!NAVSEC':!A!Recommender!System!for!3D! Network!Security!Visualiza<ons!

Similar documents
Network Security - A Parallel 3D Visualization

Configuring Security for FTP Traffic

System Specification. Author: CMU Team

Chapter 11 Cloud Application Development

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Course Title: Penetration Testing: Security Analysis

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Virtual Server in SP883

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Table of Contents. Introduction. Audience. At Course Completion

Configuring Security for SMTP Traffic

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

1 Scope of Assessment

Tk20 Network Infrastructure

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

Web Security School Final Exam

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Solution of Exercise Sheet 5

Tenable for CyberArk

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

VPN Lesson 2: VPN Implementation. Summary

Metrics Suite for Enterprise-Level Attack Graph Analysis

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Indexing Full Packet Capture Data With Flow

Integrating Web Application Security into the IT Curriculum

Network Monitoring and Traffic CSTNET, CNIC

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

MetaXSSploit. Bringing XSS in Pentesting A journey in building a security tool. Claudio

Intro to Firewalls. Summary

ECS 235A Project - NVD Visualization Using TreeMaps

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Blended Security Assessments

Firewall Defaults and Some Basic Rules

WHITEPAPER. Nessus Exploit Integration

Vulnerability Assessment Using Nessus

INTRODUCTION TO FIREWALL SECURITY

NV: Nessus Vulnerability Visualization for the Web

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

CHAPTER 20 TESING WEB APPLICATIONS. Overview

A Review on Zero Day Attack Safety Using Different Scenarios

5 Mistakes to Avoid on Your Drupal Website

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University

Analyzing HTTP/HTTPS Traffic Logs

CTS2134 Introduction to Networking. Module Network Security

Intrusion Log Sharing University of Wisconsin-Madison

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Oracle Collaboration Suite

Stateful Firewalls. Hank and Foo

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

HOB WebSecureProxy as an SSL Terminal for Clients

Configuring Network Load Balancing with Cerberus FTP Server

Pwning Intranets with HTML5

Client/server is a network architecture that divides functions into client and server

Tenable Tools for Security Compliance The Antivirus Challenge

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

DataSocket Simplifies Live Data Transfer for LabVIEW

8 Steps for Network Security Protection

Secure Networks for Process Control

8 Steps For Network Security Protection

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Penetration Testing for iphone Applications Part 1

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Firewall Security: Policies, Testing and Performance Evaluation

Application Note. Onsight TeamLink And Firewall Detect v6.3

Android Security Evaluation Framework

CompTIA Network+ (Exam N10-005)

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Internet Banking System Web Application Penetration Test Report

VULNERABILITY MANAGEMENT

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

FTP e TFTP. File transfer protocols PSA1

April 11, (Revision 2)

Cisco RSA Announcement Update

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

MS 10972A Administering the Web Server (IIS) Role of Windows Server

Linux Network Security

NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Web Application Vulnerability Testing with Nessus

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Basic & Advanced Administration for Citrix NetScaler 9.2

PROFESSIONAL SECURITY SYSTEMS

Transcription:

!:!A!Recommender!System!for!3D! Network!Security!Visualiza<ons! Troy%Nunnally% Kulsoom!Abdullah! A.!Selcuk!Uluagac! John!A.!Copeland! Raheem!Beyah! October!14,!2013! CAP!Group,!School!of!ECE! VizSec!2013!

Outline Security Visualization Overview Visualization Challenges Proposed Work Motivation Application 1 2 3 4 5 Introduc<on! Related!Work!! Evalua<on!! 2! 2!

Convert this Textual network traffic for Tcpdump tool.

255.255.255.255 65535 65535 255.255.255.255 Into this. 2D Parallel Coordinate System 0.0.0.0 0 0 0.0.0.0 Source IP Source Port Dest. Port Dest. IP

255.255.255.255 65535 65535 255.255.255.255 Source IP confusion 2D Parallel Coordinate System 0.0.0.0 0 0 0.0.0.0 Source IP Source Port Dest. Port Dest. IP

Visualization Challenges Security Visualization Overview Visualization Challenges Proposed Work Motivation Application Add Interactions to 2D visualizations Expand the visualization space Introduce!interac<on!techniques! such!as!linking'and'brushing.!! Add!the!z5direc8on'(i.e.,!3D)!to! allow!more!informa<on!to!be! visualized!vs.!its!2d!counterparts.! 6!

Visualization Challenges Security Visualization Overview Visualization Challenges Proposed Work Motivation Application Add Interactions to 2D visualizations Expand the visualization space Many!of!today's!network!security!applica<ons!require!a! user!to!perform!many!interac<ons!within!a!ui.!! Introduce!interac<on!techniques! such!as!color,!linking,!brushing.!! Add!the!zYdirec<on!(i.e.,!3D)!to! allow!more!informa<on!to!be! visualized!vs.!its!2d!counterparts.! 7!

Visualization Challenges Security Visualization Overview Visualization Challenges Proposed Work Motivation Application A!large!number!of!interac<ons!could!overwhelm!or! confuse!a!novice!user.! Finding!visualiza<on!steps!to!complete!cri<cal!tasks! becomes!difficult!to!accomplish!and!could!take!years!to! master.! The!more!complex!visualiza<ons!become,!the!more! visualiza<ons!become!difficult!to!navigate.!! Tenable Nessus 3D Tool [1] 8! 8!

