themselves (re-direction, etc.), firewalls more often than not will silently discard packets, appearing to be an ambiguous black hole in the network. The net result is that debugging of connectivity problems becomes an administrative nightmare, i.e., is the problem the local firewall, the enterprise firewall, your firewall, my firewall, the router, the network link, the application, etc.? In this paper we ask the relatively innocuous question, how costly is it to make firewall rules public 1 (public firewalls)? Intuitively, a firewall is a group of systems that enforces an access control policy between two networks [2], which implies the policy and its enforcement is the key, not the secrecy of the policy itself. Our contribution is to explore the viability of making firewall rules public and how one might transition from private to public firewalls. When the firewall is given the ability to not only provide true public information but also false information, we demonstrate how one can balance the twin demands of security and productivity on the enterprise. To accomplish this analysis, we model the dynamics of interactions between the attacker and the firewall/administrator in a game theoretic framework. While game theories [7] have applications in many areas including information security, noticeably Alpcan and Basar [8] developed a formal decision and control framework for sensor allocation problem in a distributed IDS, our work focuses on the viability of public vs. private firewall rules through game theoretic analysis. Game theory is useful in this case because the network defender wants to know how attackers would respond to the transition from private to public firewalls and what constitutes a good strategy between no information, true information and false information that can increase productivity, efficiency and security. With a game theoretical framework, equilibrium strategies for both attackers and administrators can be 1 It is important to note firewalls are still enforcing those rules no matter if the rules are public or private information.
2 S f a S φ a TABLE I STRATEGY SPACE (a) Administrator (S d ) S φ d S T d S F d No information True information False information (b) Attacker (S a) Attack (through firewall) Skip attack (through firewall) derived. As will be shown later, the Nash equilibrium [9] analysis suggests a network would either choose to play the pure strategy of telling truth if it emphasizes productivity or play a mixed strategy (true or false) for self insurance, but would never choose null information. In other words, keeping firewall rules public (true or false) is always preferred over private firewalls from the perspective of the administrator, where the attacker s probability of attacking through firewall is reduced compared to the private firewall case. II. GAME-THEORETIC FRAMEWORK FOR FIREWALLS We begin by first defining the two interested parties (players): System/network administrators 2 who represent the interest of organization networks protected behind firewalls; Attackers who try to compromise machines behind firewalls and conduct malicious activities. Without loss of generality, we assume both attackers and network administrators make decisions based upon intelligent considerations of the possible consequences. Therefore the interaction between the attacker and the administrator can be modeled as a two-player noncooperative and general-sum game for which the bestresponse strategies (Nash Equilibria) are computed. A. Strategic Space for the Administrator In general, firewalls controlled by the defender or administrator ( firewalls ) can have several strategies. The network administrator is the informed party with the full knowledge of firewall rules. Regarding the amount of feedback information that firewalls should reveal, firewalls have three strategies to choose from: No information: keep firewall rules hidden; True information: tell the truth; 2 Administrators, networks, and firewalls are sometimes used interchangeably but all refer to the defense side. False information: lie and give false firewall rules upon querying 3 or forged return packets upon probing. The strategy space for the administrator is denoted as S d = {S φ d, ST d, SF d } as summarized in Table I(a). The last two choices by the administrator are considered public information. An interesting question arises: what if the firewall lies? The consequence (gain and loss) of transition from private to public (true or false) are discussed in Section II-D. We briefly mention here that one immediate benefit derived from lying is that the administrator can now track and identify the attacker who is trying to exploit non-existing services or wrong operating systems that the administrator wrongfully gives out on purpose (e.g., honeypot [11], [12]). Since the attacker targets at non-existing services, OS or physical hosts, there is no chance the attack will be successful in compromising real hosts. Note that we focus on analyzing the feasibility of public firewall rules and its impact on both attackers and defenders in a formal game-theoretic model, and consider the support for false information to be beyond the scope of the paper. B. Strategic Space for the Attacker Attackers have several strategies in response to administrators strategies discussed in previous section. In addition to attacking through the firewall, attackers can choose not to attack and move on to the next target. Attackers can still, however, choose to attack but not through the firewall, i.e., through other methods such as social engineering, which usually requires user interaction by sending phishing s to users and tricking them to either run attached executable or click on a fraud link which will download and run malicious code on users machines. Since s and web traffic are allowed in almost every organization, the above activities can be categorized as attack bypassing firewalls, a practice not dependent on various firewall rule strategies chosen by the administrator and are not considered in the modeling. Therefore, in face of various and uncertain firewall rule strategies adopted by the administrator, two options are considered for the attacker: to attack through firewall or not to attack through firewall, i.e., the attacker s strategy space is S a = {Sa f, Sφ a }, as summarized in Table I(b). C. The Attacker s Payoff Matrix For the attacker two parameters of reward and cost factors are considered. The attacker considers not only rewards (R) received from a successful attack but also costs and potential risks of the action (C). The cost function of the attacker, C = c 1 +c 2, has two components: 3 Firewall queries may be answered in an efficient way through Structured Firewall Query Language (SFQL) and decision trees like data structure [10].
