network intrusion detection and countermeasure selection

22
Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Under The Guidance of: SWATHI S WALI Assistant Professor Dept. of ISE, NIT & MS Presented By : PRAMOD M 8 th Sem B.E Dept. of ISE, NIT & MS

Upload: pramod-m-mithyantha

Post on 19-Feb-2017

1.120 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Network Intrusion Detection and Countermeasure Selection

Network Intrusion Detection and Countermeasure Selection in Virtual

Network Systems

Under The Guidance of:SWATHI S WALIAssistant ProfessorDept. of ISE, NIT & MS

Presented By:PRAMOD M8th Sem B.EDept. of ISE, NIT & MS

Page 2: Network Intrusion Detection and Countermeasure Selection

Overview Abstract Introduction to NICE NICE models NICE system design NICE attack analyzer Counter measures Conclusion References

Page 3: Network Intrusion Detection and Countermeasure Selection

Abstract In Cloud System attackers can explore

vulnerabilities of a cloud system and compromise virtual machines.

To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection and countermeasure selection mechanism called NICE.

NICE is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures.

Page 4: Network Intrusion Detection and Countermeasure Selection

IntroductionUser can use the cloud system

resources to have his own virtual machine to run the desired application.

Attackers can exploit vulnerabilities in clouds and utilize cloud system resources to deploy attacks.

Cloud users can install vulnerable software on their VMs, which essentially contributes to loopholes in cloud security.

Page 5: Network Intrusion Detection and Countermeasure Selection

Introduction(continued…)The challenge is to establish an

effective attack detection and response system for accurately identifying attacks and minimizing the impact of security breach to cloud users.

For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes.

Page 6: Network Intrusion Detection and Countermeasure Selection

Introduction(continued…)NICE includes two main phases

(1)Deploy network intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic.

NICE-A periodically scans the virtual system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified vulnerability towards the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state.

Page 7: Network Intrusion Detection and Countermeasure Selection

Introduction(continued…)(2) Once a VM enters inspection

state, Deep Packet Inspection(DPI) is applied, or virtual network reconfigurations can be deployed to the inspecting VM to make the potential attack behaviors prominent.

Page 8: Network Intrusion Detection and Countermeasure Selection

Nice ModelsNice Model is to describe how to

utilize attack graphs to model security threats and vulnerabilities in a virtual networked system.

(1)Threat Model The attacker’s primary goal is to

exploit vulnerable VMs and compromise them as zombies.

Page 9: Network Intrusion Detection and Countermeasure Selection

Nice Models(continued…)

Protection model focuses on virtual-network based attack detection and reconfiguration solutions.

Page 10: Network Intrusion Detection and Countermeasure Selection

Nice Models(continued…)(2)Attack Graph Model

An attack graph is a modeling tool to illustrate all possible multi-stage, multi-host attack paths that are crucial to understand threats and then to decide appropriate countermeasures.

In an attack graph, each node represents either precondition or consequence of an exploit.

Page 11: Network Intrusion Detection and Countermeasure Selection

Nice Models(continued…) Attack graph is helpful in

identifying potential threats, possible attacks and known vulnerabilities in a cloud system.

Attack graph provides whole picture of current security situation of the system where we can predict the possible threats and attacks by correlating detected events or activities.

Page 12: Network Intrusion Detection and Countermeasure Selection

Nice Models(continued…)(3) VM Protection Model

The VM protection model of NICE consists of a VM profiler, a security indexer and a state monitor.

Security index is specified by the number of vulnerabilities present and their impact scores.

Page 13: Network Intrusion Detection and Countermeasure Selection

Nice System Design

Page 14: Network Intrusion Detection and Countermeasure Selection

Nice System Design NICE- A is a software agent

running in each cloud server connected to the control center.

NICE- A is a network intrusion detection engine.

Intrusion detection alerts are sent to control center when suspicious traffic is detected.

Page 15: Network Intrusion Detection and Countermeasure Selection

After receiving an alert, attack analyzer decides what countermeasure strategies to take, and then initiates it through the network controller.

The network controller is responsible for deploying attack counter measures based on decisions made by the attack analyzer.

VM profiles are maintained in a database and contain comprehensive information about vulnerabilities and alert.

Page 16: Network Intrusion Detection and Countermeasure Selection

Every detected vulnerability is added to its corresponding VM entry in the database.

Alert involving theVM will be recorded in the VM profile database.

Page 17: Network Intrusion Detection and Countermeasure Selection

Attack Analyzer

Page 18: Network Intrusion Detection and Countermeasure Selection

After receiving an alert from NICE-A, alert analyzer matches the alert in the ACG.

If the alert already exists in the graph and it is a known attack, the attack analyzer performs countermeasure selection procedure.

If the alert is new, attack analyzer will perform alert correlation and analysis.

If the alert is a new vulnerability and is not present in the NICE attack graph, the attack analyzer adds it to attack graph and then reconstructs it.

Page 19: Network Intrusion Detection and Countermeasure Selection

Counter MeasuresBy changing the MAC address of

the virtual machine, one can prevent the vulnerabilities on the virtual machine.

Creating filtering rules, will also help in preventing the attacks on the virtual machines.

By changing the IP address.

Page 20: Network Intrusion Detection and Countermeasure Selection

ConclusionNICE is used to identify attacks in

the cloud virtual networking environment.

NICE utilizes the attack graph model to conduct attack detection and prediction.

NICE shows that the proposed solution can significantly reduce the risk of the cloud system.

Page 21: Network Intrusion Detection and Countermeasure Selection

REFERENCES[1] Coud Sercurity Alliance, “Top threats to cloud computing v1.0,”

https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, March 2010.

[2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Kon- winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” ACM Commun., vol. 53, no. 4, pp. 50–58, Apr. 2010.

[3] B. Joshi, A. Vijayan, and B. Joshi, “Securing cloud computing environment against DDoS attacks,” IEEE Int’l Conf. Computer Communication and Informatics (ICCCI ’12), Jan. 2012.

[4] H. Takabi, J. B. Joshi, and G. Ahn, “Security and privacy chal- lenges in cloud computing environments,” IEEE Security & Pri- vacy, vol. 8, no. 6, pp. 24–31, Dec. 2010.

[5] “Open vSwitch project,” http://openvswitch.org, May 2012. [6] Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J.

Barker, “Detecting spam zombies by monitoring outgoing mes- sages,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 198–210, Apr. 2012.

Page 22: Network Intrusion Detection and Countermeasure Selection

Than

k You