Slide 1 ITUA: Approach to Project Validation and Characterization Not for public distribution. Intrusion Tolerance by Unpredictable Adaptation (ITUA) Approach.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001Slide 1 Aegis Research Corporation Not for Public Release Survivability Validation Framework for Intrusion.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Stephen S. Yau CSE , Fall Security Strategies.
March 24, 2003Upadhyaya – IWIA A Tamper-resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors R. Chinchani.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Introduction to Network Defense
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CSI315 Web Applications and Technology Overview of Systems Development (342)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
ITEC224 Database Programming
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Intrusion Tolerance by Unpredictability and Adaptation Presented by: Partha Pal Ron Watro Franklin Webber Chris Jones William H. Sanders Michel Cukier.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
DSN 2002 June page 1 BBN, UIUC, Boeing, and UM Intrusion Tolerance by Unpredictable Adaptation (ITUA) Franklin Webber BBN Technologies ParthaPal.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
WDMS 2002 June page 1 Middleware Policies for Intrusion Tolerance QuO Franklin Webber, Partha Pal, Chris Jones, Michael Atighetchi, and Paul Rubel.
A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Ad Hoc Network.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
Role Of Network IDS in Network Perimeter Defense.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Mutation Testing Breaking the application to test it.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Intrusion Tolerant Architectures
Chapter 1: Introduction
Middleware Policies for Intrusion Tolerance
Intrusion Tolerance by Unpredictable Adaptation
Security Engineering.
Security.
PLANNING A SECURE BASELINE INSTALLATION
Operating System Concepts
Presentation transcript:

Slide 1 ITUA: Approach to Project Validation and Characterization Not for public distribution. Intrusion Tolerance by Unpredictable Adaptation (ITUA) Approach to Project Characterization and Validation Partha Pal Ron Watro Franklin Webber William H. Sanders Michel Cukier James Lyons Prashant Pandey HariGovind Ramasamy Jeanna Gossett OASIS PI Meeting, July 26, 2001

Slide 2 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Goals 1)To develop intrusion-tolerant communication/agreement protocols that tolerate a range of intrusions and permit the number and type of intrusions tolerated to be dynamically updated as the protocols operate 2)To define and develop mechanisms that respond to attacks effectively in an unpredictable manner 3)To develop a intrusion-tolerant architecture, based on replication and adaptation and coordinated through middleware in which the techniques developed in 1) and 2) can be effectively deployed

Slide 3 ITUA: Approach to Project Validation and Characterization Not for public distribution. OASIS Framework Design Implementation Operation TAVs Goals Availability Integrity Confidentiality Nonrepudiation Authentication

Slide 4 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Primary Focus Design Implementation Operation TAVs Goals Availability Integrity Confidentiality Nonrepudiation Authentication

Slide 5 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Secondary Focuses Design Implementation Operation TAVs Goals Availability Integrity Confidentiality Nonrepudiation Authentication

Slide 6 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Secondary Focuses Design Implementation Operation TAVs Goals Availability Integrity Confidentiality Nonrepudiation Authentication

Slide 7 ITUA: Approach to Project Validation and Characterization Not for public distribution. Overlapping Activities Validation Characterization Say what it does! Use a common context Compare to others Find synergies Locate IA&S gaps Provide assurance that it works! Focus on individual project Need specification/implementation Various approaches Analytic Experimental

Slide 8 ITUA: Approach to Project Validation and Characterization Not for public distribution. Assumptions vs.Working Hypotheses Assumptions –Technical statements that express widely accepted positions or technical boundaries Working Hypotheses –Simplifying assumptions made for the project that are potentially less precise, less widely accepted, and more subject to future change –May serve as the basis for defining a starting point in the exploration of a complex problem space –During work on a project, one may reinforce (i.e., find justification, validate, or develop support for) a hypothesis, or find a hypothesis untenable, in which case it must be revised or removed

Slide 9 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Project Assumptions A-1: Effectiveness of cryptography: Keys are adequately sized and mathematical assumptions are made to ensure that common symmetric and asymmetric encryption techniques cannot be efficiently broken. A-2: Protection from Network Denial-of-Service (DoS): ITUA will be designed to tolerate selective failures of communications links, but not to tolerate a systematic flooding of a wide portion of the communications network. Protection against that type of denial-of-service attack is an active research area that is outside the scope of ITUA. Our technology will require adequate network service levels between a changeable set of sites, and is expected to be compatible with any effective DoS protection scheme (e.g., ingress filtering, traceback, etc.). In addition, there are experimental mechanisms available to help ensure selective, continuous communication; for our purposes, we assume them to be effective.

