OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

1 12/16/98DARPA Intrusion Detection PI Meeting BBN Technologies Toolkit for Creating Adaptable Distributed Applications Joe Loyall
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Applications that Participate in their Own Defense (APOD) A BBN Technologies Project Sponsored by DARPA Under the FTN Program (Dr. Douglas Maughan) Monitored.
Common Object Request Broker Architecture (CORBA) By: Sunil Gopinath David Watkins.
1 23 March 00 APOD Review Applications that Participate in their Own Defense (APOD) Review Meeting 23 March 00 Presentation by: Franklin Webber, Ron Scott,
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
1 12/10/03CCM Workshop QoS Engineering and Qoskets George Heineman Praveen Sharma Joe Loyall Richard Schantz BBN Technologies Distributed Systems Department.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 8/99 IMIC Workshop 6/22/2015 New Network ServicesJohn Zinky BBN Technologies The Need for A Network Resource Status Service IMIC Workshop 1999 Boston.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Distributed Systems Architecture Presentation II Presenters Rose Kit & Turgut Tezir.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 4/20/98ISORC ‘98 BBN Technologies Specifying and Measuring Quality of Service in Distributed Object Systems Joseph P. Loyall, Richard E. Schantz, John.
1 05/01/02ISORC 2002 BBN Technologies Joe Loyall Rick Schantz, Michael Atighetchi, Partha Pal Packaging Quality of Service Control Behaviors for Reuse.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
BBN Technologies Craig Rodrigues Gary Duzan QoS Enabled Middleware: Adding QoS Management Capabilities to the CORBA Component Model Real-time CCM Meeting.
1 21 July 00 Joint PI Meeting FTN Applications that Participate in their Own Defense (APOD) BBN Technologies Franklin Webber, Ron Scott, Partha Pal, Michael.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
1 Using Quality Objects (QuO) Middleware for QoS Control of Video Streams BBN Technologies Cambridge, MA Craig.
1 APOD 10/5/2015 NCA 2003Christopher Jones APOD Network Mechanisms and the APOD Red-team Experiments Chris Jones Michael Atighetchi, Partha Pal, Franklin.
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
1 06/00 Questions 10/6/2015 QoS in DOS ECOOP 2000John Zinky BBN Technologies ECOOP 2000 Workshop on Quality of Service in Distributed Object Systems
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
DSN 2002 June page 1 BBN, UIUC, Boeing, and UM Intrusion Tolerance by Unpredictable Adaptation (ITUA) Franklin Webber BBN Technologies ParthaPal.
1 10/20/01DOA Application of the QuO Quality-of-Service Framework to a Distributed Video Application Distributed.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
WDMS 2002 June page 1 Middleware Policies for Intrusion Tolerance QuO Franklin Webber, Partha Pal, Chris Jones, Michael Atighetchi, and Paul Rubel.
BBN Technologies a part of page 118 January 2001 Applications that Participate in their Own Defense (APOD) BBN Technologies FTN PI Meeting January.
1 APOD 10/19/2015 DOCSEC 2002Christopher Jones Defense Enabling Using QuO: Experience in Building Survivable CORBA Applications Chris Jones Partha Pal,
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 06/ /21/2015 ECOOP 2000 Workshop QoS in DOSJohn Zinky BBN Technologies Quality Objects (QuO) Middleware Framework ECOOP 2000 Workshop QoS in DOS.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
2001 July page 1 Applications that Participate in their Own Defense (APOD) BBN Technologies FTN PI Meeting 2001 July 30 Franklin Webber QuO.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
1 10/23/98Lunchtime Meeting BBN Technologies Toolkit for Creating Adaptable Distributed Applications Joe Loyall, Rick Schantz, Rodrigo Vanegas, James Megquier,
1 Applying Adaptive Middleware, Modeling, and Real-Time CORBA Capabilities to Ensure End-to- End QoS Capabilities of Video Streams BBN Technologies Cambridge,
An Adaptive Intrusion-Tolerant Architecture Alfonso Valdes, Tomas Uribe, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Josh Levy, Hassen.
2001 November13 -- page 1 Applications that Participate in their Own Defense (APOD) Project Status Review Presentation to Doug Maughan Presentation by.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
CS 501: Software Engineering Fall 1999 Lecture 12 System Architecture III Distributed Objects.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
1 BBN Technologies Quality Objects (QuO): Adaptive Management and Control Middleware for End-to-End QoS Craig Rodrigues, Joseph P. Loyall, Richard E. Schantz.
Complementary Methods for QoS Adaptation in Component-based Multi-Agent Systems MASS 2004 August 30, 2004 John Zinky, Richard Shapiro, Sarah Siracuse BBN.
1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting.
Networking Aspects in the DPASA Survivability Architecture: An Experience Report Michael Atighetchi BBN Technologies.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
Application Communities Phase 2 (AC2) Project Overview Nov. 20, 2008 Greg Sullivan BAE Systems Advanced Information Technologies (AIT)
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Middleware Policies for Intrusion Tolerance
Securing the Network Perimeter with ISA 2004
Middleware in Context Prof. Dave Bakken Cpt. S 464/564 Lecture
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
Presentation transcript:

