Information Security Attack Tree Modeling for Enhancing Student Learning



Similar documents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Network Security Administrator

Critical Controls for Cyber Security.

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Virtual Learning Tools in Cyber Security Education

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Industrial Security for Process Automation

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Computer Network Engineering

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Goals. Understanding security testing

Computer Network Engineering

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FortKnox Personal Firewall

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Microsoft Technologies

Student Tech Security Training. ITS Security Office

Introduction to Cyber Security / Information Security

Understanding Security Testing

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Chapter 9 Firewalls and Intrusion Prevention Systems

ABB s approach concerning IS Security for Automation Systems

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Critical Security Controls

A Biologically Inspired Approach to Network Vulnerability Identification

Need for Database Security. Whitepaper

MANAGED SECURITY SERVICES

HP Security Assessment Services

CMPT 471 Networking II

Symantec Endpoint Protection Analyzer Report

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

How to Hack Millions of Routers. Craig Heffner, Seismic LLC

Minnesota State Community and Technical College Detroit Lakes Campus

[CEH]: Ethical Hacking and Countermeasures

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Host/Platform Security. Module 11

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CyberNEXS Global Services

Build Your Own Security Lab

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

Implementing Cisco IOS Network Security v2.0 (IINS)

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

The Value of Automated Penetration Testing White Paper

8. Firewall Design & Implementation

NETWORK SECURITY (W/LAB) Course Syllabus

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Footprinting and Reconnaissance Tools

Norton Personal Firewall for Macintosh

EC Council Certified Ethical Hacker V8

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Interact Intranet Version 7. Technical Requirements. August Interact

CEH Version8 Course Outline

1. Why is the customer having the penetration test performed against their environment?

Common Cyber Threats. Common cyber threats include:

Directory and File Transfer Services. Chapter 7

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007

CompTIA Network+ (Exam N10-005)

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ REVIEW DATE. Report Amended October 2011

Implementing Cisco IOS Network Security

IINS Implementing Cisco Network Security 3.0 (IINS)

Using a VPN with Niagara Systems. v0.3 6, July 2013

Network Access Security. Lesson 10

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Network System Management. Creating an Active Directory Domain

Implementing the Application Control Engine Service Module

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode

EC-Council. Certified Ethical Hacker. Program Brochure

Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006

Network Security Course Specifications

Learn Ethical Hacking, Become a Pentester

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INFORMATION SECURITY TRAINING CATALOG (2015)

Transcription:

Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department Community College of Baltimore County, Baltimore, MD

Presentation Outline Introduction Background Instructional Approach Threat Modelling Process Lessons Learned Future Work Questions

Introduction: Course Offerings Bowie State University Established in 1865. Current enrollment: 5K+ students CS Department: Offers BS and MS degrees in CS and Computer Technology - About 500 undergraduates and 40 graduate students - ABET Accredited Course Offerings: - Foundations of Computer & Network Security - Principles & Methods of IDS and IPS - Software & Operating System Security - Fundamentals of Cryptography and Applications - Cyber Law

Introduction: Course Offerings Community College of Baltimore County (CCBC) Established in 1957. Current enrollment: 70,000 students Offers A.A. and A.A.S. degrees in Computer Science, Network Technology, and Information Systems - Middle States Commission on Higher Education Accreditation Course Offerings: - Introduction to Information Security (Security+) - Operating Systems Security - Network Defense and Countermeasures

Background Failure Mode and Effect Analysis (FMEA) Software error seeding and scenario analysis Threat modeling Microsoft Tool The courses and student population - Fundamentals of Computer and Network Security (Spring 2005, 6 graduate students and 5 undergraduates) - Principles of Intrusion Detection and Prevention (Fall 2005, 2 undergraduates 8 graduate students)

Instructional Approach Instructional Environment Lecture and Lab. Exercises using VMWare (USMA VIAN experiments with exploits) Laboratory exercises modeling attack trees of the top 20 SANS vulnerabilities Typical business enterprise Network Operations Map (TOM)

