110 likes | 247 Views
Enabling Network Security. Ashraf Matrawy, Ph.D., P.Eng., SMIEEE Carleton School of IT and the Department of Systems and Computer Engineering RCTI workshop on “ Networks for Defence” February 1, 2008. Outline. Introduction and Motivation Designing NDoS-Resilient Data Networks
E N D
Enabling Network Security Ashraf Matrawy, Ph.D., P.Eng., SMIEEE Carleton School of IT and the Department of Systems and Computer EngineeringRCTI workshop on “Networks for Defence” February 1, 2008
Outline • Introduction and Motivation • Designing NDoS-Resilient Data Networks • Network Security Evaluation: Case study of Intrusion Detection Systems • Investigation of stealthy worm attacks
Motivation • The IP model was not designed with security in-mind • Open, simple core • Innovation and complexity at the edge • Software vulnerabilities • New generation of threats • Stealthy malware • Targeted attacks • New technologies, devices and their threats • The human factor
Research framework • Introducing intelligence to the best-effort model • Multicast (Ph.D. research): network support for multicast applications • XML routing for content-aware networking • Network Security • New network design that can provide security to end-systems • Enabling network forensics: efficient storage and efficient traceback • Providing trust through distributed logging • Investigation of new threats
Projects • Current projects • Investigation of stealthy worm attacks (Alcatel-Lucent and OCE) -PI • Traffic analysis for Internet security (NSERC) - PI • Recent projects • Quantitative evaluation of network security (Solana Networks and CITO) - PI • Application-aware networking (Alcatel and CITO) - PI • Critical infrastructure protection by integrating GIS and NMS (PSEPC) • Public alert systems over the Internet (Industry Canada) • Scheduling in Resilient Packet Ring networks (NSERC)
Network DoS • Work with Paul van Oorcshot and Anil Somayaji • DDoS (Distributed DoS) • NDoS: a subset of DDoS: • We address NDoS inside the network • End systems can not solve this problem • A new diversity-based traffic management
Network Security Evaluation • Work with Fadi El-Hassan, Nabil Seddigh, and Biswajit Nandy • The Hierarchical Quantitative Metrics (HQM) Model • IDS – Snort • Prototype Evaluator • Project is funded by CITO & Solana Networks
The Hierarchical Quantitative Metrics (HQM) Model IAM Security Technical Incident Statistics Security Tests IDS Vulnerability Scanner W2 W1 Wn Analysis M1 M2 Mn
Investigation of Stealthy Worm Attacks • Work with Craig Smith, Stanley Chow and Bassem Abdleaziz • more members to join • New generation of malware: • Example: Storm • Hiding worm activity during target discovery, propagation, activation, .. • Current defenses can not help! • Funding from Alcatel-Lucent and OCE
New areas • Malware spreading through wireless LANS • Malware for mobile devices • Network security in new environments (Mesh networks, aircrafts, …)