22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

356 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

data objects. Squid h<strong>and</strong>les all requests in a single, non-blocking, I/O-driven<br />

process over IPv4 or IPv6. Squid supports SSL, extensive access controls, <strong>and</strong> full<br />

request logging. By using the lightweight Internet Cache Protocol, Squid caches<br />

can be arranged in a hierarchy or mesh for additional b<strong>and</strong>width savings. For<br />

the project purposes it acts as an intermediary for requests from clients seeking<br />

resources from other servers. As RE in FCDS system it is used for blocking access to<br />

a dangerous/infected web services <strong>and</strong> informing the invoker that the page/resource<br />

consists of harmful content.<br />

All described RE are deployed on the edge of each protected domain. Such<br />

solution enables total separation from other domains in extraordinary situation.<br />

Moreover it enables immediate reaction. In more sophisticated scenario it is feasible<br />

to place these reaction elements in front of each computer in the network.<br />

Such solution would enable precise reaction in the case when internal terminal<br />

within the domain is infected (eg. broadcasts spam) or the user starts unauthorized<br />

actions. Common reaction in the federation is also possible in order to counteract<br />

external attacks (from outside the FoS). In this case all incoming network connections<br />

should be filtered.<br />

It is worth noticing, that not for all detected attacks will be possible preparation<br />

of full CDR (with reaction). In such situation experienced administrators will<br />

be able to prepare the CDR manually <strong>and</strong> send it to RE. CDRs may be prepared<br />

for limited time interval as well as they may be deactivated when they are obsolete.<br />

IV. Recemmendations <strong>and</strong> future work<br />

Presented FCDS enables information exchange between cooperating domains<br />

<strong>and</strong> reaction against cyber attacks. In reality such cooperation requires high level<br />

of trust between network owners. The paper describes implementation details<br />

of FCDS system which enables security measures improvement by multi-sensor<br />

attack detection <strong>and</strong> joint reaction. Cooperation among federated domains <strong>and</strong><br />

cyber information sharing is crucial to enable detection of distributed attacks.<br />

Reliable <strong>and</strong> secure communication is required for sensor data collection, CDR<br />

distribution <strong>and</strong> Reaction element remote control.<br />

Future work will cover continuous development of ontology, machine learning<br />

techniques <strong>and</strong> statistical anomaly based approach. These techniques will improve<br />

DM capabilities in the area of precise attack detection <strong>and</strong> possible response to<br />

minimize the attack effects. In order to provide cyber information sharing capability<br />

with other systems FCDS must employ commonly accepted format. Some proposals<br />

are decrscribed in [3] which should be considered in the future. Moreover, trust<br />

management aspects shall be studied.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!