3 TABLE II PAYOFF MATRIX OF THE GAME Administrator Attacker No information (S φ d ) True information (ST d ) False information (SF d ) Attack (Sa f ) (Ea φ, P 0 + E 0 + S 0 ) (Ea T, P E+ 0 + S 0 ) ( c 2, P 0 + E S++ 0 ) Skip attack (Sa φ ) ( c 1, P 0 + E 0 + S + 0 ) (0, P E+ 0 + S+ 0 ) (0, P 0 + E S+ 0 ) Preparation stage cost (c 1 ): Most of time the attacker would research and study the target network and try to find way to get in and compromise hosts. This cost includes port scanning, inferring firewall rules, and probing for potential vulnerability of systems. Contingent cost (c 2 ): Costs related to potential risks of an attack for the attacker to be detected, tracedback, identified, possibly arrested and punished. After an attack is initiated, four possible consequences may occur: {succeed & undetected, succeed & detected, fail & undetected, fail & detected}. Clearly, the consequence succeed & undetected is most favored by the attacker while the consequence fail & detected is the least desirable. The ranking of the other two consequences is ambiguous because two opposing effects are in place. On one hand, a successful attack is more advantageous than a failed attack in the view of the attacker. On the other hand, being detected can make gains from attack temporary and short-lived, e.g., the administrator can remove the attacker from the system, recover damage done by the attacker, reinstall the system, or optionally trace back the attacker. Considering the likelihood of each consequence for any pair of strategies ({S a, S d }) by the attacker and the administrator, the attacker s expected payoff is the weighted average of the four possible consequences, as shown in Table II. In Table II, Ea φ is the expected payoff for the attacker under the benchmark strategy {Sa f, Sφ d }, i.e., the administrator provides no information and the attacker attacks through firewall. Let α i be the probability of each attack consequence i (in the order listed above) under this benchmark strategy, Ea φ = α 1 (R c 1 )+α 2 (R c 1 c 2 ) α 3 c 1 α 4 (c 1 + c 2 ), where α 1 + α 2 + α 3 + α 4 = 1. Ea φ can be rewritten as: E φ a = (α 1 + α 2 )R (α 2 + α 4 )c 2 c 1 (1) Ea T in Table II is the attacker s expected payoff when attacking through firewall while the administrator provides true information, i.e., {Sa f, ST d }. To distinguish from the benchmark case, let β i be the probability of each attack consequence i under this pair of strategies. Ea T = β 1R + β 2 (R c 2 ) + β 3 0 β 4 c 2, where β 1 + β 2 + β 3 + β 4 = 1. Ea T can be rewritten as: E T a = (β 1 + β 2 )R (β 2 + β 4 )c 2 (2) The attacker s payoff under the pair of strategies {S f a, SF d } is c 2 due to the fact that only consequence fail & detected would occur if the attacker attacks upon receiving false information. Should the attacker choose to skip the attack, there occurs only the preparation cost c 1 to the attacker with no rewards under the private firewall case. For public firewalls (true or false), the attacker has no gain or loss as no port scanning costs occur. Therefore, the payoff for the attacker under strategies {Sa φ, Sφ d }, {Sφ a, ST d }, and {Sa φ, Sd F } are c 1, 0, and 0, respectively. D. The Administrator s Payoff Matrix In contrary to the attacker s rewards and costs, the administrator s payoff is three dimensional: productivity, efficiency and security. Productivity measures the convenience and easiness for both the enterprise and outside users to collaborate easily so that most of their time can be spent on the actual work but not on the debugging of their connectivity problems. Being able to query for firewall rules rather than guessing can be helpful. Efficiency regards the effective allocation of network resources to legitimate use only. This implies that most of network bandwidth or computing resources should be allocated to legitimate business, but not to illegal, unwanted attacking traffic (such as malicious probing) that affects other users quality of service. Security refers to the strength and solidity of the network, which means the enterprise network should not be compromised by the attacker, and if there is any malicious and abnormal traffic, it should be a mechanism to detect, identify, and ideally trace back the attacking source. Table II also summarizes