05.06.2013 Views

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

User<br />

Cat - Supervisor (client)<br />

Analysis<br />

Engine<br />

File I/O<br />

Tool<br />

library<br />

User Interface<br />

Script<br />

Engine<br />

Database<br />

Manager<br />

Exploit<br />

database<br />

Attack<br />

database<br />

• attacks can be recorded, edited, and played back<br />

• recorded attacks may be archived in a library of<br />

attacks<br />

• an attack scenario may be created, edited, and<br />

executed<br />

• the system provides a graphical display of active<br />

agents and agent relationships<br />

• perl scripts analyze data collected from the agents to<br />

create a characterization of the target systems.<br />

Current agent applications provide the following<br />

functionality:<br />

• communication by TCP/IP or UDP on any port<br />

• ability to spawn or execute processes on the host<br />

system<br />

• ability to execute command line interface functions<br />

on the host system<br />

• agent scheduling for temporal coordination<br />

• agent relay capability.<br />

Main<br />

Socket<br />

Comm<br />

Communication Layer<br />

(TCP & UDP)<br />

Cat - Agent (server / limited client)<br />

Main<br />

Socket<br />

Comm<br />

Figure 1. Coordinated attach tool process<br />

Event Scheduler<br />

File I/O System<br />

State<br />

Spawn<br />

Process<br />

Network<br />

Resources<br />

System<br />

Resources<br />

Applications<br />

-attack tool<br />

-attack script<br />

- worm<br />

-analysis engine<br />

The Hacker Oriented Unified Network Defense System<br />

(HOUNDS) was intended to complement the coordinated<br />

attack tool in the simulator, serving as a locus for the<br />

integration and analysis of system defenses. Analysis of<br />

the major players performing research in the area of<br />

coordinated network intrusion detection was conducted<br />

and it was found the Intrusion Detection Working Group<br />

was actively developing a protocol for the integration of<br />

the various network-and host-based intrusion detection<br />

tools that were deployed. Since this protocol would<br />

significantly enhance the HOUNDS concept, it was<br />

decided to defer implementation until the protocol was<br />

finished.<br />

In addition to the need to simulate computer security<br />

offense and defense, we needed to provide realistic<br />

network traffic to simulate a user base. Several venders<br />

of network traffic analyzers were evaluated to provide this<br />

functionality but none provided the degree of control<br />

necessary for a viable simulation. The hardware solutions<br />

were more appropriate for load testing and the software<br />

solutions tended to provide only unidirectional traffic that<br />

poorly modeled a real network. A proof-of-concept<br />

application (TrafficBot) was developed that allows the<br />

creation of avatars on remote systems that will mimic unidirectional<br />

and bi-directional TCP/IP network traffic.<br />

This traffic can consist of combinations of web browsing,<br />

e-mail, and replay of recorded network traffic. Further<br />

development of this will continue under the System<br />

Administrators Simulation Trainer program.<br />

Summary and Conclusions<br />

The CIPS project has yielded significant results in the<br />

creation of tools necessary for performing research in<br />

cyber security. This capability directly resulted in the<br />

imitation of the system administrators simulation trainer<br />

and has allowed development of infrastructure and<br />

personnel for future growth in the cyber security arena.<br />

Computer Science and Information Technology 159

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!