MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_01C94E7B.74AA46B0" This document is a Single File Web Page, also known as a Web Archive file. If you are seeing this message, your browser or editor doesn't support Web Archive files. Please download a browser that supports Web Archive, such as Windows® Internet Explorer®. ------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA.htm Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="us-ascii" NetSPA: A Software Aimed to Avert Cyber Hackers

NetSPA:  A Software Aimed to Avert Cyber Hackers

Group 8

Tiffany Duhamel, Elizabeth Sewel= l, and Katherine Watson


Key Wo= rds: Hackers, Vulnerability Scanners,= Attack Graphs, CyberAnalytix, Firewalls, and Routers.

An amazing development has come out of the Massachusetts Institute of Technology.  This development = is NetSPA. NetSPA stands for Network Security Planning Architecture. This prog= ram may not sound like a very beneficial creation, but the safety and protectio= n it aides in providing is exponential. NetSPA uses information about computers, network systems, and the programs they run to develop a graph. The developed graph shows all the possible ways unauthorized users could access the opera= ting systems.  Not only does NetSPA create the graphs, but it analyzes those graphs and recommends the best possible way to fix the most vulnerable weaknesses. NetSPA uses vulnerabili= ty scanners to locate and identify network program's weak spots, as well as ai= de in finding solutions. This development will greatly benefit all businesses = and organizations by reducing their chances of being threatened by network infiltrators and save them time by pinpointing the riskiest areas.

 

The Network Security Planning Architecture was developed= by Richard Lippmann, a senior staff member at Lincoln Laboratory’s Information Systems Technology Group, and a group of his colleagues. His te= am consists of two computer scientists, Kyle Ingols and Seth Webster, along wi= th MIT graduate student Leevar Williams. Richard Lippmann and his contemporari= es developed NetSPA in response to the unwavering threat of cyber hackers on t= he U.S. government. This new technology identifies any potential way that a network can be attacked. It uses information about networks and the individ= ual machines and programs running on them to create a graph that visually displ= ays how an attacker could infiltrate the system. The= n, the system administrator can review the graph and decide what actions need to be taken. And, if they are having trouble deciding what needs to be done, NetS= PA analyzes the graph and suggests the best and quickest way to fix the most vulnerable areas. The new software relies on vulnerability scanners to iden= tify weak spots that could pose a threat to the network. Once it has identified = the vulnerable areas, it analyzes the firewall and router rules which are typic= ally very complicated. This will determine which weak areas can actually be reac= hed and how attackers will be able to spread through the network by jumping from one vulnerable host to another. This process saves a lot of valuable time because it takes much more time to patch up hosts individually. “Inst= ead of patching, or fixing, or blocking a thousand hosts,” Lippmann expla= ins, “we could say there are ten critical hosts and patch those first.R= 21; It also can seek out vulnerabilities that otherwise would be unforeseen. Such = as, if the system administrator granted access to a vendor’s IP address m= any years ago, and hackers exploited this by forging that address. The process = is very complex and time consuming and the development of the software was even more lengthy and complicated. The original version of NetSPA could only han= dle about seventeen computers in a network before it became too slow to be usef= ul. It has since been made faster and more efficient. One way this has been accomplished is to work within firewalls to treat multiple hosts in a netwo= rk the same way instead of treating each individual machine under the same firewall rules. There are also developments in new attack graphs and more efficient algorithms to compute the new graphs.

 

The graph that NetSPA generates is set up as an attack g= raph cascade. There are four large rectangular regions that represent one subnet= in a larger network. Within each of the subnets, there are smaller rectangular regions that represent groups of hosts that are treated identically by all firewalls and that are compromised by an attacker to the same level. There = is a dot in the center of each region that signifies all hosts in that region. T= he attacker will start at the upper subnet (“EXTLAN”) on a single host. The lines connecting the hosts represent vulnerabilities that the attacker uses to progressively compromise more hosts.

 

Software such as NetSPA is invaluable for any individual= or organization that has any kind of information they want to shield from the unauthorized public. While developed for something as great as the defense = of this country, NetSPA can benefit a wide variety of individuals and organizations. Attacks on the U.S. government and defense computer networks continue to occur and threaten the safety of this country. Between 2003 and 2005 there was a series of breaches on the = U.S. government computers kno= wn as Titan Rain. One of these breaches took place on November 1, 2004. Hackers f= rom China infiltrated the Army Information Sys= tems Engineering Command in Arizona, the Defe= nse Information Systems Agency in Virginia, = the Naval Ocean Systems Center in California, and the Army Space and Strategic Defense Installation in Alabama. It is very possible that they were able to gain sensitive information about military readiness. NetSPA is not only beneficial for the protection of thi= ngs such as trade secrets and client information, but for our countries safety = as well. Keeping the government's network protected is very time sensitive and crucially important.  Software= , such as NetSPA, would help to find loopholes before anyone else can.  

