Poten&al Denial- of- Service Threat Assessment for Cogni&ve Radios
|
|
- Lee Hart
- 5 years ago
- Views:
Transcription
1 oten&al Denial- of- Service Threat Assessment for Cogni&ve Radios Timothy X Brown*, Amita Sethi + *, + Interdisciplinary Telecommunica&ons *Electrical, Computer, and Energy Engineering University of Colorado, Boulder *Visi&ng rofessor Carnegie Mellon University, Rwanda resented at the ICT School on Applica&ons of Open Spectrum and White Spaces Technologies March 10,
2 Cogni&ve vs. Tradi&onal Radios User Interaction Via Operating System olicy Input Cognitive Engine Geo locator Sensor Radio A CR does more than a traditional radio 2
3 Cogni&ve Radios a Secure aradigm? Wireless Mobile Remotely Reconfigurable Opportunis&c Transmission based on Spectrum Availability Device s Spectrum Access Control via Spectrum olicies 3
4 Research Ques&on Which poten&al denial- of- service (DoS) awacks are cogni&ve radios suscep&ble to, what are the risks they represent, which security mechanisms can be employed to forestall the high- priority risk awacks, and which cogni&ve radio (CR) designs are the most suscep&ble to these cri&cal risks? 4
5 Denial- of- Service (DoS) AWacks DoS is the preven&on of authorized access to a system resource or the delaying of system opera&ons and func&ons [RFC2828]. 5
6 Tradi&onal DoS AWack Transmitter Receiver Communications Receiver Jamming 6
7 DoS AWack Categories Denial / Induce Deny Communication When Could Immediate DoS Induce Communication When Should Not Long term DoS 7
8 Example Denial AWacks Sensor Failures Scenario1: AWacker Emulates rimary User CR Attacker CR Detect Range Attacker Denies Access 8
9 Example Induce AWacks Sensor Failures Scenario 2: AWacker Masks rimary User`s Signals. U CR Attacker Attacker Induces CR to Interfere with rimary User 9
10 Example Denial/Induce AWacks olicy Failure in Beaconing System Spoofs Beacon Jams Beacon Intercepts CR Transmitter Range Misuses Operational Frequency Information to launch Denial/Induce attacks 10
11 CR Avenues of AWack Victim CR CR Detection Range Jam Received Signal Replay/Spoof/Relay acket Spoof Signal CR Jamming Range CR Receive Range CR Detect Range 11
12 AWack Analysis Methodology Hypothesize the AWack Scenario Iden&fy the Associated Threats Organize the Associated Threats in a Hammer Model framework Assign a Quan&ta&ve Risk Value to the AWack based on its Likelihood and Impact (Risk Assessment) 12
13 AWack Analysis: Threat Categoriza&on Ini&a&ng (Triggering Event) Associated (Other Causal Events) Contributory rimary (Outcome) 13
14 AWack Analysis: Hammer Model Framework Modeling tool to represent an awack scenario into a sequence of ini&a&ng and contributory threats that result in one of more primary threats. rimarily Used for Qualita&ve Scenario based AWack Analysis. Example Applica&on in System Safety Hazard Analysis in Federal Avia&on Administra&on. 14
15 Threats from Attackers Outside the CR system Threats from Within the Example Fuel Tank Rupture Scenario CR system DoS Outcomes 15
16 AWack Analysis: Risk Assessment (1/3) 1. Assess the Technical Likelihood of the AWack Rationale: Technical roblems to Attacker Likelihood Case Rank Insolvable Impossible 0 Strong Low 1 Solvable Medium 2 None High 3 16
17 AWack Analysis: Risk Assessment (2/3) Assess the Impact of the Attack Rationale: Impact on Victim Denial Attacks Induce Attacks Impact Case Rank None None None 0 erceptible but insignificant degradation in CR communication. Significant degradation but still operational CR communication. Non-operational CR communication erceptible but infrequent interference to active primary users erceptible frequent interference to active primary users Continuous interference to active primary users Low 1 Medium 2 High 3
18 AWack Analysis: Risk Assessment (3/3) 3. Risk Level = Likelihood Rank Х Impact Rank High MINOR MAJOR CRIT. CRIT. Medium Low Likelihood MINOR MINOR MAJOR CRIT. MINOR MINOR MINOR MAJOR None MINOR MINOR MINOR MINOR None Impact Low Medium High Risk Case Minor Major Critical Risk Mitigation Action No Countermeasures Required Threat cannot be Ignored Mandates High riority Handling 18
19 Research Methodology Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 19
20 Acceptable Risk Levels Every Cri&cal or Major Threats should be countered in the CR System. Any Major Threats with high likelihood but low impact, or low likelihood but high impact need to be countered but are ul&mately acceptable. Minor Threats can be ignored. 20
21 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 21
22 System Descrip&on Target System: Cogni&ve Radios Key Challenge: Mul&- Dimensional CR Configura&ons 22
23 Mul&- Dimensional CR Configura&ons Underlay Spectrum Access Method Overlay NoncooperativeCooperative Centralized Distributed Cooperative Spectrum Awareness Method Detection/ Sensing CR Network Architecture Beacon/ Control Signal Geo-locate/ Access DB 23
