simulation in cyber security - arvutiteaduse instituut

25
Simulation in Cyber Security Andres Ojamaa Institute of Cybernetics, Tallinn University of Technology CS Theory Days, 25 Jan 2008, Põlva

Upload: others

Post on 03-Feb-2022

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Simulation in Cyber Security - Arvutiteaduse instituut

Simulation in Cyber Security

Andres Ojamaa

Institute of Cybernetics, Tallinn University of Technology

CS Theory Days, 25 Jan 2008, Põlva

Page 2: Simulation in Cyber Security - Arvutiteaduse instituut

Outline

Cyber Security and SimulationWhat is this thing called Cyber Security?Simulation Needs and TasksSimulation: Advantages, Disadvantages

Computer Network Simulation SoftwareDiscrete Event SimulationNetwork Simulator (ns-2)OPNET R©OMNeT++

Rich Components in CoCoViLaRich ComponentsInteractivity in CoCoViLa

25.01.2008 A. Ojamaa Simulation in Cyber Security 2

Page 3: Simulation in Cyber Security - Arvutiteaduse instituut

What is this thing called Cyber Security?

I Information security

I Confidentiality, Availability, Integrity

I ... also Forensics, Auditing, Disaster recovery, ...

I Information assurance

I Cyber security

I Cyber defence

Laws? Military?

25.01.2008 A. Ojamaa Simulation in Cyber Security 3

Page 4: Simulation in Cyber Security - Arvutiteaduse instituut

Simulation Needs and Tasks

I Education

I Planning and design of computer networks

I Application performance analysis

I Simulation of attacks on attack trees

I Simulation of worms, viruses

I Denial of Service, hardware failures

I Network models

I Visualization

25.01.2008 A. Ojamaa Simulation in Cyber Security 4

Page 5: Simulation in Cyber Security - Arvutiteaduse instituut

Simulation: Motivation

I Learn by playing "what-if" games

I Optimize budget

I Discover design flaws earlier

I Visualize fast and invisible processes

I Save resources

25.01.2008 A. Ojamaa Simulation in Cyber Security 5

Page 6: Simulation in Cyber Security - Arvutiteaduse instituut

Simulation: Shortcomings

I Not always reliable

I Models can be expensive to build and maintain

I Not trivial to get it right: performance, accuracy, level of

abstraction

I There is no single tool to answer all questions

I The Internet is constantly changing

I Hard to get real data, adaptivity of network protocols

25.01.2008 A. Ojamaa Simulation in Cyber Security 6

Page 7: Simulation in Cyber Security - Arvutiteaduse instituut

Discrete Event Simulation

Most of the simulators are just class libraries and frameworks to

build the simulation program upon.

I Infrastructure: tracing, events, objects, connections, ...

I Event queue and queue manager

I Class libraries of standard components: clocks, protocol

implementations, traffic generators

I Tools for postprocessing and visualizing the traces

(Network ANimator)

25.01.2008 A. Ojamaa Simulation in Cyber Security 7

Page 8: Simulation in Cyber Security - Arvutiteaduse instituut

ns-2

Ns-2 is a discrete event simulator targeted at networking

research.

I Supports: TCP, routing, ...

I Implemented in C++, Tcl

I Portable, free software

I Single threaded, no distributed coputations

I Separate tools for model construction and processing the

output

25.01.2008 A. Ojamaa Simulation in Cyber Security 8

Page 9: Simulation in Cyber Security - Arvutiteaduse instituut

Using ns-2: hello, world

% set ns [new Simulator]

% $ns at 1 "puts \"hello, world\""

% $ns at 2 "exit"

% $ns run

hello, world

25.01.2008 A. Ojamaa Simulation in Cyber Security 9

Page 10: Simulation in Cyber Security - Arvutiteaduse instituut

Basic ns-2 Simulation

I Create scheduler

I Build network and connections

I Generate traffic

I Analyze traces

25.01.2008 A. Ojamaa Simulation in Cyber Security 10

Page 11: Simulation in Cyber Security - Arvutiteaduse instituut

Ns-2 Script Examples

set n0 [$ns node]