 

Patents are being developed for this amazing new technol= ogy. There is a patent for a “predictive” graph and another for a “multiple prerequisite” attack graph, the latter of the two is = much more efficient and recurrent. The software is being tested on multiple different networks and is still being developed and improved to be easier to use and more efficient. A group of MIT students, with Lippmann as their technical advisor, have proposed a business plan for a company called CyberAnalytix to commercialize NetSPA. Their proposal won $10,000 in the MIT $100K Entrepreneurship Competition in May.

 

NetSPA is excellent new software that will utilize information about networks, individual machines and programs running on the= m to create a graph that shows where the network is most prone to attack. This t= ool makes it possible for system administrators to focus on the most vulnerable area, instead of wasting time securing the entire system. The graphs develo= ped from the software will aide in finding the best solutions for fixing the weakest areas of a network before they are infiltrated. The developers of NetSPA are continuously improving this new technology and expanding its boundaries. This innovative development in cyber threat prevention will hav= e a tremendous positive effect on the network safety of not only small business= es, but even the protection of our country.


References

Imperial Valley News. MIT Lincoln Laboratory Software NetSPA Designed To Stop Cyber Hackers. 29 August 2008. http://imperialvalleynews.com/index.php?option=3Dcom_content&task=3Dvie= w&id=3D2518&Ite

 

Lincoln Laboratory: Massachusetts Institute of Technolog= y. Network Security: Plugging the Right Holes. July 2008. htt;//www.ll.mit.edu/publications/labnotes/pluggingtherightholes.html<= /o:p>

 


1.   Wh= at does NetSPA stand for?

  1. Network Security Planning Architecture
  2. Network Safety Planning Architecture
  3. Net Safe Participation Area
  4. Network Security Paid Architecture

 

2.   Wh= o was the head of the research team that developed NetSPA?

a.   Se= th Webster

b.   Kyle Ingols=

c.   Richard Lippmann

d.   Leevar Williams

 

3.   Wh= at triggered the development for NetSPA?

  1. Cyber hackers threatening the U.S. government.
  2. Theft on internet shopping sites.=
  3. MIS created the software for a Entrepreneurship Competition
  4. Some researchers at Lincoln Laboratory were experimenting and developed NetSPA

 

4.   Wh= o will NetSPA benefit?

  1. Large Businesses
  2. Organizations
  3. Government
  4. All the Above

 

5.   Wh= at company was created to commercialize NetSPA?

  1. Dell
  2. Lincoln Laboratory
  3. CyberAnalytix
  4. Lippmann Virus Shield

 

