Modeling and simulation at the service of cyber security - PowerPoint PPT Presentation

About This Presentation
Title:

Modeling and simulation at the service of cyber security

Description:

Modeling and simulation at the service of cyber security Vahur Kotkas IoC, dept. of Computer Science ... data-mining, blacklist management and exchange, ... – PowerPoint PPT presentation

Number of Views:88
Avg rating:3.0/5.0
Slides: 10
Provided by: Vah86
Category:

less

Transcript and Presenter's Notes

Title: Modeling and simulation at the service of cyber security


1
Modeling and simulation at the service of cyber
security
  • Vahur Kotkas
  • IoC, dept. of Computer Science

2
Security issues
  • Availability
  • Privacy
  • Integrity
  • Maintainability

3
How to defend ourselves
  • Be prepared (planning and built-up)
  • carry out analysis,
  • deploy reasonable equipment
  • purchase special equipment and prepare tools for
  • intrusion detection,
  • data-mining,
  • blacklist management and exchange,
  • filtering,
  • Logging
  • configure the equipment properly
  • reserve some resources for any case,
  • Have trained staff (education)

4
What kind of activities are needed?
  • Educational simulations
  • Protocols, routing algorithms, configurations,
    ...
  • Network deployment planning
  • Topology, equipment, configuration
  • Usage optimization
  • Resource consumption analysis
  • Hardware, services
  • Attack simulations
  • Malware spread simulation
  • Service availability simulations
  • Do it all on top of a realistic model of Estonian
    Internet

5
Different levels of activities
  • High-level management
  • Mid-level technical solutions
  • Low-level real life

6
What is available?
  • Number of existing tools for network simulations
  • OPNET, OMNeT, NS, Netscale, Netwiser, J-Sim,
    PARSEC, QualNet, SSF, ...
  • Number of model (network topology) generators
  • BRITE, Inet, Topgen, ReaSE, ...

7
What we do?
  • Modeling and simulation platform CoCoViLa
    (http//www.cs.ioc.ee/cocovila)
  • High-level behaviour descriptions
  • Hierarchical visual composition
  • Expert-systems
  • Combined simulators
  • Discrete event based simulation
  • Continuous-time simulation
  • Visualisation

8
Tools for different activity levels - DEMO
  • Situation Analysis by Jüri Kivimaa et al.
  • Attack Trees by number of people including Ahto
    Buldas, Aivo Jürgenson, Jan Willemson etc.
  • HNS (Hybrid Network Simulator) by Andres Ojamaa
  • GrADAR (Graph-based Automated Denial-of-Service
    Attack Response) by Gabriel Klein et al.
  • EIM (Model of Estoian Internet) by Andres Ojamaa
    et al.

9
Modeling and simulation in the service of cyber
security
  • Vahur Kotkas
  • IoC dept. of Computer Science
Write a Comment
User Comments (0)
About PowerShow.com