$ns duplex-link $n0 $n1 5Mb 2ms DropTail

set tcp [$ns create-connection

TCP $n0 TCPSink $n1 0]

set ftp [new Application/FTP]

$ftp attach-agent $tcp

25.01.2008 A. Ojamaa Simulation in Cyber Security 11

Page 12: Simulation in Cyber Security - Arvutiteaduse instituut

OPNET R©

I Really fancy: integrated software and hardware appliances

I Graphical user interface

I Tools for various tasks: design and planning, auditing,

monitoring

I Lots of pre-built components

I Really expensive

25.01.2008 A. Ojamaa Simulation in Cyber Security 12

Page 13: Simulation in Cyber Security - Arvutiteaduse instituut

OMNeT++ [3]

25.01.2008 A. Ojamaa Simulation in Cyber Security 13

Page 14: Simulation in Cyber Security - Arvutiteaduse instituut

Rich Components

Rich Components — Concepts of (simulation) domains

I Visual representation for visual programming

I Logical part for abstract properties

I Program component implementing computation algorithms

I Daemon part for interactive properties

25.01.2008 A. Ojamaa Simulation in Cyber Security 14

Page 15: Simulation in Cyber Security - Arvutiteaduse instituut

Rich Component: Example

25.01.2008 A. Ojamaa Simulation in Cyber Security 15

Page 16: Simulation in Cyber Security - Arvutiteaduse instituut

Workflow in CoCoViLa

1. Scheme

2. Textual specification

3. Internal representation

4. Proof = Algorithm

5. Java program

6. Output

25.01.2008 A. Ojamaa Simulation in Cyber Security 16

Page 17: Simulation in Cyber Security - Arvutiteaduse instituut

Interactivity in CoCoViLa Simulations

A programming interface between the generated Java program

and the scheme was needed...

ProgramContext.getFieldValue(objectName,

fieldName);

25.01.2008 A. Ojamaa Simulation in Cyber Security 17

Page 18: Simulation in Cyber Security - Arvutiteaduse instituut

Scheme Editor: Oscillator

25.01.2008 A. Ojamaa Simulation in Cyber Security 18

Page 19: Simulation in Cyber Security - Arvutiteaduse instituut

Oscillator: Textual Representation and Algorithm

25.01.2008 A. Ojamaa Simulation in Cyber Security 19

Page 20: Simulation in Cyber Security - Arvutiteaduse instituut

Oscillator: Simulation Result

Fields k1 and k2 of the Adder were changed.

25.01.2008 A. Ojamaa Simulation in Cyber Security 20

Page 21: Simulation in Cyber Security - Arvutiteaduse instituut

Interactive Rich Component

25.01.2008 A. Ojamaa Simulation in Cyber Security 21

Page 22: Simulation in Cyber Security - Arvutiteaduse instituut

Future Work

I Develop an expert system shell for CoCoViLa

I Implement a simple simulation engine as a rich component

I Build an AS level model of the Estonian Internet

I Collect and accumulate expert knowledge and real data

I Experiments with real data

I Implement interfaces to other simulation packages

25.01.2008 A. Ojamaa Simulation in Cyber Security 22

Page 23: Simulation in Cyber Security - Arvutiteaduse instituut

Summary

25.01.2008 A. Ojamaa Simulation in Cyber Security 23

Page 24: Simulation in Cyber Security - Arvutiteaduse instituut

Thank you for your attention!

Supporters:

I Institute of Cybernetics

I Estonian Information Technology Foundation

I Tiger University

25.01.2008 A. Ojamaa Simulation in Cyber Security 24

Page 25: Simulation in Cyber Security - Arvutiteaduse instituut

References

I CoCoViLa — Compiler Compiler for Visual Languages,

http://www.cs.ioc.ee/~cocovila/

I ns-2 — Network Simulator,

http://www.isi.edu/nsnam/ns/

I OMNeT++ — Discrete event simulator,

http://www.omnetpp.org/

I OPNET R©, http://www.opnet.com/

25.01.2008 A. Ojamaa Simulation in Cyber Security 25