Top Banner
Cascading Attack Damage
22

Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascading Attack Damage

Page 2: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

What is the real cost of a cyber-attack?

The cost of the service attacked may not reflect the real amount of damage.

Many other services may rely on the attacked service, causing a cascade.

How can we determine the real cost associated with the cascade?

Page 3: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

JAC Defines Values, Dependencies, and

Damage.

Page 4: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Values A Value defines an object in JAC. The Value is used to calculate the value of

damage to an object.

Page 5: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Dependencies A dependency is defined between two

objects with defined Values. The dependency of A

on B is defined as the percentage of A that requires B.

Page 6: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Damage You attack an object by assigning it

Damage. Damage is defined as the percentage

of the object that is damaged.

Page 7: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

System Architecture

Remote Java Beans (planned)

GUI “Thick” Clients

WebServlet

Jess RuleEngine

EconomicDamage

Coefficient Model

Local Java Beans (planned)

RMI

Rete EngineQueries

Parsing / RuleGenerator

Web “Thin” Clients (planned)

Page 8: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Jess Rule Engine All objects are turned into Jess facts. Rules model the cascade effect.

Page 9: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

JAC

Page 10: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Adding Values You can Add an Object to the Domain by

adding a Value:

Page 11: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Adding Dependencies You can add a dependency between any

two objects with defined Values.

Page 12: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Adding Dependancies You can provide a weight to the

dependency. This weight is the percentage of the affect on the affected object.

Page 13: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Dependency Modeling JAC can provide a graphical

model of your dependency structure.

Page 14: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Adding Damage You can attack any object with an assigned

value by assigning it damage.

Page 15: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Adding Damage You assign damage as a percent of the

attack object.

Page 16: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Removing Values, Affects, & Damage

You can remove any value, dependency, or damage by selecting it and clicking the appropriate remove button.

Page 17: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascading Damage Once you have defined Values,

Dependencies, and Added damage for at least one object in the domain, you can cascade the attack.

Page 18: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascading Damage

Page 19: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascading Damage Damage is tracked, as well which

dependencies cause the cascade.

Page 20: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascade Modeling JAC can provide a graphical representation

of the damage cascade of an attack.

Page 21: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Cascading Damage The value of damage to each object is

determined, as is total attack damage.

Page 22: Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked may not reflect the real amount of damage. Many other.

Future Work Detailed economic model for dependency

coefficients. Compensation between dependencies. Temporal modeling. Java Bean representation of rules, allowing

for flexibility in software architecture. Jess / Rete engine optimizations