re re thinking ne network security in the presence of
play

Re Re-thinking Ne Network Security in the Presence of Unknown Ne - PowerPoint PPT Presentation

Re Re-thinking Ne Network Security in the Presence of Unknown Ne Network Elements Soo-Jin Moon 4 th year Ph.D. Student Carnegie Mellon University Advisor: Vyas Sekar Research Area: Network Security A Vulnerable Network! Networks: explosion


  1. Re Re-thinking Ne Network Security in the Presence of Unknown Ne Network Elements Soo-Jin Moon 4 th year Ph.D. Student Carnegie Mellon University Advisor: Vyas Sekar Research Area: Network Security

  2. A Vulnerable Network! Networks: explosion of unknown network elements à leave gaps for attacks Network functions End-user devices Applications 2

  3. A Vulnerable Network! Networks: explosion of unknown network elements à leave gaps for attacks Network functions End-user devices Applications Motivating Question How do we secure networks composed of network elements whose security implications are unknown? 3

  4. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Methodologies Automatically infer behavioral models (e.g., state machine) • Automatically discover potential attack vectors • 4

  5. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Methodologies Automatically infer behavioral models (e.g., state machine) • Automatically discover potential attack vectors • From black-box observations 5

  6. Vision: Black-box Approach to Network Security Limited access to code / binary End-user devices Network functions Applications Purposes Automatic patching • Verification and testing • Understand adversaries’ capabilities à • Proactively mitigate adversaries from inferring the system 6

  7. My Work Inferring the behavioral models of network elements Alembic: Black-box Model Inference for Stateful Network Functions. • (Under submission) Model Alembic Network function Discovering potential attack vectors AmpMap: Map of Amplification-Inducing Queries to Network Servers. • (In preparation) 7

Recommend


More recommend