SLIDE 12
- 3. - Prevention framework
Detection and reaction graph for the sample scenario
attack syn-flood(A,H1,ns) pre : remote-access(A,H1) send-multiple-tcp-syns(A,H1,ns) post: deny-of-service(H1) attack tcp-sequence-prediction(A,H2,n) pre : remote-access(A,H2)
- btain(A,following-tcp-sequence(H2,n))
post: knows(A,following-tcp-sequence(H2,n)) attack spoofed-remote-login(A,U,H1,H2,n) pre : remote-access(A,H2) knows(A,following-tcp-sequence(H2,n)) deny-of-service(H1) spoof-address(A,H1,n,remote-login-connection(U,H2)) post: remote-login(A,U,H2)
- bjective ilegal-remote-login(A,U,H2)
state : remote-login(A,U,,H2) not(authorized(remote-login(A,U,H2))) counter-measure kill-remote-login(A,U,H2) pre : remote-login(A,U,H2) post: not(remote-login(A,U,H2)) counter-measure undo-deny-of-service(A,H1,ns) pre : deny-of-service(H1) send-multiple-tcp-resets(A,H1,ns) post: not(deny-of-service(H1) ) Correlation Anti-correlation
– p. 12/16