1 23 March 00 APOD Review Applications that Participate in their Own Defense (APOD) Review Meeting 23 March 00 Presentation by: Franklin Webber, Ron Scott,

Slides:



Advertisements
Similar presentations
Distributed Processing, Client/Server and Clusters
Advertisements

1 12/16/98DARPA Intrusion Detection PI Meeting BBN Technologies Toolkit for Creating Adaptable Distributed Applications Joe Loyall
Chapter 19: Network Management Business Data Communications, 5e.
Applications that Participate in their Own Defense (APOD) A BBN Technologies Project Sponsored by DARPA Under the FTN Program (Dr. Douglas Maughan) Monitored.
High Performance Computing Course Notes Grid Computing.
Distributed Systems 1 Topics  What is a Distributed System?  Why Distributed Systems?  Examples of Distributed Systems  Distributed System Requirements.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
1 8/99 IMIC Workshop 6/22/2015 New Network ServicesJohn Zinky BBN Technologies The Need for A Network Resource Status Service IMIC Workshop 1999 Boston.
1 5/4/99ISORC ‘99 BBN Technologies An Object-level Gateway Supporting Integrated Property Quality of Service Rick Schantz John Zinky, David Karr, Dave.
OPX PI Meeting 2002 February page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies.
Distributed Systems Architecture Presentation II Presenters Rose Kit & Turgut Tezir.
Distributed Systems: Client/Server Computing
Lecture 11 Intrusion Detection (cont)
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 4/20/98ISORC ‘98 BBN Technologies Specifying and Measuring Quality of Service in Distributed Object Systems Joseph P. Loyall, Richard E. Schantz, John.
1 05/01/02ISORC 2002 BBN Technologies Joe Loyall Rick Schantz, Michael Atighetchi, Partha Pal Packaging Quality of Service Control Behaviors for Reuse.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
BBN Technologies Craig Rodrigues Gary Duzan QoS Enabled Middleware: Adding QoS Management Capabilities to the CORBA Component Model Real-time CCM Meeting.
1 21 July 00 Joint PI Meeting FTN Applications that Participate in their Own Defense (APOD) BBN Technologies Franklin Webber, Ron Scott, Partha Pal, Michael.
©Ian Sommerville 2000 Software Engineering, 6th edition. Slide 1 Component-based development l Building software from reusable components l Objectives.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
SANE: A Protection Architecture for Enterprise Networks
1 APOD 10/5/2015 NCA 2003Christopher Jones APOD Network Mechanisms and the APOD Red-team Experiments Chris Jones Michael Atighetchi, Partha Pal, Franklin.
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
1 06/00 Questions 10/6/2015 QoS in DOS ECOOP 2000John Zinky BBN Technologies ECOOP 2000 Workshop on Quality of Service in Distributed Object Systems
DCE (distributed computing environment) DCE (distributed computing environment)
DSN 2002 June page 1 BBN, UIUC, Boeing, and UM Intrusion Tolerance by Unpredictable Adaptation (ITUA) Franklin Webber BBN Technologies ParthaPal.
1 10/20/01DOA Application of the QuO Quality-of-Service Framework to a Distributed Video Application Distributed.
WDMS 2002 June page 1 Middleware Policies for Intrusion Tolerance QuO Franklin Webber, Partha Pal, Chris Jones, Michael Atighetchi, and Paul Rubel.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
BBN Technologies a part of page 118 January 2001 Applications that Participate in their Own Defense (APOD) BBN Technologies FTN PI Meeting January.
1 APOD 10/19/2015 DOCSEC 2002Christopher Jones Defense Enabling Using QuO: Experience in Building Survivable CORBA Applications Chris Jones Partha Pal,
1 06/ /21/2015 ECOOP 2000 Workshop QoS in DOSJohn Zinky BBN Technologies Quality Objects (QuO) Middleware Framework ECOOP 2000 Workshop QoS in DOS.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
2001 July page 1 Applications that Participate in their Own Defense (APOD) BBN Technologies FTN PI Meeting 2001 July 30 Franklin Webber QuO.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
1 10/23/98Lunchtime Meeting BBN Technologies Toolkit for Creating Adaptable Distributed Applications Joe Loyall, Rick Schantz, Rodrigo Vanegas, James Megquier,
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
OPERATING SYSTEM SUPPORT DISTRIBUTED SYSTEMS CHAPTER 6 Lawrence Heyman July 8, 2002.
2001 November13 -- page 1 Applications that Participate in their Own Defense (APOD) Project Status Review Presentation to Doug Maughan Presentation by.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Integration of QoS-enabled Distributed Object Computing Middleware for Developing Next- Generation Distributed Applications By Krishnamurthy et Al. Presented.
1 BBN Technologies Quality Objects (QuO): Adaptive Management and Control Middleware for End-to-End QoS Craig Rodrigues, Joseph P. Loyall, Richard E. Schantz.
1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
GYTE - Bilgisayar Mühendisliği Bölümü Bilgisayar Mühendisliği Bölümü GYTE - Bilgisayar Mühendisliği Bölümü AN ARCHITECTURE FOR NEXT GENERATION MIDDLEWARE.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Middleware for Fault Tolerant Applications Lihua Xu and Sheng Liu Jun, 05, 2003.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Middleware Policies for Intrusion Tolerance
Self Healing and Dynamic Construction Framework:
Inventory of Distributed Computing Concepts and Web services
Inventory of Distributed Computing Concepts
Preventing Privilege Escalation
Presentation transcript:

