John Wu, Yongdae Kim, R. Marotz, R. Ramanujan, J. Tyra
{"title":"Logical Network Boundary Controller","authors":"John Wu, Yongdae Kim, R. Marotz, R. Ramanujan, J. Tyra","doi":"10.1109/CATCH.2009.16","DOIUrl":"https://doi.org/10.1109/CATCH.2009.16","url":null,"abstract":"Secure and timely information and intelligence sharing is essential in combatting terrorism and/or responding to emergency situations. Adequate security boundary controls are needed to ensure that sensitive information stays within the defined boundaries while being shared across the networks. The traditional technologies such as the Guard, VPN and Firewall have proven to be unworkable and cost-prohibitive. This paper presents the architecture of a network boundary control technology called the Logical Network Boundary Controller (LNBC) that overcomes limitations of traditional approaches to secure information sharing across multiple security domains. The software-based LNBC technology can be applied to cost-effectively implement multiple domain security for various existing collaboration tools to create a rapidly configurable and ad hoc collaboration environment for both synchronous and asynchronous applications. A prototype implementation of LNBC is also described in the paper.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Malware Capture","authors":"Christopher Jordan, Alice Chang, Kun Luo","doi":"10.1109/CATCH.2009.11","DOIUrl":"https://doi.org/10.1109/CATCH.2009.11","url":null,"abstract":"Botnets are a fundamental threat to network security. Their lifecycle follows a repeated pattern of growth via exploitation, infection and communication(command & control). Preventing botnet command & control requires runtime knowledge of communication attributes on a per bot basis. One approach to this is to evaluate the malware binary, but this approach is often significantly hampered by software obfuscation techniques designed to thwart binary analysis. Our research is focused on the collection and analysis of botnet growth patterns as they appear at the network level. This has the tangible result of capturing malware in a pristine state (though often packed). By intercepting the malware while it is transferred during infection prior to it reaching the target host, the captured malware cannot benefit from the complexity of obfuscation and dispersion, which occurs during installation on a target system.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126327630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Assurance Using a Defense In-Depth Strategy","authors":"Kevin Dauch, Adam Hovak, Roger Nestler","doi":"10.1109/CATCH.2009.25","DOIUrl":"https://doi.org/10.1109/CATCH.2009.25","url":null,"abstract":"Information assurance is an essential part of data dissemination and requires availability, integrity, authentication, confidentiality and non-repudiation of information systems. A defense in depth security architecture will protect data in motion, data at rest and data at the edge. This paper discusses those various states of data, their vulnerabilities and a set of solutions that have been developed to aid in the overall protection of assets. The solution provided involves leveraging several technologies including: LevelLock, PuriFile and SINBAD. The combination of these products create a framework that can both proactively and reactively ensure data assets are created, modified and transferred in a consistent manner, based on policy. An organization seeking to fully protect its information resources should seek to implement a multi-strategy defense congruous with the solution provided here.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jackson, D. Lapsley, Christine E. Jones, M. Zatko, Chaos Golubitsky, W. Strayer
{"title":"SLINGbot: A System for Live Investigation of Next Generation Botnets","authors":"A. Jackson, D. Lapsley, Christine E. Jones, M. Zatko, Chaos Golubitsky, W. Strayer","doi":"10.1109/CATCH.2009.26","DOIUrl":"https://doi.org/10.1109/CATCH.2009.26","url":null,"abstract":"There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective defense techniques before these threats materialize. To this end, we have developed a System for Live Investigation of Next Generation bots (SLINGbot). SLINGbot is an extensible, composable bot framework that enables researchers to construct benign bots for the purposes of generating and characterizing botnet Command and Control (C2) traffic. This enables researchers to simulate current and potential future botnet traffic, characterize it, and design effective defense techniques. In this paper, we describe the SLINGbot system and how it can be used for the pro-active development of botnet defenses.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Analytics for Network Flow Analysis","authors":"J. Goodall, Daniel R. Tesone","doi":"10.1109/CATCH.2009.47","DOIUrl":"https://doi.org/10.1109/CATCH.2009.47","url":null,"abstract":"Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming – a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Claffy, Young Hyun, K. Keys, Marina Fomenkov, D. Krioukov
{"title":"Internet Mapping: From Art to Science","authors":"K. Claffy, Young Hyun, K. Keys, Marina Fomenkov, D. Krioukov","doi":"10.1109/CATCH.2009.38","DOIUrl":"https://doi.org/10.1109/CATCH.2009.38","url":null,"abstract":"We are designing, implementing, deploying, and operating a secure measurement platform capable of performing various types of Internet infrastructure measurements and assessments. We integrate state-of-the-art measurement and analysis capabilities to try to build a coherent view of Internet topology. In September 2007 we began to use this novel architecture to support ongoing global Internet topology measurement and mapping, and are now gathering the largest set of IP topology data for use by academic researchers. We are using the best available techniques for IP topology mapping, and are developing some new techniques, as well as supporting software for data analysis, topology generation, and interactive visualization of resulting large annotated graphs. This paper presents our current results, next steps, and future goals.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Bailey, Evan Cooke, F. Jahanian, Yunjing Xu, M. Karir
{"title":"A Survey of Botnet Technology and Defenses","authors":"Michael Bailey, Evan Cooke, F. Jahanian, Yunjing Xu, M. Karir","doi":"10.1109/CATCH.2009.40","DOIUrl":"https://doi.org/10.1109/CATCH.2009.40","url":null,"abstract":"Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s networks intersect to inform the field of botnet technology and defense.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community","authors":"R. Stapleton-Gray","doi":"10.1109/CATCH.2009.36","DOIUrl":"https://doi.org/10.1109/CATCH.2009.36","url":null,"abstract":"INOC-DBA is a voice-over-Internet-Protocol (VoIP) hotline, first deployed by Packet Clearing House in 2002 and used by the global Internet network operations center (NOC) community. The system uses autonomous system numbers (ASNs) as “phone numbers,” i.e., when operators see traffic of concern, using the ASN of its system of origin routes the call to the party responsible for that system. PCH is currently working to enhance INOC-DBA functionality on four fronts: authentication, availability, use of system generated data for analysis, and bridging INOC-DBA to new resources and complementary systems.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124349764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing","authors":"M. Franz","doi":"10.1109/CATCH.2009.45","DOIUrl":"https://doi.org/10.1109/CATCH.2009.45","url":null,"abstract":"Many software systems in use today have enormous trusted computing bases (TCBs). We propose an architecture that makes it possible to shrink the TCB of many such systems. Our solution is based on a virtual-machine (VM) with added information-flow capabilities. In our architecture, all application programs run outside of the TCB under the control of the VM and cannot cause information leaks even if they try. We have implemented a prototype of this architecture and found that the resulting run-time overhead is much lower than expected. In many deployment contexts, it will be perfectly reasonable to make such a moderate performance sacrifice for the benefit of security.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deploying DNS Security (DNSSEC) in Large-Scale Operational Environments","authors":"Joseph Gersch, D. Massey","doi":"10.1109/CATCH.2009.43","DOIUrl":"https://doi.org/10.1109/CATCH.2009.43","url":null,"abstract":"The Domain Name System (DNS) is used by virtually every Internet application, but has virtually no security. The DNS Security Extensions (DNSSEC) add essential authentication, but deploying DNSSEC in a large-scale environment is non-trivial. This paper examines the operational and technological considerations when DNS operators manage a largescale deployment, such as an ISP with tens of thousands of zones, or a top-level domain that manages millions of domain name resource records.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"382 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120968217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}