OPX PI Meeting 2002 February page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February page 2 Project Sponsor: DARPA/ATO Program: Fault-Tolerant Networks Program manager: Doug Maughan Project monitor: Pat Hurley (AFRL) Period of performance: July July 2002

OPX PI Meeting 2002 February page 3 Technical Objective Give any critical distributed software application an increased resistance to malicious attack: even though the environment in which it runs is untrustworthy; without major modifications to its code. Any such application is “defense-enabled”.

OPX PI Meeting 2002 February page 4 Existing Practice/Technical Approach Infrastructure (operating systems, networks) on which many military applications are run is less than trustworthy –applications are vulnerable to attacks that exploit security flaws in infrastructure An application that can adapt to work around the effect of attacks will offer more dependable service –a defense-enabled application is aware of its quality-of-service (QoS) requirements and monitors its environment for QoS changes Metric: length of correct computation while under attack –measured in Red Team experiments and other validation

OPX PI Meeting 2002 February page 5 A Distributed Military Application

OPX PI Meeting 2002 February page 6 A Cyber-Attack

OPX PI Meeting 2002 February page 7 An Abstract View Attacker Data Processing (Fusion, Analysis, Storage, Forwarding, etc.) Data User Data Source

OPX PI Meeting 2002 February page 8 Traditional Security Attacker Application Private Resources Private Resources Limited Sharing Trusted OSs and Network

OPX PI Meeting 2002 February page 9 Most OSs and Networks In Common Use Are Untrustworthy Attacker Application Private Resources Private Resources Limited Sharing OSs and Network

OPX PI Meeting 2002 February page 10 Cryptographic Techniques Can Block (Most) Direct Access to Application Attacker Application Private Resources Private Resources Limited Sharing OSs and Network CryptoCrypto

OPX PI Meeting 2002 February page 11 Attacker Raw Resources CPU, bandwidth, files... OSs and NetworkIDSsFirewalls Firewalls Block Some Attacks; Intrusion Detectors Notice Others Application CryptoCrypto

OPX PI Meeting 2002 February page 12 Application Attacker Raw Resources CPU, bandwidth, files... QoS Management CryptoCrypto OSs and NetworkIDSsFirewalls Defense-Enabled Application Competes With Attacker for Control of Resources

OPX PI Meeting 2002 February page 13 QuO Adaptive Middleware Technology QuO is DARPA Quorum developed middleware that provides: interfaces to property managers, each of which monitors and controls an aspect of the Quality of Service (QoS) offered by an application; specifications of the application’s normal and alternate operating conditions and how QoS should depend on these conditions. QuO has integrated managers for several properties: dependability (DARPA’s Quorum AQuA project) communication bandwidth (DARPA’s Quorum DIRM project) real-time processing (using TAO from UC Irvine/WUStL) security (using OODTE access control from NAI) QuO