1 23 March 00 APOD Review Applications that Participate in their Own Defense (APOD) Review Meeting 23 March 00 Presentation by: Franklin Webber, Ron Scott, Partha Pal, and Ron Watro {fwebber, rscott, ppal, BBN Technologies Presentation to: Doug Maughan, DARPA/ITO

2 23 March 00 APOD Review Agenda Project Status (Franklin, 70 mins) –Overview, Application-Level Defensive Adaptation, Goals –QuO Middleware Support –Accomplishments, Work In Progress, Plans Software Demonstrations (Partha, 30 mins) –Redundancy Management Demo –Bandwidth Reservation Demo Discussion of Technical and Contractual Issues (20 mins) –Deliverables, Budget –Priorities (TIC Experimentation, NT, etc.)

3 23 March 00 APOD Review Long-term Vision More survivable systems, built with less effort. Future military systems need to be more survivable than the components from which they are built. These systems will be distributed, and will: –Assume that OS and network infrastructure is vulnerable to intrusion and cyber-attack; –Detect and classify a wide variety of attacks; –Adapt to these attacks in various ways, reasoning about which response mechanisms will best retain the system’s effectiveness. Such systems are defense-enabled, and need to be designed, implemented, operated, and maintained with less (or at least no more) effort than today’s non-defense-enabled systems.

4 23 March 00 APOD Review Can proceed in the face of intrusions or denial of service and participate in their own defense Provide means to specify various aspects of Quality of Service (QoS) Have means to recognize when QoS is degraded, indicating a potential failure, intrusion, or attack Provide alternate implementation and adaptation strategies: –Switch among different operating modes according to the severity of the attack; –Dynamically reconfigure to counter or avoid attacks; –Interact with QoS management subsystems and intrusion detection systems (IDSs) operating on their behalf. Adaptable, Defense-Enabled, Survivable Applications

5 23 March 00 APOD Review Application and Attacker Compete to Control Information, Resources, and QoS Application Attacker IDSCPUbandwidth

6 23 March 00 APOD Review Levels of Attacker Privilege no privilege “login shell” privilege “root shell” privilege application privilege Application privilege includes the ability to modify the application or start new application components. We assume attackers do not have application privilege. We use cryptographic techniques to try to enforce this assumption. BBNT successfully proposed work under DARPA that will remove this assumption about application privilege. “Intrusion Tolerance by Uncertain Adaptation”

7 23 March 00 APOD Review Project Goals Formulate strategies for responding to attacks that threaten survival of applications. Implement many response mechanisms in a middleware infrastructure (i.e., a software layer between the application and the resources). –Start with existing QuO (Quality of Service for Objects) framework and the QoS aspects it supports; –Extend QuO as necessary with application-centered strategies. Test whether response strategies, implemented at both the application and middleware layers and using QuO mechanisms, enhance survivability.

8 23 March 00 APOD Review Why Put Defenses In Middleware? practicality: Requiring secure, reliable OS and network support is not currently cost-effective. Middleware defenses will augment, not replace, defense mechanisms available in lower system layers. simplicity: QoS concerns separated from functionality of application. Better software engineering. uniformity: Advanced middleware such as QuO provides a systematic way to integrate defense mechanisms. Middleware can hide peculiarities of different platforms. reuseability Middleware should be application-independent.