Attack Tree Modeling and Attack Scenarios SANS Institute Top-20 Vulnerabilities: Awareness http://www.sans.org/top20/ Top Vulnerabilities in Cross-Platform Applications C1. Backup Software C2. Anti-virus Software C3. PHP-based Applications C4. Database Software C5. File Sharing Applications C6. DNS Software C7. Media Players C8. Instant Messaging Applications C9. Mozilla and Firefox Browsers C10. Other Cross-platform Applications

Attack Tree Modeling and Attack Scenarios (cont d) Top Vulnerabilities in Windows Systems W1. Windows Services W2. Internet Explorer W3. Windows Libraries W4. Microsoft Office and Outlook Express W5. Windows Configuration Weaknesses Top Vulnerabilities in UNIX Systems U1. UNIX Configuration Weaknesses U2. Mac OS X Top Vulnerabilities in Networking Products N1. Cisco IOS and non-ios Products N2. Juniper, CheckPoint and Symantec Products N3. Cisco Devices Configuration Weaknesses

A Typical (Telecom) Business Enterprise

Threat Modeling: Textual Description GOAL: (G0) Gain Privileged Access to a Web Server Using a Known Vulnerability AND G1. Identify organization s domain name. G2. Identify organization s firewall IP address OR 1. Interrogate domain name server 2. Scan for firewall identification 3. Trace route through firewall to Web server G3. Determine organization s firewall access control OR 1. Search for specific default listening ports 2. Scan ports broadly for any listening port G4. Identify organization s Web server operating system and type OR 1. Scan OS services banners for OS identification 2. Probe TCP/IP stack for OS characteristic information G5. Exploit organization s Web server vulnerabilities OR 1. Access sensitive shared intranet resources directly 2. Access sensitive data from privileged account on Web server

Threat Modeling - Web Server Attack Graphical Representation G0 G1 G2 G3 G4 G5 G21 G22 G23 G31 G32 G41 G42 G51 G52 (G0 G1 G2 G3 G4 G5); (G2 G21 G22 G23)

Threat Modeling: 24 Attack Scenarios [G1, G21, G31, G41, G51], [G1, G21, G32, G41, G51], [G1, G21, G31, G42, G51], [G1, G21, G32, G42, G51], [G1, G22, G31, G41, G51], [G1, G22, G32, G41, G51], [G1, G22, G31, G42, G51], [G1, G22, G32, G42, G51], [G1, G23, G31, G41, G51], [G1, G23, G32, G41, G51], [G1, G23, G31, G42, G51], [G1, G23, G32, G42, G51] [G1, G21, G31, G41, G52], [G1, G21, G32, G41, G52], [G1, G21, G31, G42, G52], [G1, G21, G32, G42, G52], [G1, G22, G31, G41, G52], [G1, G22, G32, G41, G52], [G1, G22, G31, G42, G52], [G1, G22, G32, G42, G52], [G1, G23, G31, G41, G52], [G1, G23, G32, G41, G52], [G1, G23, G31, G42, G52], [G1, G23, G32, G42, G52]

Lessons Learned and Challenges Students inability to think like hackers in modeling attack scenarios - Given a vulnerability, they tend to think in terms of what the system administrator should do rather than system exploitation strategies The challenge of modeling all possible attack scenarios--coverage The challenge of testing the scenarios with some degree of confidence

Future Work Developing a system capability metric to support system vulnerability scanning and penetration testing Implement an algorithm for a system capability metric/framework for system administrators and Red teams

Level 0 100% testing of attack scenarios A Single Level Continuous Sampling Scheme with Switching Rules for Establishing a Measure of Vulnerability for a Business Enterprise I 0 Successive Scenarios Pass? Yes Yes Level 1 100% testing Test Of at attack rate f 1 scenarios Test fails at Level 1? Yes State R 1 100% testing of i R1 scenarios Test fails in state R 1? Yes I 1 No No No Tested scenarios Pass? Yes Level 2 CL f 10.0% 5.0% 4.0% 1 1/5 i=9 i=26 i=35 CL: Confidence Level f 1 = 2f 2 I 0 = I 1

Future Work Sampling Scheme

Questions? Thanks for listening!

From An Attack Tree to An Attack Forest Vulnerability Scanning versus Penetration Testing Vulnerability scanning aims to identify potential problems based on known vulnerabilities Penetration testing attempts to breach security defenses of a system by exploiting system vulnerabilities using hacking tools, etc.