24 CR Network Architectures CR N/w Architectures Non- coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User CR Detect Range Victim CR Attacker Successfully Denies Access 24
25 CR Network Architectures CR N/w Architectures Distributed Coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User (Spoofs Sensor Input) Cooperative CR Network Collated Sensor Network Measurements make the attack less effective. 25
26 CR Network Architectures CR N/w Architectures Centralized Coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User Sensor Node Central Authority Active rimary Users Database CR Attack is Ineffective due to ossible Verification of Collated Network Measurement against Active rimary User s DB 26
27 Spectrum Access Methods Spectrum Access Methods Overlay Underlay Overlay Underlay CR CR Spoof Spoof CR CR does not React to rimary User Emulation CR is Denied Access Time CR Or Induced to Interfere 27
28 Spectrum Awareness Methods Spectrum Awareness Geo-locate/ Access DB Beacon/ Control Signal Detection/ Sensing rone to Location/ DB Spoof, Jam, Replay Geo-locate/ Access DB Detection/ Sensing rone to Sensing Spoof, Jam, Replay TV Database olicy Database Cellular Database Radar Database rimary Users Database Beacon/ Control Signal rone to Beacon/Control Signal Spoof, Jam, Relay RF Environment 28
29 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 29
30 DoS AWack Iden&fica&on ossible AWack Methods Considered Constant or Direct Jamming Intelligent Jamming Intercept or Eavesdropping Spoofing Replay Relay Cryptanalysis 30
31 DoS AWacks Iden&fied Against.. olicy, Sensor, Geo- loca&on and Other Networked Informa&on exchanged Between CR Elements in a Distributed CR. Among CRs in a Distributed Coopera&ve Setup. Between CRs and Central En&ty in a Centralized Coopera&ve Setup. From Central En&ty to Non- coopera&ve CRs. 31
32 DoS AWacks Iden&fied Against.. Networked CR Network En&&es such as Elements in a Distributed CR. Networked CRs in a Distributed Coopera&ve Setup. En&&es in a Centralized Coopera&ve Setup. Spectrum Informa&on Sensed by CR CR Transmission/Recep&on 32
33 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 33
34 Example AWack Analysis: rimary User Emula&on AWack in Non- Coopera&ve Architecture Attack reconditions Main Initiating Threat INITIATING THREATS Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) Attacker Spoofs/Replays Licensed User Transmissions On Every ossible Licensed Channel (S) AND asses Energybased rimary User Detection Technique AND CONTRIBUTORY THREATS SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS AND No Other On Device Spectrum Availability Data Validation Method Accessible (S) No Spectrum Availability Data Accessible From Co-operative Group Members (NC) AND SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON-DEVICE METHODS AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 34
35 Example AWack Analysis: rimary User Emula&on AWack in Coopera&ve Architectures INITIATING THREATS Attacker Spoofs/Replays Licensed User Transmissions in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Injects Spoofed Spectrum Availability Information in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Blocks Access to Networked Spectrum Availability Information In Multiple Cooperative Group Members ((DC) OR (CC)) Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) Attacker Spoofs or Replays Licensed User Transmissions On Every ossible Licensed Channel (S) AND asses Energybased rimary User Detection Technique AND CONTRIBUTORY THREATS asses Spectrum Availability Data Validation With Co-operative Group Members (CC) OR (DC) AND OR SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS No Other On Device Spectrum Availability Data Validation Method Accessible (S) OR AND SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON-DEVICE METHODS No Spectrum Availability Data Validation ossible With Co-operative Group Members (CC) OR (DC) AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 35
36 Example AWack Analysis: General Hammer Model for rimary User Emula&on AWack INITIATING THREATS Attacker Spoofs/Replays Licensed User Transmissions in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Injects Spoofed Spectrum Availability Information in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Blocks Access to Networked Spectrum Availability Information In Multiple Cooperative Group Members ((DC) OR (CC)) Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) OR (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Injects Spoofed Spectrum Availability Information through Multiple Methods employed by the victim (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Blocks Spectrum Availability Information Access through Multiple Methods employed by the victim (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Spoofs/Replays