9 23 March 00 APOD Review QuO Technology QuO is DARPA Quorum developed middleware that provides: interfaces to property managers, each of which monitors and controls an aspect of the Quality of Service (QoS) offered by an application; specifications of the application’s normal and alternate operating conditions and how QoS should depend on these conditions. QuO has integrated managers for several properties: dependability (DARPA’s Quorum AQuA project) communication bandwidth (DARPA’s Quorum DIRM project) real-time processing (using TAO from UC Irvine/WUStL) security (using OODTE access control from NAI) QuO

10 23 March 00 APOD Review Simplified DOC Model (CORBA) ClientNetworkServer Application Developer Mechanism Developer Logical Method Call Client ORB Proxy Obj Req Broker Object ORB Proxy Obj Req Broker Network

11 23 March 00 APOD Review QuO adds specification, measurement, and adaptation into the distributed object model ClientNetworkServer Application Developer QuO Developer Mechanism Developer Logical Method Call Client Delegate ORB Proxy Specialized ORB Contract SysCond Object Delegate ORB Proxy Specialized ORB Contract Network Mechanism/Property Manager SysCond

12 23 March 00 APOD Review The QuO Toolkit provides tools for building QuO applications Quality Description Languages (QDL) –Support the specification of QoS contracts (CDL), delegates and their adaptive behaviors (SDL), connection, creation, and initialization of QuO application components (CSL) –QuO includes code generators that parse QDL descriptions and generates Java and C++ code for contracts, delegates, creation, and initialization System Condition Objects, implemented as CORBA objects QuO Runtime Kernel –Contract evaluator –Factory object which instantiates contract and system condition objects CORBA IDL Code Generators Code Generators Contract Description Language (CDL) Structure Description Language (SDL) QuO Runtime Delegates Contracts Connectors Connector Setup Language (CSL)

13 23 March 00 APOD Review New APOD Requirements on QuO Survivability-related constructs in QDLs e.g., encryption strength Coordination of different QoS aspects to support survivability e.g., RT+FT+security Security-related restrictions on use of QuO e.g., different address spaces for different levels of trust

14 23 March 00 APOD Review A Classification of Defense Strategies Table is open to expansion: more strategies more columns

15 23 March 00 APOD Review APOD Implementation Path A series of software releases over the course of the project, showing increasingly strong defenses. implement critical strategies first implement easy strategies first Defenses incorporated into example applications. Supporting technology, e.g., languages, motivated by need to integrate defenses into applications easily.

16 23 March 00 APOD Review APOD Accomplishments to Date Software Release 0 delivery December 99 initial “proof of concept”; simple defensive strategies air traffic monitoring application bandwidth reservation defense strategy redundancy management defense strategy Improved Redundancy Management supporting technology developed under Quorum program defense for much wider class of applications

17 23 March 00 APOD Review Example Application Air Traffic Monitoring: tracking a single aircraft sensor data fusion from multiple radars user interfaces for display and administration A potentially mission-critical application motivated by Air Force’s ATD with multiple QoS aspects security availability performance previously used in Quorum Integration project integration of OODTE access control with QuO

18 23 March 00 APOD Review Control CenterField Deployed admin publish Map server File sharing protocol Map display attacker Tripwire detects intrusion into admin credentials Quo Contract sens1 simulator database sens2 attacker Attempt to insert fake data into the database is thwarted by OO-DTE Quo Contract Admin privileges suspended after intrusion detected tripwire QuO sets critical parameters to preset value QuO restores credentials

19 23 March 00 APOD Review Bandwidth Reservation Defense Strategy Threat: denial of service by network flooding Strategy: reserve bandwidth for application use QuO technology developed under Quorum depends on RSVP-enabled routers and ORBs Weakness: malicious attacker can also reserve bandwidth need trusted RSVP?

20 23 March 00 APOD Review Redundancy Management Defense Strategy Threat: denial of service by crashing hosts or application processes Strategy: replicate processes; move replicas off of damaged hosts redundancy management integrated with QuO delegates all delegates linked in a logical ring status information is circulated; a “software bus” self-stabilizing: converges to agreement about status self-repairing: crashed replicas are replaced protected by OO-DTE (Quorum technology from NAI) delegates use ring status for multicast Pro: easy to integrate OO-DTE access control; portable Con: only weak guarantees for communication in replica groups

21 23 March 00 APOD Review First Attempt at Integrating Replication with Access Control ClientNetworkServer Application Developer QuO Developer Mechanism Developer Logical Method Call Client Delegate ORB Proxy ORB+OODTE Object Delegate ORB Proxy ORB+OODTE Network Self-Stabilizing Software Bus Object Client Delegate Client Delegate ORB Proxy ORB+OODTE

22 23 March 00 APOD Review Using Quorum Technology for Dependability QuO technology developed for Quorum offers better redundancy management than that used in Software Release 0: group communication using Ensemble (Cornell U) membership services synchronization encapsulation in QuO Gateway alternate transport-layer protocol replica management using Proteus (U of Illinois) several alternate failure models supported This architecture separates the programming of the application’s functionality from concerns about dependability (reliability and availability).