payoffs for the network administrator. P, E and S represent for productivity of users, efficiency of resources, and security of the network, respectively. The summation of P 0, E 0 and S 0 is the payoff in the benchmark case (i.e., {Sa f, Sφ d }), which is the administrator s expected payoff under the current practice of keeping firewall rules hidden. Compared with the benchmark case, productivity of the network can be improved if true firewall rules become public since open rules facilitate debugging by normal users. Efficiency of the network can also be enhanced because it nullifies the need for port scanning, which saves precious network resources to be allocated to other legitimate requests. Therefore, if the firewall tells truth about its rules, legitimate users gain productivity and the network gains efficiency, denoted by the plus sign P 0 + and E 0 +. This is at costs of decreased security denoted by the minus sign S 0 if the attacker chooses to
4 attack ({Sa f, ST d }). For {Sf a, SF d }, network efficiency is gained but not productivity. Security is greatly increased because not only the attacker will fail, he/she will also be identified. Hence P 0 + E S++ 0. If the attacker chooses not to attack, security of the network increases in all cases compared with the benchmark case. For {Sa φ, Sφ d }, the administrator s payoff is P 0 + E 0 + S 0 +. For {Sφ a, ST d }, all components of payoff increase, resulting P E+ 0 + S+ 0. Note that this is the ideal case for the network administrator. Similarly, for {Sa φ, Sd F }, since there is no gain in productivity and no extra gain from identifying and tracing since the attacker chooses not to attack, the expected payoff is P 0 + E S+ 0. E. Probing vs. Querying Before closing this section, we address a natural response to public firewalls that is, what if attackers always do probing instead of querying firewalls since the cost of distributed probing is usually low thanks to botnets? We want to emphasize that regardless of querying or probing, the returned results largely depend on the truthfulness of firewalls. In other words, attackers have nothing to gain (i.e., the amount of information inferred from probing is less than or equal to that from directly querying for firewall rules) but would only incur extra probing cost. It is also important to note that querying and probing are just two mechanisms/methods to acquire information. The mechanisms do not change two things: 1) the nature of the firewall, i.e., private or public (the public firewalls are still queryable and appear public to the vast majority of rest of world including legitimate users and administrators); 2) the nature of firewall information, i.e., true or false. By blindly always choosing to probe, attackers are covering their eyes and ears similar to Ostrich Logic but do not change the nature of public firewalls. In the context of the model, costless probing is equivalent to having zero preparation component of the cost for the attacker (i.e., c 1 = 0). While probing does affect the efficiency component of the administrator s payoff, the efficiency factor is anyway irrelevant to the administrator s choice between true or false firewall rules when solving Nash equilibria (Section III) for the degenerated game (Table III). Therefore, our entire analysis is unaffected regardless attackers use any mix of querying and probing or just stick to probing only, and all modeling analysis and conclusions remain valid. III. EQUILIBRIUM STRATEGIES The goal of the game is for each player to choose a strategy that maximizes his or her expected payoff by taking into account the opponent s decision. Best Responses of the Attacker: Based on the administrator s strategy, the attacker decides whether to attack or not by comparing expected payoffs of each option. If the administrator plays S φ d, the attacker s best response (denoted as b a ) is b a (S φ d ) = { S f a, if E φ a > c 1 S φ a, if Eφ a c 1 From equation (1), Ea φ > c 1 implies (α 1 + α 2 )R > (α 2 + α 4 )c 2, suggesting the attacker would choose to attack through firewall when the expected rewards overweigh the expected cost of being detected and traced. If the firewall plays Sd T, we have b a (S T d ) = { S f a, if E T a > 0 S φ a, if E T a 0 If firewall lies by playing Sd