1 / 9

Modeling and simulation at the service of cyber security

Modeling and simulation at the service of cyber security. Vahur Kotkas IoC, dept. of Computer Science. Security issues. Availability Privacy Integrity Maintainability. How to defend ourselves. Be prepared (planning and built-up) : carry out analysis, deploy reasonable equipment

lilith
Download Presentation

Modeling and simulation at the service of cyber security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Modeling and simulation at the service of cyber security Vahur Kotkas IoC, dept. of Computer Science

  2. Security issues • Availability • Privacy • Integrity • Maintainability

  3. How to defend ourselves • Be prepared (planning and built-up): • carry out analysis, • deploy reasonable equipment • purchase special equipment and prepare tools for • intrusion detection, • data-mining, • blacklist management and exchange, • filtering, • Logging • configure the equipment properly • reserve some resources for any case, • Have trained staff (education)

  4. What kindof activities are needed? • Educational simulations • Protocols, routing algorithms, configurations, ... • Network deployment planning • Topology, equipment, configuration • Usage optimization • Resource consumption analysis • Hardware, services • Attack simulations • Malware spread simulation • Service availability simulations • Do it all on top of a realistic model of Estonian Internet

  5. Different levels of activities • High-level management • Mid-level technical solutions • Low-level real life

  6. What is available? • Number of existing tools for network simulations: • OPNET, OMNeT++, NS, Netscale, Netwiser, J-Sim, PARSEC, QualNet, SSF, ... • Number of model (network topology) generators • BRITE, Inet, Topgen, ReaSE, ...

  7. What we do? • Modeling and simulation platform – CoCoViLa (http://www.cs.ioc.ee/cocovila) • High-level behaviour descriptions • Hierarchical visual composition • Expert-systems • Combined simulators • Discrete event based simulation • Continuous-time simulation • Visualisation

  8. Tools for different activity levels - DEMO • Situation Analysis by Jüri Kivimaa et al. • Attack Trees by number of people including Ahto Buldas, Aivo Jürgenson, Jan Willemson etc. • HNS (Hybrid Network Simulator) by Andres Ojamaa • GrADAR (Graph-based Automated Denial-of-Service Attack Response) by Gabriel Klein et al. • EIM (Model of Estoian Internet) by Andres Ojamaa et al.

  9. Modeling and simulation in the service of cyber security Vahur Kotkas IoC dept. of Computer Science

More Related