23 23 March 00 APOD Review QuO Gateway IIOPGlue Control QuO Gateways Support Specialized Communication Protocols and Below the ORB Mechanisms Client-Side ORB IIOP Group Replication WAN Bandwidth Reservation IIOP over TCP/IP (default) IIOPGlue Control IIOP Server-Side ORB The QuO gateway enables insertion of below-the-ORB mechanisms and specialized network controls The gateway translates IIOP messages into specialized communication protocols or network level controls To the client-side, the QuO gateway looks like the remote ORB To the object-side, the QuO gateway looks like the client’s ORB The two ends of the gate- way are on the same LAN as the client/object Currently, we have gate- ways that support Ensemble group communication, RSVP resource reservation, and IIOP over TCP/IP

24 23 March 00 APOD Review Quorum Dependability vs. Software Bus Technologies: Summary Software Release 0 included redundancy management based on the self-stabilizing software bus. This implementation offers some advantages but it lacks facilities for replica coordination needed in many applications. Future releases will use the Quorum dependability management technology, as it is more advanced and its replica coordination facilities will support a wider range of applications.

25 23 March 00 APOD Review Work In Progress Integrating security with Quorum dependability management needed to protect against attacks that gain application privilege OODTE won’t work in the current architecture uses SSL, which is point-to-point, not multicast Ensemble has own multicast security mechanisms uses PGP option: combine OODTE policies, Ensemble mechanisms Blocking unauthorized TCP requests using Linux ip_chains needed to counter some denial of service attacks a readily available defense on a single platform

26 23 March 00 APOD Review Plans for Current Year Integrate redundancy management with other QuO property managers (security, bandwidth mgmt) in a single application Integrate multiple IDSs for complementary detection currently only using Tripwire considering Snort Augment IDS information about possible attacks with application-level self-checking Use adaptation other than property management: graceful degradation of application functionality change protocols dynamically Create or adopt a language for specifying defense strategies Run experiments at IA’s Technology Integration Center

27 23 March 00 APOD Review Integration Issues Integrating complementary defenses is necessary, but difficult. Different Platforms: Solaris, Linux, NT SSL support for OODTE not available on Linux RSVP only available on Linux Dependability management not yet ported to NT... Different ORBs: Visibroker, TAO offer different program language bindings nonstandard extensions Different QoS Aspects: security, RT, FT inadequate theory for composition technology immature or unavailable, e.g, FT+RT

28 23 March 00 APOD Review A Strategy Specification Language Short-Term Goal: describe defensive strategies abstractly avoid hardwiring in property managers allow non-APOD users to create own strategies easily considering using Adage/Pledge to augment QuO’s existing QDLs Long-Term Goal: map high-level strategies to lower-level ones generate some QDL automatically generate instructions for non-QuO components, e.g. configure IDSs dynamically using CIDF

29 23 March 00 APOD Review Validating Defenses by Experiment IA’s Technology Integration Center offers facilities and staff that could be used for running attacks against APOD defenses. We are trying to put an APOD experiment on the TIC’s agenda. Proposal submitted Nov 99; favorably reviewed Hypothesis: the application-level defensive adaptation in an APOD application significantly increases the work needed to damage or destroy that application TIC staff has requested more information detailed proposal plan needed stand-alone or piggybacked on other IA work? “countermeasure characterizations” likely needed Experiment may be run during 2000

30 23 March 00 APOD Review Adaptive software raises several interesting issues for IA and security Tradeoff between critical application survivability and system security –System security policy manager has ultimate authority over security issues –Critical applications that are adapting to survive must take priority over other applications What security holes will adaptable frameworks, applications, and systems introduce –Can adaptation be exploited? –Will adaptation, measurement, and control APIs be exploitable? If good guys can adapt, then so can bad guys –If our applications are adapting to make it more difficult to compromise them and to increase their chances for survival; –Can attackers adapt making it more difficult to detect them, defend against them, and recover from their attacks?

31 23 March 00 APOD Review Technical Summary A variety of software defense mechanisms, including property management and other support from QuO middleware, is being used to enhance the survivability of applications. Ideally, the effectiveness of these defenses will be tested by experiment at the TIC.

32 23 March 00 APOD Review Schedule Highlights 7/99: Contract Start 12/99: Software release 0 –Simple defense-enabled adaptive applications. 7/00: Software release 1 –Initial integration with existing (COTS or from other DARPA researchers) infrastructure components. 11/00: Initial validation experiments 7/01: Software release 2 –Expanded defense strategies; potential feedback (CIDF- based) to intrusion detection systems. 11/01: Validation experiments 11/01 - 7/02: Technology transfer software deliveries and integration as needed