F, the attacker s best response is always to skip attack due to non-negative cost, or (3) (4) b a (S F d ) = Sφ a (5) The probability for the attacker to launch a successful attack under the public true firewall scenario cannot be smaller than hidden firewall rules, i.e., (β 1 +β 2 ) (α 1 + α 2 ). Similarly, without the need to perform port scanning and avoid detection by IDS, the probability of being detected and traced may be reduced: (β 2 +β 4 ) (α 2 +α 4 ). Lastly, since cost (c 1 ) is non-negative, Ea φ Ea T based on equations (1) and (2), which suggests intuitively the attacker is at least equally well regardless of attacking or not if the administrator always tells truth about firewall rules rather than keeping them as hidden information. Although the attacker may be better off with expected payoff changing from Ea φ to Ea T, it does not necessarily mean the administrator is worse off since the game is not zero sum (i.e., one party s gain equals the other party s loss). Providing true firewall rules increases user productivity and network efficiency but does not necessarily degrade network security. If the attacker s expected payoff remains negative (i.e., Ea T < 0), possible when the true information implies no vulnerability, the attacker would choose not to attack anyway. Best Responses of the Administrator: In strategic analysis, a dominant strategy always does at least as good as the strategies it dominates. For the administrator, Sd F is the dominant strategy and S φ d is the dominated strategy (Table II). Thus, regardless of the actions of the attacker, the dominant strategy Sd F is always a better choice for the administrator than the dominated strategy S φ d. Hence, the current practice of hidden rules is not optimal for the administrator who can at least be better off by switching from hidden rules to always lying. Table III describes the degenerated game payoff matrix by removing the administrator s dominated strategy S φ d. An interesting question remains: how would the administrator choose between playing honest or dishonest? If the attacker plays Sa f, the administrator s best response (denoted as b d ) depends on the tradeoff between
5 TABLE III DEGENERATED PAYOFF MATRIX OF THE GAME Administrator Attacker True information (Sd T ), 1 p False information (SF d ), p Attack (Sa f ), q (Ea T, P E+ 0 + S 0 ) ( c 2, P 0 + E S++ 0 ) Skip attack (Sa φ ), 1 q (0, P E+ 0 + S+ 0 ) (0, P 0 + E S+ 0 ) productivity and security. Note efficiency is no longer a determinant of the administrator s choice of best response after dropping S φ d. Hence if productivity is evaluated no less than security (i.e., P = (P 0 + P 0) S = (S 0 ++ S0 )), ST d is the best response; otherwise, SF d is the best response: { S b d (Sa f ) = T d, if P S Sd F, if S > P (6) The administrator s best response when the attacker plays no attack is certainly always tell the truth, i.e., b d (S φ a ) = S T d (7) Nash Equilibrium: Nash equilibria [9] of a two-by-two matrix game are the strategy profiles in the intersection of the two players best-response correspondences. A pure Nash equilibrium is a pair of strategies (S a, S d ) for the attacker and the administrator that satisfies µ a (S a, S d ) µ a(s i, S d ), S i S a µ d (S a, S d ) µ d(s a, S j ), S j S d (8) where µ is the utility function to compute expected payoffs for both parties. At the equilibrium (Sa, S d ), there is no incentive for either the attacker or the administrator to deviate from equilibrium pure strategies. In game theory, a mixed strategy is a probability distribution that assigns to each available action a likelihood of being selected. In our degenerated 2 2 payoff matrix (Table III), given that the mixed strategy Nash equilibrium is defined over a discrete support of just two elements (the two pure strategies), each of the players mixed strategies can be described by a single number: p [0, 1] as the probability for the administrator to play Sd F ; q [0, 1] as the probability for the attacker to play Sa f ; A mixed-strategy profile for the game is thus an ordered pair (p, q) [0, 1] [0, 1]. A mixed-strategy profile (p, q) is a Nash equilibrium if and only if p is a best response by the administrator to the attacker s choice q and q is a best response by the attacker to the administrator