a new paradigm for network security through experiences

A New Paradigm For Network Security Through Experiences From - PowerPoint PPT Presentation

A New Paradigm For Network Security Through Experiences From Reality (ANPFNSTEFR) Mohit Lad, UCLA Mohit Lad, Outrageous 06 Structure of the talk Background and motivation Gibberish More Gibberish A slide with the text


  1. A New Paradigm For Network Security Through Experiences From Reality (ANPFNSTEFR) Mohit Lad, UCLA Mohit Lad, Outrageous 06

  2. Structure of the talk • Background and motivation • Gibberish • More Gibberish • A slide with the text “Questions?” written in big font. Mohit Lad, Outrageous 06

  3. Background 1 Alice, Do you want to have dinner? , e c i l A 2 t u ? o r e b e a b t Alice e t u Bob g o r o b F a w o ! h l a p 3 g n i h t e r u S Frank Mohit Lad, Outrageous 06

  4. Motivation • Defense through defense • Defense through offense new • ANPFNSTEFR newer Mohit Lad, Outrageous 06

  5. What is ANPFNSTEFR? • Security through passive non-violent non- cooperation – Influenced by seminal work by Gandhi in early part of 1900s. • If the attacker attacks one machine, then give him another machine to attack. • Tell an attacker “I am protesting against your attack, but through peaceful and non-violent means” Mohit Lad, Outrageous 06

  6. Why it works better Guilt What the !@#!@#$ ? Oh, You have opened my eyes, I want to travel to the peak of Himalayas I know you are attacking and meditate for the rest machine A, here are the of my life details of machine B Attack Good guy Attacker Mohit Lad, Outrageous 06

  7. Why it works better Fear What the !@#!@#$ ? Seems like a trap, he must be a genius. Instead I am going to I know you are attacking attack somebody willing machine A, here are the to use offense details of machine B Attack Good guy Attacker Mohit Lad, Outrageous 06

  8. Why it works better Lack of challenge My fellow hackers will look down on me. Instead I am going to I know you are attacking attack somebody willing machine A, here are the to use offense details of machine B Attack Good guy Attacker Mohit Lad, Outrageous 06

  9. Evaluation Setup • Our hypothesis “Attackers are consciously unaware of their wrong doings”. – Our goal: Make them realize they are doing wrong and see how they change • Pick 4 professors from our department • Tell them to run scripts that attack our machines without their knowledge. Mohit Lad, Outrageous 06

  10. Evaluation • Tell them “You just attacked our machines, and we are protesting in a non-violent manner” • Give them a one page questionnaire asking “Do you feel guilty?” • 75 % cases, answer was “yes” • 25 % cases, student lost funding and had to go back to his country Mohit Lad, Outrageous 06

  11. Evaluation Setup II • Our hypothesis “Defenders prefer non- violence rather than offense”. • Pick 4 professors from our department • Attack their machines without their knowledge. Mohit Lad, Outrageous 06

  12. Evaluation II • Tell them “We just attacked your machines” • Give them a one page questionnaire asking “Would you use offense to respond?” • 25 % cases, answer was “no” • 75 % cases, student lost funding and had to go back to his country Mohit Lad, Outrageous 06

  13. Mathematical Evaluation Why it works? Mohit Lad, Outrageous 06

  14. Conclusion • Breakthrough philosophy in security • Comprehensive evaluation – 75% feel guilty after attacking – 25% want to use offense as defenders • Thus, our approach 3 times (or 300%) better than using offense • Using our approach will reduce – 75% of attackers in the Internet – 25% of students in grad schools Mohit Lad, Outrageous 06

  15. Future Work • The role of CURRY in network diagnosis • Spamming the Spammer to Shut the Spam using Offense (SSSSO) Mohit Lad, Outrageous 06

  16. Questions? Mohit Lad, Outrageous 06

Recommend


More recommend


Explore More Topics

Stay informed with curated content and fresh updates.