![Page 1: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/1.jpg)
UsingTestRangesforCyberSecurityResearch
ByAbigailKoaySupervisedby:AaronChen&IanWelch
VictoriaUniversityofWellingtoneResearch 2016
![Page 2: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/2.jpg)
Overview
• CyberSecurity• Whatwedo?• Whatweencounter?• Whatwecanimprove
![Page 3: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/3.jpg)
LiveCyberAttacksDigitalMap
CyberAttacks,inrealtime
![Page 4: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/4.jpg)
TopCyberAttacks
NetworkIntrusion
Botnet
Denial ofService
Phishing/Spear
Phishing
Drive-byDownload
![Page 5: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/5.jpg)
TopCyberAttacks
NetworkIntrusion
Botnet
Denial ofService
Phishing/Spear
Phishing
Drive-byDownload
![Page 6: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/6.jpg)
DDoSontheRise- Worldwide
![Page 7: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/7.jpg)
DDoSAttackontheRise
![Page 8: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/8.jpg)
DDoSAttack,RealTime
LiveDDoSAttackMapLiveDDoSAttacksDigitalMap
DDoSAttacks,inrealtime
![Page 9: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/9.jpg)
Overview
• CyberSecurity• Whatwedo?• Whatweencounter?• Whatwecanimprove
![Page 10: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/10.jpg)
What’smyresearchabout?
MachineLearning
InformationEntropy
CorrelationAnalysis
DetectionSystem
DevelopingabetterDDoSdetectionsystemforlargescalenetwork
![Page 11: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/11.jpg)
HowdoIevaluatemysystem?
• Existingdatasets• MITLincolnLabDARPAIntrusionDetectionDataSets(1998-2000)• UniversityofNewBrunswickISCXIntrusionDetectionEvaluationDataSet(2012)
• Simulation/Emulations• Simulationsoftware• Testranges
![Page 12: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/12.jpg)
WhatareCyberSecurityTestRanges?
Asecurenetworkenvironmentforexperimenterstolaunchattackssafely.
![Page 13: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/13.jpg)
PublicallyAvailableTestRanges
![Page 14: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/14.jpg)
• >600researchersworldwide• ~200scientificpapers• >3800studentsreceivedtraining• >540high-capacitymulticoreservernodes(Berkeley,LosAngeles,Arlington)
Cyber-Defense Technology Experimental Research Laboratory
![Page 15: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/15.jpg)
NewProjectApplicationForm
![Page 16: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/16.jpg)
![Page 17: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/17.jpg)
BeginanExperiment
Exampleof.nsfile
![Page 18: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/18.jpg)
TopologycreatedwithDeterlab
Objective:GeneratenetworktrafficenvironmentwithDDoSattack
Topology :Smallnetworkenvironmentwith3LAN.
Tools:HTTPSlowlorisBotnetgenerator(BoNeSi)D-ITG
Packetcapture:Wireshark
ExampleofExperiment
victims
![Page 19: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/19.jpg)
Whatisgood
• Scalabletopologies• Configurablebandwidthanddelaysfor
eachnetworklinks• Configurableroutings• Dedicatedphysicalhostforeachnode• OSimageselection• Abletoinstalltools
![Page 20: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/20.jpg)
Overview
• CyberSecurity• Whatwedo?• Whatweencounter?• Whatwecanimprove
![Page 21: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/21.jpg)
Challenges
• Resourceslimitation• Location/TimeDifference• Testbedarchitectureunfamiliarity• Federatedmaintenance
![Page 22: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/22.jpg)
Overview
• CyberSecurity• Whatwedo?• Whatweencounter?• Whatwecanimprove
![Page 23: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/23.jpg)
Wouldifbebetterifwecanhaveasimilar
facilityinNZ?
![Page 24: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/24.jpg)
CurrentcybersecuritylabsinNZ
CyberSecurityResearchCentre(Unitec)
CyberSecurityResearchersofWaikato(CROW)Laboratory
ResearchFacility
![Page 25: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/25.jpg)
ResearchFacility
Testold/newcyberattacks
CaptureTraffic
SDN
Shareresources
Repeatexisting
experiments
education
fostercollaborati
on
shareexpertise
Woulditbebettertohave..
![Page 26: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/26.jpg)
Questions?
![Page 27: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/27.jpg)
Thankyou.--End--
![Page 28: Using Test Ranges for Cyber Security Research · 2019. 7. 9. · Using Test Ranges for Cyber Security Research By Abigail Koay Supervised by: Aaron Chen & Ian Welch Victoria University](https://reader035.vdocuments.us/reader035/viewer/2022071605/61418f67d64cc55ff0753f46/html5/thumbnails/28.jpg)