Slide 10 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Project Working Hypotheses WH-1 Adequate situational awareness tools (e.g., tools that detect attempted intrusions) exist to provide the information needed as the basis for determining defensive postures and reactions. WH-2 An adequate variety of effective defensive postures and attack responses exists to support the creation of unpredictable responses to attacks. WH-3 Attacks that corrupt an application will proceed through a series of stages (e.g., gaining user access, root access, and application access) and thus will require more time and more intelligent direction than single-stage attacks. Attacks of this type require considerable planning, and their goal is something more than simple momentary disruption. ITUA specifically targets this kind of sophisticated attack. WH-4 The ITUA infrastructure can create and deploy replicas at performance levels that compare favorably with the time required to complete application- level attacks against these replicas. WH-5 Adequate diversity exists in operating systems, applications, firewalls, and other aspects of the computing environment to make it possible to create replicas that provide identical services but present different security vulnerabilities.

Slide 11 ITUA: Approach to Project Validation and Characterization Not for public distribution. TAV Specification Recall that TAVs can occur during design, implementation, and operation Some OASIS technologies avoid the effect of an attack due to design or implementation modifications Other OASIS technologies tolerate the effect of a attack during operation ITUA tolerates effects during operation Therefore: –TAVs that originate during design or implementation may be tolerated during operation, so it makes sense to specify TAVs during all lifecycle phases, even if a project tolerates effects during operation –Understanding effects and their relationship to TAVs is important when developing validation technologies (Distinction between TAV and effect is analogous to the distinction between fault and error)

Slide 12 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Design TAVs TAV-1-1 Incomplete or incorrect high-level security requirements For example, the analysis of the problem was incomplete and did not identify all the security requirements. TAV-1-2 Incorrect refinement of the security requirements For example, a high-level security requirement is mapped to specific component security requirements that are inadequate to ensure the high-level requirement. TAV-1-3 Incorrect design The design of a component fails to meet the component security requirements. TAV-1-4 Design environment attack The information system that contains the design information is attacked and the design information is maliciously manipulated.

Slide 13 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Implementation TAVs TAV-2-1 Implementation flaws or bugs The software as written does not match the design. TAV-2-2 “Easter eggs” and back doors Developers hide code in the application to perform hidden functionality or to allow developers full access to the subsequently deployed system. TAV-2-3 Buffer overflows Implementation writes data without checking whether the data is too large for the buffer, potentially leading to the execution of data in an unintended fashion. TAV-2-4 Implementation environment attack The information system that contains the design information is attacked and the software is maliciously manipulated.

Slide 14 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Operational TAVs TAV-3-1 Hardware failure A network host or infrastructure node or a communication link fails, either halting operation entirely or performing erroneous or malicious functions. TAV-3-2 User-level attack A system or range of systems is corrupted by attacks run by an untrusted user. Subsequent stages may allow the user to reach application- level privileges. TAV-3-3 System-level attack A system or range of systems is corrupted by a trusted user operating with system administrator privileges. TAV-3-4 Application-level attack A system or range of systems is corrupted by a trusted user operating with application-level privileges. TAV-3-5 Virus or worm attack An autonomic attack infects hosts silently and subsequently is simultaneously activated against a large number of infected hosts. TAV-3-6 Reactive attack The attack launches probes against the system, evaluates any defensive response, and then prepares and launches custom attacks based on the probe results. TAV-3-7 Credential attack Secret authentication credentials are compromised through inadvertent disclosure, brute-force dictionary attack, crypto-analysis, or some other method. TAV-3-8 ITUA infrastructure attack The ITUA management component of a system is subverted.

