330 likes | 429 Views
Research Direction Introduction. Advisor: Professor Frank, Y.S. Lin Presented by Chi-Hsiang Chan. Agenda. Problem Description Mathematical Formulation. Agenda. Problem Description Mathematical Formulation. Problem Description. Network survivability Collaborative attack
E N D
Research Direction Introduction Advisor: Professor Frank, Y.S. Lin Presented by Chi-Hsiang Chan
Agenda • ProblemDescription • MathematicalFormulation
Agenda • ProblemDescription • MathematicalFormulation
Problem Description • Network survivability • Collaborative attack • Various defense mechanisms
Defender View • Special Defense Resource • Cost budget • VM IDS signature • Cloud security service • Costless(impact QoS) • VMM local defense • Dynamic topology reconfiguration
Attacker View • Attack Network • Commander • Attacker • Budget • Initial location(Insider, Outsider) • Capability(How well attacker uses attack tools) • Goal • Steal confidential information(Specific core node) • Service disruption
Per Hop Decision(Attack Event) • Period decision • Early stage • Late stage • Strategy decision by criteria • Compromise -> risk avoidance • Pretend to attack -> risk tolerance • No. of attackers • Choose ideal attackers • Aggressiveness • Attack Energy • Budget • Capability
Time Issue • Attacker • Compromise time • Recovery time • Defender • Signature generate • Reconfiguration impact QoS
Synergy • Pros • Decrease budget cost of each attacker • eg. A(budget:100 capability:10) B(budget:200 capability:5) • Less recovery time • Less compromise time • Cons • Probability of detected
Agenda • ProblemDescription • MathematicalFormulation
Mathematical Formulation • Objective • To minimize maximized service compromised probability • Given • Attacker’s and defender’s total budget • Cost of construct topology and defending resource • QoS requirement • To be determined • Attack and defense configuration • Budget spend on each defending mechanism
Assumptions • There are multiple core nodes and services in the network. • Each core node can provide only one specific service. • Each service has different weight, which is determined by the defender. • There is an SOC with full control of the network. • The defender has complete information of network and can allocate resources or adopt defense solutions by the SOC. • Commanders have only incomplete information about the network. • Only nodes with VMM-IPS have local defense function. • Only nodes with VMM-IPS have signature request function. • Only nodes with cloud security agent have cloud security function.
Given Parameters-Attacker 1,5,8 2,6,7, 11,17 4,9,12,16 F1=3 F2=5 F3=2
Degree of Collaborations • Time aspect • vij↑=> μt↓,σt↓ • Cost aspect Time
Objective Function IP 1
Math Constraints • Budget constraint • Bnodelink≥ 0 • Bgeneral≥ 0 • Bspecial≥ 0 • Bdefending≥ 0 IP 1.1 IP 1.2 IP 1.3 IP 1.4 IP 1.5 IP 1.6
Math Constraints • Constraints for topology construction • qkl ≥ 0 • g(qkl) ≥ 0 • w × e ≥ 0 IP 1.7 IP 1.8 IP 1.9 IP 1.10
Math Constraints • Constraints for general defense resource • nk ≥ 0 • Constraints for cloud security agent • xk= 0 or 1 IP 1.11 IP 1.12 IP 1.13 IP 1.14
Math Constraints • Constraints for virtualization • v(lp)≥ 0 • 0 < lp < kp • Bvirtualization + Bcloudagent ≤ Bspecial • Bnodelink + Bgeneral + Bspecial + Bdefending ≤ B IP 1.15 IP 1.16 IP 1.17 IP 1.18 IP 1.19
Verbal Constraints IP 1.20 IP 1.21 IP 1.22 IP 1.23
QoS Constraint QoS Attack Event
Period • N:ThetotalnumbersofnodesintheDefenseNetworks • F:ThetotalnumbersofnodewhichiscompromisedintheDefenseNetworks.
No. of Attackers • M : Numberofselectedcandidates • SuccessRate(SR) =RiskAvoidanceCompromised/RiskAvoidanceAttacks