Licensed User Transmissions On Every ossible Licensed Channel (S) OR (S AND B) OR (S AND G) OR (S AND G AND B) AND asses Energybased rimary User Detection Technique AND asses Spectrum Availability Data Validation With On Device Methods (S AND B) OR (S AND G) OR (S AND G AND B) CONTRIBUTORY THREATS asses Spectrum Availability Data Validation With Cooperative Group Members (CC) OR (DC) AND OR No Other On Device Spectrum Availability Data Validation Method Accessible (S) SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON- DEVICE METHODS SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS No Spectrum Availability Data Accessible From Co-operative Group Members (NC) OR ((CC OR DC) AND (No Sharing)) OR AND No Spectrum Availability Data Accessible from any other of Multiple Methods (S AND B) OR (S AND G) OR (S AND G AND B) No Spectrum Availability Data Validation ossible With Cooperative Group Members (CC) OR (DC) AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 36
37 Example Risk Assessment Likely ossible Low Likelihood Spectrum Access Method: Overlay OR Underlay Spectrum Awareness Method: Detection/Sensing Impact Low Medium High Attack.. The Attacker Emulates rimary User Non- Cooperative Centralized Cooperative Distributed Cooperative On all Licensed Channels CRITICAL MAJOR MAJOR On Specific Licensed Channel MAJOR MINOR MINOR 37
38 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 38
39 Risk Management: hase I Risk Assessment Results (1/2) 39
40 Risk Management: hase I Risk Assessment Results (2/2) Cumulative CRITICAL Risk Value Non- Cooperative Centralized Cooperative Distributed Cooperative Total Risk Value Total CRITICAL + MAJOR Risk Value Beacon Cumulative MAJOR Risk Value Overlay Underlay Total Geo-locate Detection Beacon Geo-locate Detection Risk Database Sensing Database Sensing Value 18, 4 42, 6 12, 6 6, 8 30, 6 6, , 4 39, 6 9, 10 6, 8 27, 6 6, , 4 6, 9 6, 10 6, 8 6, 3 0,
41 Risk Management: Next Steps Devise Countermeasure for Above Acceptable Risk Level AWacks. Example: rimary User Emula&on AWack Mi&ga&on CR uses Feature based rimary User Detec&on Technique Modify CR System: Harden with Countermeasures 41
42 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Finalize System Design 42
43 hase II Risk Analysis Re- analyze High- riority AWacks for Modified CR System Re- assess Risk Level based on Likelihood and Impact 43
44 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 44
45 Risk Management: hase II Risk Assessment Results CR Configuration used in Non- Cooperative Centralized Cooperative Distributed Cooperative Total Risk Value Beacon Overlay Underlay Total Geo-locate Detection Beacon Geo-locate Detection Risk Database Sensing Database Sensing Value 6, 6 0, 9 0, 6 0, 7 0, 3 0, , 9 0, 9 0, 9 0, 3 0, 3 0, , 9 0, 9 0, 6 0, 3 0, 3 0, Least Vulnerable CR Configurations 45
46 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 46
47 CR Design Recommenda&ons Underlay Spectrum Access Method Overlay NoncooperativeCooperative Centralized Distributed Cooperative Spectrum Awareness Method Beacon/ Control Signal Detection/ Sensing CR Network Architecture Geo-locate/ Access DB 47
48 Conclusion CRs are suscep&ble to awacks. CRs open new avenues of awack. A Formal Risk Analysis and Assessment rocess can help guide the least vulnerable CR Design aradigm NOW is the best &me to devise countermeasures to reduce CR- specific vulnerabili&es. 48
49 References T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es and rotec&on Countermeasures: a Mul&- dimensional Analysis and Assessment, Journal Mobile Networks and Applica6ons, v. 13, n. 5, October 2008, pp , 17 p. A. Sethi, T. X Brown, Hammer Model Threat Assessment of Cogni&ve Radio Denial of Service AWacks, IEEE Dynamic Spectrum Access Networks (DySpAN), Chicago, Oct , T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es And rotec&on Countermeasures: A Mul&- dimensional Analysis/Assessment, roc. Second Int. Conf. on Cogni6ve Radio Oriented Wireless Networks and Communica6ons (CrownCom), Orlando, FL, Aug 1-3, pp. T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es and Countermeasures, in roc. Int. Symposium on Advanced Radio Technologies (ISART), Boulder, Feb February 25, 2008 Thesis Defense resentation 49
From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on
Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected
More informationCognitive Radio Network Security- A Survey
Cognitive Radio Network Security- A Survey Roshan Singh Thakur Prof. Parul Bhanarkar Prof. Girish Agarwal ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL College of Engineering,Nagpur College
More informationEuropean Responsible Care Forum. Security & Safe Maintenance
European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationIP CREW. Cogni,ve Radio Experimenta,on World
IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's
More informationCyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar
Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure Author: Goran N. Ericsson, Senior Member, IEEE Talal El Awar Submi.ed in Par3al Fulfillment of the Course Requirements
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationDetecting & Eliminating Rogue Access Point in IEEE WLAN
Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO
ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationAssessing Medical Device. Cyber Risks in a Healthcare. Environment
Assessing Medical Device Medical Devices Security Cyber Risks in a Healthcare Phil Englert Director Technology Operations Environment Catholic Health Ini
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationBusiness Case Components
How to Build A SOC Agenda Mission Business Case Components Regulatory requirements SOC Terminology Technology Components Events categories Staff Requirements Organiza>on s Considera>ons Training Requirements
More informationSpectrum Sharing Security and Attacks in CRNs: a Review
Sharing Security and Attacks in CRNs: a Review Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar Department of Computer Science and Technology, University of Bedfordshire Luton, LU1 3JU, United Kingdom
More informationUniversity ICT Security Certification. Francesco Ciclosi, University of Camerino
University ICT Security Certification Francesco Ciclosi, University of Camerino 1 Is secure an organization complies with the standard ISO/IEC 27001? TRUE FALSE Is the standard ISO/IEC 27001 a metric of
More informationTiger Scheme QST/CTM Standard
Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)
More informationPhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015.
PhD in Computer And Control Engineering XXVII cycle Torino February 27th, 2015. Parallel and reconfigurable systems are more and more used in a wide number of applica7ons and environments, ranging from
More informationIEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks
IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is
More informationC UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14
Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives
More informationAll Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems
All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems Speaker: Zhe Zhou, zhouzhe@fudan.edu.cn Pre-Tenure Associate Professor, School of Computer Science, Fudan University, China This
More informationNERC History, Mission and Current Issues Southern States Energy Board. October 16, 2011
NERC History, Mission and Current Issues Southern States Energy Board October 16, 2011 Electricity Vital to America 2 RELIABILITY ACCOUNTABILITY Risk Curve with Actual Events Severity ( Log Base 10) 2003
More informationDistributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course
More informationAdvanced IT Risk, Security management and Cybercrime Prevention
Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy
More informationHuman Factors in Anonymous Mobile Communications
Human Factors in Anonymous Mobile Communications Svenja Schröder Research Group, University of Vienna Talk at the PhD School at the Android Security Symposium, September 9 th, 2015 in Vienna Svenja Schröder,
More informationCourses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X
4016 Points * = Can include a summary justification for that section. FUNCTION 1 - INFORMATION SYSTEM LIFE CYCLE ACTIVITIES Life Cycle Duties No Subsection 2. System Disposition/Reutilization *E - Discuss
More informationCyber Security Capabilities
Cyber Security Capabilities Informa:on Assurance ü Vulnerability Assessment ü Penetra8on Tes8ng ü Informa8on Security Assessment ü Applica8on Security Evalua8on ü Network Traffic Assessment ü Cri8cality
More informationIntegra(on of Accident Management Strategies into Sta(on Opera(on Fred Dermarkar Vice President Engineering Strategy Ontario Power Generation
Integra(on of Accident Management Strategies into Sta(on Opera(on Fred Dermarkar Vice President Engineering Strategy Ontario Power Generation IAEA International Expert Meeting on Human and Organizational
More informationPutting the Pieces Together:
Putting the Pieces Together: Leveraging Current Audits to Solve the HITRUST Puzzle Presenter Gene Geiger, A-LIGN Partner - HITRUST Prac77oner CPA CISSP CCSK QSA PCIP ISO 27K LA performance resourceful
More informationNew PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11
New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 SISA Informa2on Security Formal Risk Assessment Specialists Authors of
More informationThreat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012
Threat modeling Tuomas Aura T- 110.4206 Informa1on security technology Aalto University, autumn 2012 Threats Threat = something bad that can happen Given an system or product Assets: what is there to protect?