s choice p. Therefore (p, q) is a Nash equilibrium if and only if it belongs to the intersection of the graphs of the bestresponse correspondence p and q, i.e., {(p, q) [0, 1] [0, 1] : p p (q), q q (p)}. Since no preference weight is imposed to differentiate importance levels of various true firewall rules, there might be concerns on super secret rules used only by administrators for management purposes, which are not to be publicized. This can be easily achieved by increasing the number of false rules to maintain an equivalent p value. The administrator can release a rule set {T S} + {F } upon each firewall query, where {T } is the true firewall rule set, {S} is the true super secret rule set unpublicized, and {F } is the false rule set with T p size F = 1 p, for p < 1. The attacker s expected payoff for an arbitrary mixedstrategy profile (p, q) is the weighting of each of the attacker s pure-strategy profile payoffs by the probability of that profile s occurrence as determined in Table III, i.e., µ a (q; p) = (1 p)qea T pqc 2. The attacker s bestresponse correspondence can be found by solving his/her utility maximization problem as max µ a(q; p) = δ(p)q (9) q [0,1] where δ(p) = E T a (E T a + c 2 )p, which vanishes at ET a p = Ea T + c 2 (10) Since δ(p) is decreasing in p, the attacker will choose the pure strategy Sa f (i.e., q = 1) against p s on the interval [0, p ) and the pure strategy Sa φ (i.e., q = 0) against p s on the interval (p, 1]. Against p = p, the attacker is indifferent to playing any of his two pure strategies (or any convex combination of them) since they both lead to an expected payoff of 0. Similarly, the administrator s best-response correspondence can be found by maximizing the administrator s expected payoff for an arbitrary mixed-strategy profile (p, q): max µ d(p; q) = ζ(q)p + χ(q) (11) p [0,1] where ζ(q) = (S 0 ++ S0 )q (P 0 + P 0), and χ(q) = (P E+ 0 + S+ 0 ) (S+ 0 S 0 )q. ζ(q) vanishes at q = P 0 + P 0 S 0 ++ S0 (12) according to which, two cases may occur. Case I: The administrator has a dominant strategy (i.e., pure strategy of true information): If P S (i.e., (P 0 + P 0) (S 0 ++ S0 ), or in other words a network values productivity gains from
6 open rules more than loss in security, then q 1. Thus the administrator will have the same best response for every q, and p = 0 since ζ(q) 0 on [0, 1]. That is, the administrator has a strongly dominant pure strategy of S T d. Since the attacker s best response to ST d is b a(s T d ) as in equation (4), the pure-strategy Nash equilibrium of the game is (S a, S d ) = { (S f a, S T d ), if ET a > 0 P S (S φ a, S T d ), if ET a 0 P S (13) Such a pure-strategy Nash Equilibrium would only exist if Sd T is the dominant strategy. Case II: The administrator plays strategically (i.e., a probability distribution of mixed strategies of true and false information): If P < S (i.e., (P 0 + P 0) < (S 0 ++ S0 )), q (0, 1). Since ζ(q) is increasing in q, the administrator chooses the pure strategy p = 0 against q s on the interval [0, q ) and the pure strategy p = 1 against q s on the interval (q, 1]. Against q = q, the administrator is free to choose any mixing probability. In this case, pure-strategy Nash equilibria do not exist but there is a unique mixed-strategy Nash equilibrium, i.e., a strategy profile: (p = ET a Ea T + c, q = P 0 + P 0 2 S 0 ++ S0 ) (14) The Nash equilibrium analysis suggests that except in special circumstances when a network s preference is strongly biased toward productivity (and thus telling truth would be the administrator s dominant choice), the administrator must play strategically (i.e., a mix of true and false information) when facing a tradeoff between productivity and network security. By providing false information at an equilibrium probability of p, the network is essentially self insured. On the other hand, the attacker must also play strategically (i.e., a mix of attack and no attack) by having an equilibrium attack probability of q, which is smaller than the attack probability under the private firewalls. If either player deviates from the mixed-strategy Nash Equilibrium unilaterally, the deviating party would be worse off with a lower expected payoff. As stated earlier, it is also interesting to note that a network will either