Attack Taxonomies and Ontologies



Similar documents
Attack Frameworks and Tools

External Supplier Control Requirements

Networking: EC Council Network Security Administrator NSA

Cyril Onwubiko Networking and Communications Group ncg.kingston.ac.

The Cyber Threat Profiler

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

CS5008: Internet Computing

Passing PCI Compliance How to Address the Application Security Mandates

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Ontology-based Intelligent Network Forensics Investigation

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Deploying Firewalls Throughout Your Organization

Effectiveness of blocking evasions in Intrusion Prevention Systems. White Paper. April, Konstantinos Xynos, Iain Sutherland, Andrew Blyth

The Ontological Approach for SIEM Data Repository

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How To Classify A Dnet Attack

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Overview. Firewall Security. Perimeter Security Devices. Routers

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Networking for Caribbean Development

Deployment of Snort IDS in SIP based VoIP environments

CYBERSECURITY: ISSUES AND ISACA S RESPONSE


Reference Architecture: Enterprise Security For The Cloud

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Frequent Denial of Service Attacks

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Developing Secure Software in the Age of Advanced Persistent Threats

Securing OS Legacy Systems Alexander Rau

Intelligent Worms: Searching for Preys

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Honeypot as the Intruder Detection System

Introduction to Cyber Security / Information Security

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Certified Ethical Hacker (CEH)

CS 356 Lecture 16 Denial of Service. Spring 2013

Banking Security using Honeypot

IBM Managed Security Services Vulnerability Scanning:

Keyword: Cloud computing, service model, deployment model, network layer security.

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Module 1: Introduction to Designing Security

IQware's Approach to Software and IT security Issues

KEY TRENDS AND DRIVERS OF SECURITY

Defensible Strategy To. Cyber Incident Response

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Network Instruments white paper

Security Information Management (SIM)

Metasploit The Elixir of Network Security

Network Security Monitoring: Looking Beyond the Network

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

The Information Security Problem

Information Security Attack Tree Modeling for Enhancing Student Learning

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Application of ontologies for the integration of network monitoring platforms

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

A Systems Engineering Approach to Developing Cyber Security Professionals

Protecting Your Organisation from Targeted Cyber Intrusion

The Business Case for Security Information Management

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

IDS / IPS. James E. Thiel S.W.A.T.

Architecture Overview

EC-Council. Certified Ethical Hacker. Program Brochure

Semantically Enhanced Web Personalization Approaches and Techniques

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

SANS Top 20 Critical Controls for Effective Cyber Defense

Incident Object Description and Exchange Format

Student Tech Security Training. ITS Security Office

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

ICTN Enterprise Database Security Issues and Solutions

What is Really Needed to Secure the Internet of Things?

PROACTIVE PROTECTION MADE EASY

Industrial Firewalls Endpoint Security

Information Security Services

How To Protect Yourself From A Dos/Ddos Attack

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

6. Exercise: Writing Security Advisories

A Senior Design Project on Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Defending Against Data Beaches: Internal Controls for Cybersecurity

Innovative Defense Strategies for Securing SCADA & Control Systems

Transcription:

Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik Technische Universität München Attack Taxonomies and Ontologies Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014

2013 in Numbers 552 MILLION 78 PERCENT 62 PERCENT IDENTITIES EXPOSED OF WEBSITES WITH VULNERABILITIES GROWTH OF DATA BREACHES FROM 2012 New Vulnerabilities 2013 2012 6,787 +28% 5,291 SSL and TLS protocol renogotiation vulnerabilities were most commonly exploited. Symantec Security Threat Report 2014 2

Status, Trends and Challenges Affecting Security Increased sophistication of attacks number of security vulnerabilities number of network and computer attacks Traditional security is not enough to defend against the latest generation of malware[1]. To protect against attacks we need comprehensive knowledge and understanding of attacks a distinctive and clear classification of attacks [1]Gavin Reid, director of threat intelligence for Cisco 3

Taxonomies A taxonomy is a system of classification which allows the unique identification of object Bishop, M., Bailey, D.;1996 A taxonomy organizes domain specific information in a hierarchically structure over relationships. 4

Well-known Taxonomies PLANT KINGDOM Spore Bearing Plants Seed Bearing Plants Algae Mosses Ferns Flowering Plants Gymnosperms ANIMAL KINGDOM Unicellular Animals Multicellular Animals Invertebrates Vertebrates 5