More informationOWASP March 19, The OWASP Foundation Secure By Design
Secure By Design March 19, 2014 Rohini Sulatycki Senior Security Consultant Trustwave rsulatycki@trustwave.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this document
More informationCCW Workshop Technical Session on Mobile Cloud Compu<ng
CCW Workshop Technical Session on Mobile Cloud Compu
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationLink Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons
Link Layer w/ credit to Rick Graziani (Cabrillo) for some of the anima
More informationSecurity Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe
Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and
More informationDDoS PREVENTION TECHNIQUE
http://www.ijrst.com DDoS PREVENTION TECHNIQUE MADHU MALIK ABSTRACT A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its
More informationOPNET M-TCP model. Modupe Omueti
OPNET M-TCP model Modupe Omueti momueti@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University Roadmap Introduction Motivation
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationIntelligent Risk Identification and Analysis in IT Network Systems
Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationCon$nuous Audi$ng and Risk Management in Cloud Compu$ng
Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud
More informationHow can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits
How can I use ISA/IEC- 62443 (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits What is ISA 62443? A series of ISA standards that addresses
More informationFundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring
Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 1, 2011 SURVEY: Physical Layer Security Announcements HW #1 is posted on main class website Due 2/10 @ 11:59pm (PST) Office hours on 2/1 will
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationTransportation Security Risk Assessment
Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction
More informationThreat and Vulnerability Assessment Tool
TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...
More informationResilient Smart Grids
Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main
More informationAll-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011
All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 Copyright 2009 American Water Works Association Copyright 2011 American Water Works Association Security
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationCOMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS
NUCLEAR REGULATORY AUTHORITY, GHANA COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS Nelson K. Agbemava ICT and Computer Security Section Head Instrumentation & ICT
More informationA TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING
More informationA Better Space Mission Systems threat assessment by leveraging the National Cyber Range
A Better Space Mission Systems threat assessment by leveraging the National Cyber Range Chuck Allen (CISSP) & Jonathon Doubleday CORD Presented to GSAW, Feb-March 2018 2018 The Aerospace Corporation Abstract
More informationArchitectures, and Protocol Design Issues for Mobile Social Networks: A Survey
Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationAutonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras
Autonomic Mul,- s Security System for mul,- layered distributed architectures Chris,an Contreras Agenda Introduc,on Mul,- layered distributed architecture Autonomic compu,ng system Mul,- System (MAS) Autonomic
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationAn Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist
An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationService Discovery and Device Identification in Cognitive Radio Networks
B WiFi A T Bluetooth F WiFi Bluetooth C W E Cognitive Radio D Service Discovery and Device Identification in Cognitive Radio Networks 21 May 27 WINLAB Research Review Overview Cognitive Radio Introduction
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationArchitecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788
Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Outline Introduction - What is the problem? - What is the solution? - Motivating Example - How ABSP addresses these challenges?
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationNETWORK SECURITY. Ch. 3: Network Attacks
NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network
More informationCYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management
CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics
More informationRisk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Risk Management Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Define
More informationGerman OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer
German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer
More informationCIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra
CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office
More informationSri Krishna College of Engineering and Technology, Coimbatore. Sri Krishna College of Engineering and Technology, Coimbatore.
