Contextualizing Network Security
- Degree Grantor:
- University of California, Santa Barbara. Computer Science
- Degree Supervisor:
- Christopher Kruegel
- Place of Publication:
- [Santa Barbara, Calif.]
- Publisher:
- University of California, Santa Barbara
- Creation Date:
- 2015
- Issued Date:
- 2015
- Topics:
- Computer science
- Keywords:
- Dependency Detection,
Attack Prediction,
Network Security, and
DDoS - Genres:
- Online resources and Dissertations, Academic
- Dissertation:
- Ph.D.--University of California, Santa Barbara, 2015
- Description:
Current computer defense techniques, for technical and economic reasons, are mostly reactive. To be proactive, one needs to know the target organizational missions, resources and their inter-dependencies. Also, one needs to know the attacker to be able to predict his next probable steps, and prevent them from succeeding. Cyber situations are extremely diverse. The resources and missions and their inter-dependencies vary widely from one organization to another. Also, attackers can have largely different sets of goals, skills, and capabilities. For example, an attacker can be a script-kiddie, a hobbyist hacker, a political hacktivist, a cyber criminal, or a member of a cyber army. These adversaries can have largely different goals, capabilities, and sets of skills. An effective defense mechanism for a specific type of attacker or a specific type of organization with specific asset inter-relationship might not be effective against another type of attacker targeting a different organization. For example, the goals and capabilities of and the ways to deal with a hobbyist hacker, a hacktivist, a script-kiddie, a cyber-crime ring, and a cyber army are vastly different. (While obfuscation, use of over-the-counter security tools, and the threat of legal action might be effective against script-kiddies and hacktivists, they might not be as effective against a cyber army.) An optimal defense strategy depends on these three components: the adversary, the organizational missions, and the organizational resources.
To provide an effective defense mechanism, attacks should be analyzed in the context of the target organizational missions and resources, and the goal of the adversary. In this thesis, I present four improvements over existing approaches for adding context to security. First and second, I present automated passive and active detection of organizational resources and their inter-dependencies. Third, I present predicting next steps of an attack based on previously observed behavior of the attacker. At the end, I present detecting DDoS attacks by modeling the normal access patterns of the target system resources.
- Physical Description:
- 1 online resource (188 pages)
- Format:
- Text
- Collection(s):
- UCSB electronic theses and dissertations
- Other Versions:
- http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10011356
- ARK:
- ark:/48907/f3hx1c6c
- ISBN:
- 9781339471877
- Catalog System Number:
- 990046180290203776
- Copyright:
- Ali Zand, 2015
- Rights:
- In Copyright
- Copyright Holder:
- Ali Zand
Access: This item is restricted to on-campus access only. Please check our FAQs or contact UCSB Library staff if you need additional assistance. |