------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA_files/item0001.xml Content-Transfer-Encoding: quoted-printable Content-Type: text/xml ------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA_files/props0002.xml Content-Transfer-Encoding: quoted-printable Content-Type: text/xml ------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA_files/themedata.thmx Content-Transfer-Encoding: base64 Content-Type: application/vnd.ms-officetheme UEsDBBQABgAIAAAAIQCCirwT+gAAABwCAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbKyRy2rDMBBF 94X+g9C22HK6KKXYzqJJd30s0g8Y5LEtao+ENAnJ33fsuFC6CC10IxBizpl7Va6P46AOGJPzVOlV XmiFZH3jqKv0++4pu9cqMVADgyes9AmTXtfXV+XuFDApmaZU6Z45PBiTbI8jpNwHJHlpfRyB5Ro7 E8B+QIfmtijujPXESJzxxNB1+SoLRNegeoPILzCKx7Cg8Pv5DCSAmAtYq8czYVqi0hDC4CywRDAH an7oM9+2zmLj7X4UaT6DF9jNBDO/XGD1P+ov5wZb2A+stkfp4lx/xCH9LdtSay6Tc/7Uu5AuGC6X t7Rh5r+tPwEAAP//AwBQSwMEFAAGAAgAAAAhAKXWp+fAAAAANgEAAAsAAABfcmVscy8ucmVsc4SP z2rDMAyH74W9g9F9UdLDGCV2L6WQQy+jfQDhKH9oIhvbG+vbT8cGCrsIhKTv96k9/q6L+eGU5yAW mqoGw+JDP8to4XY9v3+CyYWkpyUIW3hwhqN727VfvFDRozzNMRulSLYwlRIPiNlPvFKuQmTRyRDS SkXbNGIkf6eRcV/XH5ieGeA2TNP1FlLXN2Cuj6jJ/7PDMMyeT8F/ryzlRQRuN5RMaeRioagv41O9 kKhlqtQe0LW4+db9AQAA//8DAFBLAwQUAAYACAAAACEAa3mWFoMAAACKAAAAHAAAAHRoZW1lL3Ro ZW1lL3RoZW1lTWFuYWdlci54bWwMzE0KwyAQQOF9oXeQ2TdjuyhFYrLLrrv2AEOcGkHHoNKf29fl 44M3zt8U1ZtLDVksnAcNimXNLoi38Hwspxuo2kgcxSxs4ccV5ul4GMm0jRPfSchzUX0j1ZCFrbXd INa1K9Uh7yzdXrkkaj2LR1fo0/cp4kXrKyYKAjj9AQAA//8DAFBLAwQUAAYACAAAACEAlrWt4pYG AABQGwAAFgAAAHRoZW1lL3RoZW1lL3RoZW1lMS54bWzsWU9v2zYUvw/YdyB0b2MndhoHdYrYsZst TRvEboceaYmW2FCiQNJJfRva44ABw7phhxXYbYdhW4EW2KX7NNk6bB3Qr7BHUpLFWF6SNtiKrT4k Evnj+/8eH6mr1+7HDB0SISlP2l79cs1DJPF5QJOw7d0e9i+teUgqnASY8YS0vSmR3rWN99+7itdV RGKCYH0i13Hbi5RK15eWpA/DWF7mKUlgbsxFjBW8inApEPgI6MZsablWW12KMU08lOAYyN4aj6lP 0FCT9DZy4j0Gr4mSesBnYqBJE2eFwQYHdY2QU9llAh1i1vaAT8CPhuS+8hDDUsFE26uZn7e0cXUJ r2eLmFqwtrSub37ZumxBcLBseIpwVDCt9xutK1sFfQNgah7X6/W6vXpBzwCw74OmVpYyzUZ/rd7J aZZA9nGedrfWrDVcfIn+ypzMrU6n02xlsliiBmQfG3P4tdpqY3PZwRuQxTfn8I3OZre76uANyOJX 5/D9K63Vhos3oIjR5GAOrR3a72fUC8iYs+1K+BrA12oZfIaCaCiiS7MY80QtirUY3+OiDwANZFjR BKlpSsbYhyju4ngkKNYM8DrBpRk75Mu5Ic0LSV/QVLW9D1MMGTGj9+r596+eP0XHD54dP/jp+OHD 4wc/WkLOqm2chOVVL7/97M/HH6M/nn7z8tEX1XhZxv/6wye//Px5NRDSZybOiy+f/PbsyYuvPv39 u0cV8E2BR2X4kMZEopvkCO3zGBQzVnElJyNxvhXDCNPyis0klDjBmksF/Z6KHPTNKWaZdxw5OsS1 4B0B5aMKeH1yzxF4EImJohWcd6LYAe5yzjpcVFphR/MqmXk4ScJq5mJSxu1jfFjFu4sTx7+9SQp1 Mw9LR/FuRBwx9xhOFA5JQhTSc/yAkArt7lLq2HWX+oJLPlboLkUdTCtNMqQjJ5pmi7ZpDH6ZVukM /nZss3sHdTir0nqLHLpIyArMKoQfEuaY8TqeKBxXkRzimJUNfgOrqErIwVT4ZVxPKvB0SBhHvYBI WbXmlgB9S07fwVCxKt2+y6axixSKHlTRvIE5LyO3+EE3wnFahR3QJCpjP5AHEKIY7XFVBd/lbobo d/ADTha6+w4ljrtPrwa3aeiINAsQPTMR2pdQqp0KHNPk78oxo1CPbQxcXDmGAvji68cVkfW2FuJN 2JOqMmH7RPldhDtZdLtcBPTtr7lbeJLsEQjz+Y3nXcl9V3K9/3zJXZTPZy20s9oKZVf3DbYpNi1y vLBDHlPGBmrKyA1pmmQJ+0TQh0G9zpwOSXFiSiN4zOq6gwsFNmuQ4OojqqJBhFNosOueJhLKjHQo UcolHOzMcCVtjYcmXdljYVMfGGw9kFjt8sAOr+jh/FxQkDG7TWgOnzmjFU3grMxWrmREQe3XYVbX Qp2ZW92IZkqdw61QGXw4rxoMFtaEBgRB2wJWXoXzuWYNBxPMSKDtbvfe3C3GCxfpIhnhgGQ+0nrP +6hunJTHirkJgNip8JE+5J1itRK3lib7BtzO4qQyu8YCdrn33sRLeQTPvKTz9kQ6sqScnCxBR22v 1VxuesjHadsbw5kWHuMUvC51z4dZCBdDvhI27E9NZpPlM2+2csXcJKjDNYW1+5zCTh1IhVRbWEY2 NMxUFgIs0Zys/MtNMOtFKWAj/TWkWFmDYPjXpAA7uq4l4zHxVdnZpRFtO/ualVI+UUQMouAIjdhE 7GNwvw5V0CegEq4mTEXQL3CPpq1tptzinCVd+fbK4Ow4ZmmEs3KrUzTPZAs3eVzIYN5K4oFulbIb 5c6vikn5C1KlHMb/M1X0fgI3BSuB9oAP17gCI52vbY8LFXGoQmlE/b6AxsHUDogWuIuFaQgquEw2 /wU51P9tzlkaJq3hwKf2aYgEhf1IRYKQPShLJvpOIVbP9i5LkmWETESVxJWpFXtEDgkb6hq4qvd2 D0UQ6qaaZGXA4E7Gn/ueZdAo1E1OOd+cGlLsvTYH/unOxyYzKOXWYdPQ5PYvRKzYVe16szzfe8uK 6IlZm9XIswKYlbaCVpb2rynCObdaW7HmNF5u5sKBF+c1hsGiIUrhvgfpP7D/UeEz+2VCb6hDvg+1 FcGHBk0Mwgai+pJtPJAukHZwBI2THbTBpElZ02atk7ZavllfcKdb8D1hbC3ZWfx9TmMXzZnLzsnF izR2ZmHH1nZsoanBsydTFIbG+UHGOMZ80ip/deKje+DoLbjfnzAlTTDBNyWBofUcmDyA5LcczdKN vwAAAP//AwBQSwMEFAAGAAgAAAAhAA3RkJ+2AAAAGwEAACcAAAB0aGVtZS90aGVtZS9fcmVscy90 aGVtZU1hbmFnZXIueG1sLnJlbHOEj00KwjAUhPeCdwhvb9O6EJEm3YjQrdQDhOQ1DTY/JFHs7Q2u LAguh2G+mWm7l53JE2My3jFoqhoIOumVcZrBbbjsjkBSFk6J2TtksGCCjm837RVnkUsoTSYkUigu MZhyDidKk5zQilT5gK44o49W5CKjpkHIu9BI93V9oPGbAXzFJL1iEHvVABmWUJr/s/04GolnLx8W Xf5RQXPZhQUoosbM4CObqkwEylu6usTfAAAA//8DAFBLAQItABQABgAIAAAAIQCCirwT+gAAABwC AAATAAAAAAAAAAAAAAAAAAAAAABbQ29udGVudF9UeXBlc10ueG1sUEsBAi0AFAAGAAgAAAAhAKXW p+fAAAAANgEAAAsAAAAAAAAAAAAAAAAAKwEAAF9yZWxzLy5yZWxzUEsBAi0AFAAGAAgAAAAhAGt5 lhaDAAAAigAAABwAAAAAAAAAAAAAAAAAFAIAAHRoZW1lL3RoZW1lL3RoZW1lTWFuYWdlci54bWxQ SwECLQAUAAYACAAAACEAlrWt4pYGAABQGwAAFgAAAAAAAAAAAAAAAADRAgAAdGhlbWUvdGhlbWUv dGhlbWUxLnhtbFBLAQItABQABgAIAAAAIQAN0ZCftgAAABsBAAAnAAAAAAAAAAAAAAAAAJsJAAB0 aGVtZS90aGVtZS9fcmVscy90aGVtZU1hbmFnZXIueG1sLnJlbHNQSwUGAAAAAAUABQBdAQAAlgoA AAAA ------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA_files/colorschememapping.xml Content-Transfer-Encoding: quoted-printable Content-Type: text/xml ------=_NextPart_01C94E7B.74AA46B0 Content-Location: file:///C:/E28B5641/NetSPA_files/filelist.xml Content-Transfer-Encoding: quoted-printable Content-Type: text/xml; charset="utf-8" ------=_NextPart_01C94E7B.74AA46B0--