choose to play the pure strategy Sd T if it emphasizes productivity or play a mixed strategy of Sd T and SF d, but will never choose the strategy Sφ a. In other words, keeping firewall rules public (true or false) is preferred to keeping them hidden from the perspective of the administrator. IV. CONCLUDING REMARKS To summarize, when managing firewalls, conventional wisdom has held that firewall rules should remain hidden in order to improve security. With the emergence of botnets and distributed applications, we argue that such wisdom is no longer valid. In this paper, we provided arguments to question the benefits of private firewall rules and took initial steps to explore the viability of public firewall rules. Through the application of a game theoretic analysis, we showed that public firewall rules, when coupled with the ability to provide false information, can indeed increase productivity, efficiency and security. As with all game theoretical analysis, one limitation of our model is rationality assumption, which may not always hold in certain attack models such as state-sponsored attacks. However, since equilibrium is the best attackers can get, irrational attackers can only be further worse off. Lastly, since a Nash equilibrium is not necessarily an optimal solution, our future work will look for social optimal strategies by expanding the model into multiple networks and collaborative firewalls. It is our hope that our exploration offers an unconventional yet promising approach to this important security problem and we hope our work will inspire interesting discussions to extend this preliminary work and consideration for future firewall design. REFERENCES [1] M. Stiemerling, J. Quittek, and L. Eggert, NAT and firewall traversal issues of host identity protocol (HIP) communication, Network Working Group Request for Comments (RFC) 5207, April [2] S. Cobb, Establishing firewall policy, in Conference Record of Southcon 96, Orlando, FL, Jun , pp [3] D. Turner, M. Fossi, E. Johnson, T. Mack, J. Blackbird, S. Entwisle, M. K. Low, D. McKinney, and C. Wueest, Symantec global internet security threat report trends for july-december 07, Symantec Enterprise Security, vol. XIII, April [4] T. Samak, A. El-Atawy, E. Al-Shaer, and L. Hong, Firewall policy reconstruction by active probing: An attackerapos;s view, in 2nd IEEE workshop on Secure Network Protocols, Nov 2006, pp [5] T. Samak, A. El-Atawy, and E. Al-Shaer, Firecracker: A framework for inferring firewall policies using smart probing, in IEEE International Conference on Network Protocols, Beijing, China, Oct , pp [6] M. J. Chapple, J. D Arcy, and A. Striegel, An analysis of firewall rulebase (mis)management practices, Journal of Information System Security Association (ISSA), February [7] J. von Neumann and O. Morgenstern, Theory of Games and Economic Behavior. Princeton University Press, [8] T. Alpcan and T. Basar, A game theoretic analysis of intrusion detection in access control systems, in Proceedings of 43nd IEEE Conference on Decision and Control, Dec , pp [9] J. Nash, Equilibrium points in n-person games, Proceedings of the National Academy of Sciences, vol. 36, no. 1, pp , [10] A. X. Liu, M. G. Gouda, H. H. Ma, and A. H. Ngu, Firewall queries, 8th International Conference On Principles Of DIstributed Systems (OPODIS 04), Springer LNCS, vol. 3544, pp , [11] P. Bcher, T. Holz, M. Ktter, and G. Wicherski, Know your enenmy: Tracking botnets. The Honeynet Project & Research Alliance, March [12] Know your enemy: tracking botnets, The Honeynet Project, 2008, online
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Infinitely Repeated Games with Discounting Ù
Infinitely Repeated Games with Discounting Page 1 Infinitely Repeated Games with Discounting Ù Introduction 1 Discounting the future 2 Interpreting the discount factor 3 The average discounted payoff 4
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Alok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Simple Channel-Change Games for Spectrum- Agile Wireless Networks
Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA
Competition and Fraud in Online Advertising Markets
Competition and Fraud in Online Advertising Markets Bob Mungamuru 1 and Stephen Weis 2 1 Stanford University, Stanford, CA, USA 94305 2 Google Inc., Mountain View, CA, USA 94043 Abstract. An economic model