A Commonly Used Taxonomy 6

Attack Taxonomy Example J. B. Gao, B. W. Zhang, X. H. Chen, Z. Luo, 2013 7

Attack Taxonomy Example J. B. Gao, B. W. Zhang, X. H. Chen, Z. Luo, 2013 8

Attack Taxonomy Example Attack Impact attack impacts on security principles Attack Vector path by which an attack is lauched Attack Target attack targets such as hardware, software or users Vulnerability weaknesses and flaws of the system Defense defence and prevention methods 9

Attack Taxonomy Example Attack Impact attack impacts on security principles Attack Vector path by which an attack is lauched Attack Target attack targets such as hardware, software or users Vulnerability weaknesses and flaws of the system Defense defence and prevention methods 10

Attack Taxonomy Example Attack Impact attack impacts on security principles Attack Vector path by which an attack is lauched Attack Target attack targets such as hardware, software or users Vulnerability weaknesses and flaws of the system Defense defence and prevention methods 11

Attack Taxonomy Example Attack Impact attack impacts on security principles Attack Vector path by which an attack is lauched Attack Target attack targets such as hardware, software or users Vulnerability weaknesses and flaws of the system Defense defence and prevention methods 12

Attack Taxonomy Example Attack Impact attack impacts on security principles Attack Vector path by which an attack is lauched Attack Target attack targets such as hardware, software or users Vulnerability weaknesses and flaws of the system Defense defence and prevention methods 13

Attack Example SQL Slammer A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network. Attack Impact Availability Integrity Attack Vector UDP Buffer Overflow Worm (Malicious code) DoS Attak Target Vulnerability Defense MS SQL server 2000 (Software - Network) CVE-2002-0649 (Implementation) Patch System 14

Limitations of Taxonomies developed only for specific domains reusability in other fields difficult difficult extend or update inconsistant vocabulary/ no formal language only represent hierarchical relationships 15

From Taxonomies to Ontologies An ontology is an explicit specification of conceptualization. Gruber, T. R., 1993 An ontology consists of classes to describe a domain slots to describe relationships in a taxonomy facets to describe restrictions for slots 16

Ontologies vs. Taxonomies Use hierarchical and semantical relationships between classes Provide machine interpretable semantic and syntax (RDF, OWL) They enable easy extension and sharing of knowledge 17

Example Ontology Thing Human Animal Woman Man Mother Father 18

Example Ontology haschild Thing Human Animal Woman Mother hashusband Man Father 19

Example Ontology haschild Thing Human Animal Woman Mother hashusband Man Father 1. A woman can have 0 or 1 huband. 2. A human can have 0 or n children. 3. Every mother must have at least 1 child. 20

Attack Ontology Example The SQL Slammer is a computer worm and has the attack vectors buffer overflow and denial of service. The attack is enabled by the vulnerabilities due to implementation flaws. Threatened targets are networks. If a Slammer attack succeeds he can cause further DoS attacks. J. B. Gao, B. W. Zhang, X. H. Chen, Z. Luo, 2013 21

Utility of Ontologies Locate IT security vulnerabilities and risks - Detect vulnerabilities (Vulnerabilities) on system (Attack Target) - Query what attacks can occur based on the vulnerabilities(attack Vector) - Determine risks (Attack Impact) - Determine neccessary defense methods (Defense) Uses of other ontologies - Intrusion Detection Systems (IDS) and application fire walls : Monitoring component collects data(traffic, requests, packets) and alerting system provides response on attempted attack and countermeasures 22

Conclusion Taxonomies are important building blocks in a full function information architecture. Ontologies extend taxonomy functionalities by overcoming their limitiations. A large variety of attack taxonomies and ontologies exists focusing on different fields of research. Existing taxonomies and ontologies need to be comined to create a flexible, extensible and standard classification scheme. 23

Literatur M. Bishop, D. Bailey: A critical analysis of vulnerability taxonomies, California University Davis, Department of Computer Science, 1996 J. B. Gao, B. W. Zhang, X. H. Chen, Z. Luo: Ontology-based model of network and computer attacks for security assessment Journal of Shanghai Jiaotong University (Science), 18. Jg., pages 554-562, 2013 T. R. Gruber: A translation approach to portable ontology specications, Knowledge acquisition, 5. Jg., Nr. 2, pages 199-220, 1993 J. Undercoer, A. Joshi, J. Pinkston: Modeling computer attacks: An ontology for intrusion detection, In: Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, pages 113-135, 2003 R. P. van Heerden, B. Irwin, I. D. Burke: Classifying network attack scenarios using an Ontology, In: Proceedings of the 7th International Conference on Information Warfare and Security. Academic Conferences Limited, pages 331-324, 2012 24

Contact Fakultät für Informatik Informatik VIII: Lehrstuhl für Netzarchitekturen und Netzdienste Natascha Abrek abrek@in.tum.de 25