270 likes | 419 Views
Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots. Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin. Agenda. Introduction Solution Approach Evaluation Process Policy enhancement Initial parameter configuration Experiment on M
E N D
Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Introduction • In order to make attack and defense behavior close to the real world, we add some new perspectives in this work. • For instance, due to the advent of new technology, defenders have different kind of solutions to deal with malicious attackers. • Therefore, in this work, we not only consider general defense resource but also another kind of defensive technology, honeypot, as a deceptive tool to distract attackers. OP Lab @ IM, NTU
Introduction • For defense resource, we have two different types: honeypot, and non-honeypot. • Honeypot • The main objective of this kind of defense resource is to cheat attackers. Once attackers compromise these systems, they wasted their finite budget. • Learning attack tactic and wasting attack resource • False target • Non-honeypot • This kind of defense resource is allocated to nodes in the network. The purpose of this resource is to increase defense capability on nodes. OP Lab @ IM, NTU
Introduction • For attackers, we also made a classification. The classifying criteria are : • Budget level • High, medium, and low • Capability • High, medium, and low • Next hop selecting criteria • Highest link utilization • Lowest link utilization • Lowest defense level • Random attack OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Solution Approach • Evaluation Process • Since our scenario and environment are very dynamic, it is hard to solve the problem purely by mathematical programming. • For each attacker category, although attackers in it belong to the same type, there is still some randomness between each other. • This is caused by honeypots. if an attacker compromises a false target honeypot, there is a probability that he will believe the core node is compromised and terminate this attack. • Therefore, we can never guarantee the result of an attack is successful or failed until at the end of the evaluation. OP Lab @ IM, NTU
Solution Approach • Evaluation Process Run evaluation with the 36 kinds of different attackers for M times and get the core node compromise frequency. Let the frequency divided by M to gather average core node compromised probability. Initial state Run another evaluation M times using adjusted defense parameters and get the corresponding probability N times Yes Adjust defense parameters by policy enhancement No Compare result with the initial one OP Lab @ IM, NTU
Solution Approach • Evaluation Process • Parameter generation • M (Total evaluation frequency for one round) • First, we make an initial value, for example, 10 million. Then, we let 10 thousands as a chunk to summary the result and draw a diagram depicting the relationship between compromised frequency and number of chunks. • If the diagram shows a converging trend, it implies the value of M is an ideal one. • N (Total rounds for policy enhancement) • We set this value by resource constrained approach. OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Solution Approach • Policy enhancement • The main concept of Policy enhancement can be summarized into the following parts. • Popularity Based Strategy • This strategy is focuses on those nodes are frequently attacked. Therefore, we let the total cost attackers spent on each node as the metric in the Policy enhancement. • Derivative • This concept is using to measure the marginal effectiveness of each defense resource allocation. OP Lab @ IM, NTU
Solution Approach • Policy enhancement Calculate derivative of defense resource with one virtual positive unit resource Is it a honeypot No Highest group Yes Select the highest derivative from the two groups respectively and remove one unit resource from the lowest group to the highest group Calculate derivative of defense resource and link utilization with one virtual positive unit resource By the attack cost spent on each node, we chose first three of the highest (and lowest) nodes as two groups. Calculate derivative of defense resource and link utilization with one virtual negative unit resource Yes Calculate derivative of defense resource with one virtual negative unit resource Lowest group Is it a honeypot No OP Lab @ IM, NTU
Solution Approach • The relationship between evaluation process and policy enhancement. Calculate derivative of defense resource with one virtual positive unit resource Is it a honeypot No Highest group Run evaluation with the 36 kinds of different attackers for M times and get the core node compromise frequency. Let the frequency divided by M to gather average core node compromised probability. Yes Initial state Select the highest derivative from the two groups respectively and remove one unit resource from the lowest group to the highest group Calculate derivative of defense resource and link utilization with one virtual positive unit resource By the attack cost spent on each node, we chose first three of the highest (and lowest) nodes as two groups. Run another evaluation M times using adjusted defense parameters and get the corresponding probability N times Yes Adjust defense parameters by improving procedure Calculate derivative of defense resource and link utilization with one virtual negative unit resource No Compare result with the initial one Yes Calculate derivative of defense resource with one virtual negative unit resource Lowest group Is it a honeypot No OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
t W F F W S Initial parameter configuration • Defender • Defense resource allocation • We allocate resource according to two major metrics: • Hop count to the core node • The larger hop count the lower defense level is • Number of out links of each node • The higher number of out links the higher defense level is. • Honeypot link utilization • Initial value is set to be 0.5. OP Lab @ IM, NTU
Initial parameter configuration • Attacker • Budget level • Multiple of Minimum attack cost • Low level: 1~3 times of minimum attack cost • Medium level: 3~5 times of minimum attack cost • High level: over 5 times • Capability • High level: 30% deceived probability • Medium level: 50% deceived probability • High level: 70% deceived probability OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Experiment on M • We run different number of chunks to discover which one is an ideal value for M. • 10 chunks • 100 chunks • 1,000 chunks • 10,000 chunks • Each chunk represents result of 10 thousand times evaluation, i.e., attacking. OP Lab @ IM, NTU
Experiment on M • Result of 10 chunks OP Lab @ IM, NTU
Experiment on M • Result of 100 chunks OP Lab @ IM, NTU
Experiment on M • Result of 1,000 chunks OP Lab @ IM, NTU
Experiment on M • Result of 10,000 chunks OP Lab @ IM, NTU
Agenda • Introduction • Solution Approach • Evaluation Process • Policy enhancement • Initial parameter configuration • Experiment on M • Summary OP Lab @ IM, NTU
Summary • According to the experiment result, we can discover the core node compromised frequency in 10 thousand (one chunk) attacks is only 3~4 thousand times. • Many attackers with high budget level is deceived by honeypots. OP Lab @ IM, NTU
Thanks for Your Listening OP Lab @ IM, NTU
Experiment data Total defense budget is set to be 100 • Information of attacker 3 is as follows: • Budget level is: 415.092896 • Capability is 0.500000 • Next hop selecting criteria is 4 • Round time is: 14 • compromising path is: • Path: 10 7 4 2 5 8 6 0 0 0 • Information of attacker 30 is as follows: • Budget level is: 364.396271 • Capability is 0.500000 • Next hop selecting criteria is 3 • Round time is: 58 • compromising path is: • Path: 10 9 6 0 0 0 0 0 0 0 • Information of attacker 6 is as follows: • Budget level is: 316.021667 • Capability is 0.700000(High level) • Next hop selecting criteria is 3 • Round time is: 7 • compromising path is: • Path: 10 9 6 0 0 0 0 0 0 0 • Information of attacker 18 is as follows: • Budget level is: 286.996918 • Capability is 0.300000(Low level) • Next hop selecting criteria is 3 • Round time is: 8 • compromising path is: • Path: 10 9 6 8 5 7 4 2 3 1 OP Lab @ IM, NTU