Security Visualization Overview Visualization Challenges Proposed Work Motivation Application NAVSEC: A Recommender System for 3D Network Security Visualizations The!objec<ve!of!this!work!is!to!help!network! administrators!navigate!through!complex!visualiza<ons! and!assist!in!searching!for!advanced!network!abacks.! 9!

Motivation Security Visualization Overview Visualization Challenges Proposed Work Motivation Application Visualization Goal t=n Visualization from an expert Visualization from an active user Recommend next interaction Interaction Path t=3 t=2 t=1 10!

Applications Background Security Visualization Overview Visualization Challenges Proposed Work Motivation Application As a new administrator, you may need guidance to help you find existing or new attacks. Network Administrator of Companies Military Personnel Education/Training 11!

Outline 1 2 3 4 5 Introduc<on! Related!Work!! Evalua<on!! 12! 12!

Searching!takes!<me!and! effort.!also,!finding!specific! uses!of!visualiza<on!tool!of! abacks!is!difficult.!!! Experts!cost!<me!and!money.! Plus,!he/she!may!not!always! be!present.!! Ask an expert. 13!

Recommender!systems!(e.g.,!Neflix!and!Amazon)!are!used!in! recommending!products!and!services.! Community'Command'[16]'recommend!a!single!interac<on!for! soiware!applica<ons!such!as!autocad.!!nimble'[21]!calculates!the!similarity!for!given!ids!alerts!and! historical!alerts.! To!our!knowledge,!no!work!has!been!done!in!developing!a!recommender! system!to!help!a!novice!user!make!intelligent!decisions!about!network! abacks!in!3d!visualiza<on!applica<ons.! 14!

Outline Overview Recommendation Engine Implementation 1 2 3 4 5 Introduc<on! Related!Work!! Evalua<on!! 15!

System Overview Overview Recommendation Engine Implementation Ac<ve!User!!Y!!individual!naviga<ng! the!visualiza<on!tool.! Expert!User!Community!Y!a!set!of! users!with!significant!experience!in! the!network!security!and! visualiza<on!fields! Interac<on!Database!Y!a!collec<on!of! interac<on!sequences.!! Recommender!Y!!parses!the!data! computes!a!set!of!interac<ons!for! recommenda<on!to!an!ac<ve!user!in! realy<me.! 16!

Recommender Engine Overview Recommendation Engine Implementation We!apply!recommenda<ons!of!interac<ons!so!that!the!user!could! navigate!through!the!visualiza<on!more!effec<vely.!! 17!

3D Parallel Coordinates Recommendation Engine Overview Recommendation Engine Implementation 1 Formulate an interaction vector v k V k = interaction vector for an attack sessions s k n j = interaction type (zoom, rotate, etc.) for an attack sessions s k 2 Create a Similarity Matrix M 65535 v k Active users v h - Expert users M k similarity matrix 3 Recommend a set of interactions Recommend interaction sequence with the highest similarity score. 0 18!

Implementation Overview Recommendation Engine Implementation NAVSEC server uses an Application Programming Interface (API) to receive HTTP requests. NAVSEC API uses Model-View- Controller architecture design to assist in code reusability. NAVSEC server could act as a centralized database for multiple active user clients. 19!

Implementation Overview Recommendation Engine Implementation NAVSEC contains a client-side C++ component which is integrated as a module of FRE3DS to send GET HTTP request of interactions to the server-side application. ' FRE3DS NAVSEC Module P3D [19] T. Nunnally, A. S. Uluagac, J. Copeland, and R. Beyah, 3DSVAT: 3D Stereoscopic Vulnerability Assessment Tool for Network Security, in Proceedings of the 37 th IEEE Conference on Local Computer Networks (LCN), 2012. 20!

Use-case Convergence Test 1 2 3 4 5 Introduc<on! Related!Work!! Evalua<on!! 21!

Concurrent FTP transfer Use-case Convergence Test 22!

Concurrent FTP transfer Use-case Convergence Test 23!

Disguised Port Scan Attack Use-case Convergence Test 24!

Convergence Test Use-case Convergence Test 5!Sessions!from!an!ac<ve!user.! 40!interac<on!vectors!from!expert! users.! 30!types!of!interac<on!types!(e.g.,! zoom!out,!zoom!in,!rotate,!add!lei! plane,!add!line!glyphs).!! These!results!suggest!that!with!the!use!of! NAVSEC,!visualiza<ons!for!the!P3D!tool! converges!towards!an!expert!user s! interac<on!set.! 25!

Outline Contributions and Summary Future Work 1 2 3 4 5 Introduc<on! Related!Work!! Evalua<on!! 26!

Contributions and Summary Contributions and Summary Future Work NAVSEC!uses!advanced!data!mining!techniques!to! recommend!interac<ons.! NAVSEC!is!useful!for!assis<ng!novice!users!in!naviga<ng! 3D!visualiza<ons.!! Our!results!show!that!NAVSEC!can!converge!to!a! meaningful!visualiza<on!performed!by!a!user.!! 27!

Future Work Contributions and Summary Future Work The future work includes: Implementa<on!and!evalua<on!of!more!advance! useycase!scenarios!(i.e.,!introduce!benign!traffic).! User!tes<ng.! 28!

Thank You Thank You Troy.Nunnally@gatech.edu! 29!