Slide 15 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Mechanisms Mapped to Goals 1)To develop intrusion-tolerant communication/agreement protocols that tolerate a range of intrusions and permit the number and type of intrusions tolerated to be dynamically updated as the protocols operate (M-3, M-4, M-7) 2)To define and develop mechanisms that respond to attacks effectively and in a manner not easily predictable by the attackers (M-1, M-5, M-6, M-7, M-8) 3)To develop a security architecture, based on replication and adaptation, and coordinated through middleware in which the techniques developed in (1) and (2) can be effectively deployed (M-2)

Slide 16 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Survivability and Security Mechanisms M-1 Autonomic reaction to intrusion detection In the ITUA prototype, ID tools such as Snort and QoS probes will be used as “sensors,” in conjunction with another set of tools called “actuators,” to produce a range of immediate autonomic responses. Multiple sensor-actuator loops will be deployed on each host in each security domain. M-2 Hierarchical (sensor-actuator-specific, host-specific, domain-wide, system-wide) response to suspicious events (intrusion or anomaly) based on local, decentralized decision-making This is the next level of response after M-1. Each host in a security domain has an ITUA subordinate to which the sensor-actuator loops on that host report. Each domain has a subordinate designated a manager, to which the subordinates in that domain report. M-3 Application-level replication provided through middleware Replicas are typically maintained in separate security domains to prevent a single attack from damaging all the copies. The ITUA managers and subordinates are responsible for this kind of replication management. M-4 Voting and agreement protocols between replicas Provides correct and consistent results plus identification of malicious errors. These protocols will be located in the ITUA gateway, which will contain the ITUA intrusion-tolerant group communication system.

Slide 17 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Survivability and Security Mechanisms, cont. M-5 Random selection among functionally equivalent options (application-level and system-level) This is the first aspect of unpredictability. It includes, for example, randomization of network addresses to prevent easy location of protected resources. The QuO middleware is responsible for this mechanism. M-6 Selection from non-equivalent options based on situational awareness and the goal of maintaining unpredictability This is the second aspect of unpredictability and part of the overall approach to dynamic adaptation. The QuO middleware driven by the managers and subordinates is responsible for this mechanism. M-7 Dynamic adjustment of security based on situational awareness and the cost of protection technology Adaptation is based on deployment of expensive protection only when required. The ITUA intrusion-tolerant gateway and the ITUA managers and subordinates are responsible for this mechanism. M-8 Protection of application functionality using layers of privilege in the application environment Deployment of OO-DTE (Object-Oriented Domain and Type Enforcement) is a key aspect of this mechanism.

Slide 18 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Validation Approach Different validation approaches should be used at different phases of the lifecycle of the project Validation effort is ongoing, since project mechanisms are currently under development Design Phase –Use logical argument and stochastic models –Simple stochastic model presented in ITUA Intrusion Model document, available at Implementation and Operational Phase –Compile list of effects to be tolerated. –Inject implementation with effects (example given in demo of IT GCS Tuesday night; many of the effects to be presented were injected) –Modify mechanism (to make it tolerate the effect) or assess goodness of mechanism via statistical analysis of experimental results

Slide 19 ITUA: Approach to Project Validation and Characterization Not for public distribution. Example ITUA Group Communication TAV effects

Slide 20 ITUA: Approach to Project Validation and Characterization Not for public distribution. ITUA Rationale Matrix

Slide 21 ITUA: Approach to Project Validation and Characterization Not for public distribution. Lessons Learned “Outline of a characterization” handout provides a good structure for performing a characterization/validation of OASIS technologies Outline does not specify what validation technique to use; individual projects must decide which existing validation techniques are useful, or whether a new one needs to be invented It is useful to separate assumptions the project relied on into “Assumptions” and “Working Hypotheses,” to express ones confidence in the reasonableness of the assumptions, and suggest assumptions that may be refined during the project period TAVs are most useful for explaining validation results to end users of particular systems, but effects are most useful when validating a system in the implementation and operational phases Work is needed to map TAVs to effects in order to characterize, at a high level, the intrusion-tolerance of an approach