ENERGY EFFICIENT COEXISTENCE PROTOCOL FOR COGNITIVE RADIONETWORKS 1 M.S.Rihana, 2 Mr.N.Sathish 1 PG Student, Department of ECE, Sri Krishna College of Engineering and Technology, Coimbatore. 2 Assistant
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks
More informationCognitive Radios In TV White Spaces
Cognitive Radios In TV White Spaces Monisha Ghosh Philips Research North America November 2 nd, 2007 Outline White Spaces : what, why and when Cognitive Radio: applications to TV white spaces. Technical
More informationMobile Network A9ack Evolu=on
Mobile Network A9ack Evolu=on Karsten Nohl Luca Mele9e SRLabs Template v12 Security research is successful if vulnerabili=es get removed Security researchers discover
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationNGN Security standards for Fixed-Mobile Convergence
NGN Security standards for Fixed-Mobile Convergence Judith E. Y. Rossebø Telenor R&I ETSI TISPAN WG7 Chairman (judith.rossebo@telenor.com) 2nd ETSI Security Workshop: Future Security 16-17 - Sophia-Antipolis,
More informationITG. Information Security Management System Manual
ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005
More informationAn Update on Security and Emergency Preparedness Standards for Utilities
An Update on Security and Emergency Preparedness Standards for Utilities Linda P. Warren, Launch! Consulting Safety and Security in the Workplace March 28, 2013 Overview 1 Review of AWWA Standards in Water
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationTV White Space as a Rule Based Expert System. : Eric Samikwa (Malawi)
TV White Space as a Rule Based Expert System Researcher Supervisor : Eric Samikwa (Malawi) : Dr Chomora Mikeka (Malawi) Background Protection of incumbent users from interference within their service area
More informationCRITICAL INFRASTRUCTURE PROTECTION
CRITICAL INFRASTRUCTURE PROTECTION Cosmos Business Systems COSMOS BUSINESS SYSTEMS SA established in Greek & Cypriot market for more than 25 years dealing in all IT related projects in both Governmental
More information13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato
13th Florence Rail Forum: Cyber Security in Railways Systems Immacolata Lamberti Andrea Pepato November 25, 2016 Cyber Security context and Cyber Attacks trend Critical Infrastructures (CIs) are both physical
More informationCognitive Radio Networks
Cognitive Radio Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Cognitive Radio Technology Spectrum Sensing
More informationUsing Game Theory to Model Resource Sharing in Future Wireless Networks
Using Game Theory to Model Resource Sharing in Future Wireless Networks Luiz A. DaSilva Professor of Telecommunications CONNECT, Trinity College Dublin European Future of Wireless Technology Workshop Stockholm,
More informationStrengthening Cybersecurity Workforce Development December 2017
Strengthening Cybersecurity Workforce Development December 2017 Agenda 1. Introduc3ons SANS GIAC Team 2. Goal: 2017 Execu3ve Order 3. SANS GIAC NICE Workforce Framework (NCWF) Mapping Overview 4. Workforce
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #6 Physical Layer Security 1 Leveraging PHY Properties Each wireless link behaves differently A single transmission looks different to each
More informationMitigating Arc Flash Hazards
1910DB1402 / March, 2015 by Antony Parsons, Ph.D., P.E. and Reza Tajali, P.E. Schneider Electric Engineering Services Make the most of your energy SM Contents 1.0 Introduction... 3 2.0 What is Arc Flash
More information60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan
60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan University of Wisconsin - Madison http://xyzhang.ece.wisc.edu
More informationBridging the Gap Between Security and Modularity
Bridging the Gap Between Security and Modularity Sponsor: DASD(SE) By Ms. Giselle M. Bonilla-Ortiz 6 th Annual SERC Doctoral Students Forum November 7, 2018 FHI 360 CONFERENCE CENTER 1825 Connecticut Avenue
More informationSecure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek
Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure
More informationSun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1
Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1 Overview Denial of Service (DoS) and Distributed Denial of Service (DDoS) types of attack are attempts to disrupt network
More informationSECURITY RISK METRICS: THE VIEW FROM THE TRENCHES. Alain Mayer CTO, RedSeal Systems
SECURITY RISK METRICS: THE VIEW FROM THE TRENCHES Alain Mayer CTO, RedSeal Systems Alain@RedSeal.net Security Defects Defects Vulnerabilities on applications, OS, embedded systems Un-approved applications
More informationArchitectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2
Architectural Requirements Phase See Sommerville Chapters 11, 12, 13, 14, 18.2 1 Architectural Requirements Phase So7ware requirements concerned construc>on of a logical model Architectural requirements
More informationRTP Taxonomy & Rela.onships
RTP Taxonomy & Rela.onships dra%- lennox- raiarea- rtp- grouping- taxonomy- 03 IETF 88 @Authors 1 Changes Since - 02 Major re- write Sec.on 2, Concepts, re- structured to a conceptual media chain with
More informationLocation Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview
More information