Slide 1

Slide 1 text

Ontology-based Modeling of DDoS Attacks for Attack Plan Detection M. Ansarinia, S. A. Asghari, A. Souzani, A. Ghaznavi

Slide 2

Slide 2 text

Outline • Introduction • Review of Similar Studies • Proposed Method • Evaluation • Future Works

Slide 3

Slide 3 text

• Attack Plan Detection • Resolve vulnerabilities, • Update system configurations, • Fix weaknesses, • Prevent consequences, • Stop multi-steps attacks, • prevent potential attacks. Introduction Why Attack Plan Detection?

Slide 4

Slide 4 text

• more concrete knowledge of a domain comparing to relational databases and taxonomies. • Machine-understandable. • There is no common structure of attack scenarios. • Shared conceptualization of DDoS attacks. • Semantic-level representation. • logic and inference as a solution to decision-making problems. • Constructed from semi-informal data sources. Introduction Why Knowledge?

Slide 5

Slide 5 text

Introduction Taxonomies and Ontologies Vocabulary Structure Taxonomy Taxonomy Relations + Constraints + Rules Ontology Ontology Instances Knowledge Base + + + = = =

Slide 6

Slide 6 text

• Transform DDoS attacks information from being machine-readable to machine- understandable. • Employ knowledge to predict potential DDoS attacks regarding vulnerabilities, weaknesses, and prerequisites of such attacks. • Common semantic representation of attacks by which machines can communicate. Introduction Contributions

Slide 7

Slide 7 text

Introduction Knowledge Hierarchy Future Past Data Information What Undrestanding Why Cognition What to do Knowledge How to

Slide 8

Slide 8 text

Introduction Knowledge Hierarchy Future Past Data Information What Undrestanding Why Cognition What to do Knowledge How to ?

Slide 9

Slide 9 text

Introduction Literature Review - Representations • Ontological representations of attacks are mostly limited to the general view of network attacks. non-specific view • Taxonomies for attacks, vulnerabilities, and weaknesses (Capec, CVE, and CWE). Lack of logical assumptions, rules, and reasoning • Statistical, analytical, and machine learning detection methods. Invariant, convergence problem, lack of extendability for new concepts, and curse of dimensionality • SVM • Clustering and classification algorithms. • K-Means, DBSCAN, OPTICS, SOM, etc • Evolutionary algorithms • Neural networks

Slide 10

Slide 10 text

Introduction High-level Ontology Structure DDoS Attack Vulnerability Weakness Vulnerable System relatedTo causedBy relatedTo has (some)

Slide 11

Slide 11 text

Introduction Main Ontology Concepts

Slide 12

Slide 12 text

Method • Information parsing and conversion, from Capec, CWE, and CVE hierarchical concepts, to interrelated ontological representations (including concepts, relationships, attributes, and instances). • Semantic rule-based reasoning as detection strategy.

Slide 13

Slide 13 text

Method System Architecture System Events IDS Logs Convert data to triples of type Check consistency DDoS Attacks Knowledge Base Report inconsistency Reasoner DDoS Attack Ontology Manual User Inputs Direct Indirect Consistency SPARQL Queries Attack SWRL Rules DDoS Plan Detection Result Inconsistent Consistent Map triples to ontology entities

Slide 14

Slide 14 text

Method Detection Rules

Slide 15

Slide 15 text

Results Evaluation Method • Quantitative evaluation (OntoQA) of ontology and knowledge base. • Manual reporting interface, and test attack scenarios.

Slide 16

Slide 16 text

Results Evaluation Architecture System Events IDS Logs Convert data to triples of type Check consistency DDoS Attacks Knowledge Base Report inconsistency Reasoner DDoS Attack Ontology Manual User Inputs Direct Indirect Consistency SPARQL Queries Attack SWRL Rules DDoS Plan Detection Result Inconsistent Consistent Map triples to ontology entities

Slide 17

Slide 17 text

No content

Slide 18

Slide 18 text

No content

Slide 19

Slide 19 text

Results Evaluation Metrics Inheritance Richness 76 Object Property Richness >12 Data Property Richness >7 Hierarchical Levels 5 Concept Richness 64

Slide 20

Slide 20 text

Results Conclusion • Ontological representation of attacks. • Semantics rules for attacks. • Automatic conversion of semi-informal knowledge sources. • Utilize inference as attack plan detector.

Slide 21

Slide 21 text

Future Works • More descriptive model of DDoS attacks. • Higher level reasoning using psychological measures. • Feed IDS and system events as inputs. • Extends attacks domain. • Assets.

Slide 22

Slide 22 text

?