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Game Theory Meets Information Security Management
Game Theory Meets Information Security Management Andrew Fielder 1, Emmanouil Panaousis 2, Pasquale Malacaria 2, Chris Hankin 1, and Fabrizio Smeraldi 2 1 Imperial College London {andrew.fielder,c.hankin}@imperial.ac.uk
Firewall Security: Policies, Testing and Performance Evaluation
Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK [email protected],
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Cournot s model of oligopoly
Cournot s model of oligopoly Single good produced by n firms Cost to firm i of producing q i units: C i (q i ), where C i is nonnegative and increasing If firms total output is Q then market price is P(Q),
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
The Basics of Game Theory
Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #7 The Basics of Game Theory Friday - November 5, 2004 OUTLINE OF TODAY S RECITATION 1. Game theory definitions:
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY 100-3 90-99 21 80-89 14 70-79 4 0-69 11
The distribution of grades was as follows. ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY Range Numbers 100-3 90-99 21 80-89 14 70-79 4 0-69 11 Question 1: 30 points Games
1 Uncertainty and Preferences
In this chapter, we present the theory of consumer preferences on risky outcomes. The theory is then applied to study the demand for insurance. Consider the following story. John wants to mail a package
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision
National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision Thomas Jensen October 10, 2013 Abstract Intelligence about transnational terrorism is generally gathered by national
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
allow all such packets? While outgoing communications request information from a
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Game Theory in Wireless Networks: A Tutorial
1 Game heory in Wireless Networks: A utorial Mark Felegyhazi, Jean-Pierre Hubaux EPFL Switzerland email: {mark.felegyhazi, jean-pierre.hubaux}@epfl.ch EPFL echnical report: LCA-REPOR-2006-002, submitted
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.
Topic 8 Chapter 13 Oligopoly and Monopolistic Competition Econ 203 Topic 8 page 1 Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Dedicated and Distributed Vulnerability Management
Dedicated and Distributed Vulnerability Management December 2002 (Updated February 2007) Ron Gula Chief Technology Officer Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 THE NEED FOR VULNERABILITY
Equilibrium: Illustrations
Draft chapter from An introduction to game theory by Martin J. Osborne. Version: 2002/7/23. [email protected] http://www.economics.utoronto.ca/osborne Copyright 1995 2002 by Martin J. Osborne.
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
2. Information Economics
2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
How to Solve Strategic Games? Dominant Strategies
How to Solve Strategic Games? There are three main concepts to solve strategic games: 1. Dominant Strategies & Dominant Strategy Equilibrium 2. Dominated Strategies & Iterative Elimination of Dominated
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Online Ad Auctions. By Hal R. Varian. Draft: February 16, 2009
Online Ad Auctions By Hal R. Varian Draft: February 16, 2009 I describe how search engines sell ad space using an auction. I analyze advertiser behavior in this context using elementary price theory and
1 Nonzero sum games and Nash equilibria
princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
8 Modeling network traffic using game theory
8 Modeling network traffic using game theory Network represented as a weighted graph; each edge has a designated travel time that may depend on the amount of traffic it contains (some edges sensitive to
When is Reputation Bad? 1
When is Reputation Bad? 1 Jeffrey Ely Drew Fudenberg David K Levine 2 First Version: April 22, 2002 This Version: November 20, 2005 Abstract: In traditional reputation theory, the ability to build a reputation
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Managing Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
