Slide 1/13 Countering Evolving Threats in Distributed Applications: Scientific Principles Saurabh Bagchi The Center for Education and Research in Information.

Slides:



Advertisements
Similar presentations
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Advertisements

By Hiranmayi Pai Neeraj Jain
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
(Geneva, Switzerland, September 2014)
Stephen S. Yau CSE , Fall Security Strategies.
Authors: Thomas Ristenpart, et at.
Automated Web Patrol with Strider HoneyMonkeys Present by Zhichun Li.
Lecture 11 Intrusion Detection (cont)
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Microsoft Management Seminar Series SMS 2003 Change Management.
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
Sky Advanced Threat Prevention
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Cybersecurity Test Review Introduction to Digital Technology.
IS3220 Information Technology Infrastructure Security
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
How to Make Cyber Threat Intelligence Actionable
Towards Secure and Dependable Software-Defined Networks Fernando M. V. Ramos LaSIGE/FCUL, University of Lisbon
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
EN Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Software Security Q: What does it mean to say that a program is secure? A: There is a sufficient amount of trust that the program maintains _____________,
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Botnets A collection of compromised machines
BUILD SECURE PRODUCTS AND SERVICES
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Chapter 7: Identifying Advanced Attacks
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
Botnets A collection of compromised machines
Exchange Online Advanced Threat Protection
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Teaching you NOT to fall for Phish
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
6. Application Software Security
Cybersecurity Simplified: Phishing
Presentation transcript:

Slide 1/13 Countering Evolving Threats in Distributed Applications: Scientific Principles Saurabh Bagchi The Center for Education and Research in Information Assurance and Security (CERIAS) School of Electrical and Computer Engineering Purdue University Joint work with: Gaspar Howard, Chris Gutierrez, Jeff Avery, Alan Qi (Purdue); Guy Lebanon (Amazon); Donald Steiner (Northrop Grumman) Work Supported By: Northrop Grumman, NSF

Slide 2/13 What is Special about Distributed System Security? Most of our critical infrastructure is built out of careful orchestration of multiple distributed services –Banking, Military mission planning, Power grid, … Distributed infrastructure means –Many machines, possibly under different admin domains –Many users, external and internal –Dynamic environment where software gets upgraded, new users are added, new machines are added Attack surface is large and changing –All of the above dynamic factors cause this –Attack may originate from outside or inside

Slide 3/13 Three Big Trends in Threats Against Distributed Systems 1.Attack at the point of least resistance 2.Exploit zero-day vulnerabilities in any constituent service 3.Set up a covert channel for leaking sensitive information –Find a vulnerable outward-facing service, OR –Initiate an insider attack –Thriving black market in zero-day vulnerabilities –Tweak existing attack vectors to bypass rigid defense systems –Relevant for systems with highly sensitive but low volume data –Timing channels, storage channels

Slide 4/13 Current Approaches against These Three Threat Vectors 1.Attack at the point of least resistance 2.Exploit zero-day vulnerabilities in any constituent service 3.Set up a covert channel for leaking sensitive information –Create an ever more rigid perimeter –Improve the IDS alerting mechanisms, built alert correlation –Hope white hats (vendors, open source devs) find these before the black hats –Some impactful work in detecting metamorphic malware –Only ad-hoc techniques leading to an arms race –Timing channels: perturb timing of actions indiscriminately –Storage channels: “null out” values of all unused storage elements

Slide 5/13 Desired Characteristics of Solutions Clean slate design approach –Build individual services following secure design principles –Includes randomization, use of type safe programming languages, static vulnerability checking, dynamic taint analysis Bolt security on –Embed secure layer on constituent services, not relying only on an impenetrable perimeter –Use the power of big data – lots of users, lots of machines, lots of workloads –Learn from mistakes, i.e., the attacks that succeed – allow expert security admins to provide input to automated system OR

Slide 6/13 A Glimpse into Our Solution Approaches

Slide 7/13 Distributed Inferencing from Individual Sensor Information D1 D2 D3 D4 D5 D6

Slide 8/13 Automatic Generation and Update of IDS Signatures: SQLi First for SQL injection attacks 8 1.Crawls multiple public cybersecurity portals to collect attack samples 2.Extracts a rich set of features from the attack samples 3.Applies a clustering technique to the samples, giving the distinctive features for each cluster 4.A generalized signature is created for each cluster, using logistic regression modeling

Slide 9/13 Automatic General and Update of Signatures: Phishing Next for phishing attacks Phishing specific features are created –Word features determined using word frequency counting –Based on common phishing features, e.g., # links, # image tags –Sentiment analysis for determining words conveying sense of change and urgency that attackers attempt to portray to the user Parsing phishing s (corpus from Purdue’s IT organization) input as mbox files

Slide 10/13 Phishing: Preliminary Results This cluster includes features such as: "below,need, dear, update, customer, account, bank" Each cluster forms a general story about the s contained within it from which the basis of the attack can be deduced –For example, for cluster 4, the attack is trying to get the user to update information for their banking account. It is much easier training the user based on the attack signature for clusters, than the mass of individual s

Slide 11/13 Covert Timing Channels Designed a covert network timing channel imitating long range dependent (LRD) legitimate traffic –Can be hidden in the Web traffic, the most observed traffic on Internet today –Statistically indistinguishable from real traffic –Evades the best available detection methods. Data Rate: 2 – 6 bits/second Decoding Error: 3% – 6 % Solution approach –Look for autocorrelation function values –Look for Hurst value that characterizes LRD traffic

Slide 12/13 Take Aways Distributed applications need to be protected Three emerging trends 1.Attack at the point of least resistance 2.Exploit zero-day vulnerabilities in any constituent service 3.Set up a covert channel for leaking sensitive information Lessons in solving these trends –If clean slate design is possible for some services, use a comprehensive set of secure design principles: randomization, use of type safe programming languages, static vulnerability checking, dynamic taint analysis –If security needs to be bolted on, look at internal security, not just perimeter security –Big data advances can enable learning from large volumes of existing data to extrapolate to new attack types

Slide 13/13 Presentation available at: Dependable Computing Systems Lab (DCSL) web site engineering.purdue.edu/dcsl