malware mimics for network security assessment

17
Malware Mimics for Network Security Assessment CDR Will Taff LCDR Paul Salevski March 7, 2011

Upload: lynda

Post on 22-Feb-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Malware Mimics for Network Security Assessment. CDR Will Taff LCDR Paul Salevski March 7, 2011. Agenda. Motivation Introduction Vision Proposal What we did Way Ahead. 2. Motivation. 3. Motivation – In the Lab. 4. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Malware Mimics for Network Security Assessment

Malware Mimics for Network Security

AssessmentCDR Will Taff

LCDR Paul SalevskiMarch 7, 2011

Page 2: Malware Mimics for Network Security Assessment

• Motivation• Introduction• Vision• Proposal• What we did• Way Ahead

2

Agenda

Page 3: Malware Mimics for Network Security Assessment

3

Motivation

Page 4: Malware Mimics for Network Security Assessment

4

Motivation – In the Lab

Page 5: Malware Mimics for Network Security Assessment

• Currently, DoD relies on Red Teams (trusted adversaries) for Information Assurance (IA) testing and evaluation of military networks

• This approach is unsatisfactory:• Relies on constrained resource

(Red Teams)• Limited in scope of effects

(safety/risk to host network)• Non-uniform/inconsistent

applicationOR• Confined to laboratory setting

(not “Train Like Fight”)5

Introduction

Page 6: Malware Mimics for Network Security Assessment

Introduction - The Way the Navy Is

Internet

Global Informatio

n Grid (GIG)

Owned and

Operated by DISA

Network Operating Centers

SIPR

NIPRJWICS

CENTRIXS

Page 7: Malware Mimics for Network Security Assessment

• We propose the development of a distributed software system that can be used by either simulated adversaries (such as Red Team) or trusted agents (such as Blue Team) to create scenarios and conditions to which a network management/defense team will need to react and resolve.

7

Proposal

Page 8: Malware Mimics for Network Security Assessment

8

Vision

STEP SiteNorthwest, VAFt. Meade, MD

Norfolk, VAMM-Server

Global Information Grid (GIG)

Global Information Grid (GIG)

USS Arleigh BurkeMM-Clients

Page 9: Malware Mimics for Network Security Assessment

9

Malware Mimic

• Have the “trainer” sitting anywhere• Trainer remotely controls a network of

pre-installed software nodes on training network simulating network malware/mal-behaviors• Simulate virus• Simulate bots• Simulate Internet worms• Simulate malicious “hackers”

• “Trainee” reacts to simulated effects in same manner as actual threats

Page 10: Malware Mimics for Network Security Assessment

• Network nodes consist of Java software packages running on top of pre-existing and unmodified network hosts• No (unwanted) impact to users• No need for additional hardware

• Network nodes coordinate effects via Trainer controlled Command and Control Server• Local or Offsite

• Solves problem of “flying in” a red team

10

Architecture

Page 11: Malware Mimics for Network Security Assessment

11

Anatomy of an Attack

Page 12: Malware Mimics for Network Security Assessment

12

Anatomy of an Attack with MM’s

Page 13: Malware Mimics for Network Security Assessment

13

Architecture - Physical Layout

Page 14: Malware Mimics for Network Security Assessment

14

Virtual Layout

Page 15: Malware Mimics for Network Security Assessment

15

Results

Page 16: Malware Mimics for Network Security Assessment

• More Complex Network Architecture• More complex Malware Mimics• Focus on higher security• Installation and testing onto larger and

operational networks• Communication between MM-Clients

16

Way Ahead

Page 17: Malware Mimics for Network Security Assessment

Questions

CDR Will Taff – [email protected] Paul Salevski – [email protected]