OPX PI Meeting 2002 February page 14 QuO adds specification, measurement, and adaptation into the distributed object model Application Developer Mechanism Developer CLIENT Network operation() in args out args + return value IDL STUBS IDL SKELETON OBJECT ADAPTER ORB IIOP ORB IIOP CLIENT OBJECT (SERVANT) OBJECT (SERVANT) OBJ REF CLIENT Delegate Contract SysCond Contract Network MECHANISM/PROPERTY MANAGER operation() in args out args + return value IDL STUBS Delegate SysCond IDL SKELETON OBJECT ADAPTER ORB IIOP ORB IIOP CLIENT OBJECT (SERVANT) OBJECT (SERVANT) OBJ REF Application Developer QuO Developer Mechanism Developer CORBA DOC MODEL QUO/CORBA DOC MODEL

OPX PI Meeting 2002 February page 15 The QuO Toolkit Supports Building Adaptive Apps or Adding Adaptation to Existing Apps QuO Code Generator QoS Adaptivity Specification QoS Management CORBA IDL

OPX PI Meeting 2002 February page 16 Implementing Defenses in Middleware for simplicity: QoS concerns separated from functionality of application. Better software engineering. for practicality: Requiring secure, reliable OS and network support is not currently cost-effective. Middleware defenses will augment, not replace, defense mechanisms available in lower system layers. for uniformity: Advanced middleware such as QuO provides a systematic way to integrate defense mechanisms. Middleware can hide peculiarities of different platforms. for reuseability Middleware can support a wide variety of applications.

OPX PI Meeting 2002 February page 17 Security Domains Limit the Damage From A Single Intrusion hacked domain host router domain host router domain host

OPX PI Meeting 2002 February page 18 Replication Management Can Replace Killed Processes hacked domain host router domain host router domain host application component replicas QuO replica management

OPX PI Meeting 2002 February page 19 Bandwidth Management Can Counter Flooding Between Routers hacked domain host router domain host router domain host QuO bandwidth management RSVP reservation or packet-filtered link

OPX PI Meeting 2002 February page 20 Other Defense Mechanisms Dynamically change communication ports Dynamically change communication protocols

OPX PI Meeting 2002 February page 21 Defense Strategy Use QuO middleware to coordinate all available defense mechanisms in a coherent strategy. Best current strategy has two parts: –“outrun”: move application component replicas off bad hosts and on to good ones –“contain”: quarantine bad hosts by limiting or blocking network traffic from them and, within limits, shutting them down

OPX PI Meeting 2002 February page 22 Validation Experimentation: a defense-enabled application is attacked by professional hackers, i.e., a “Red Team”, and its performance is measured Modeling: properties of a defense-enabled application are measured in the lab and plugged into an abstract model of attack and defense

OPX PI Meeting 2002 February page 23 Experimentation Blue Team: the technology developers –Franklin Webber, et al., BBN/Distributed Systems Red Team: the attackers –Steve Kaufman, et al., Sandia White Team: the moderators –Ken Theriault, et al., BBN/Security –testbed preparation; experiment planning and analysis

OPX PI Meeting 2002 February page 24 Experimentation Milestones October: begin weekly planning meetings November: experiment plan outlined December: ‘whiteboard’ experiment analysis –all teams met at BBN –plan for first experiment complete January: testbed preparation February: conducted first experiment –approximately one week long

OPX PI Meeting 2002 February page 25 Multiple APOD Experiments ‘whiteboard’ experiment: discuss likely approaches to attack and defense without actually carrying them out first experiment (February) – use replication management, dynamic packet filtering, and intrusion detection for defense; flooding is off-limits second experiment (TBD) –add bandwidth management; allow flooding

OPX PI Meeting 2002 February page 26 CBCBBBBBBBSSS VPN/ Interne t Experiment Control, external waypoint router Legend C: client S: server B: broker factory Experiment Testbed and Test Application

OPX PI Meeting 2002 February page 27 Whiteboard Analysis of APOD Red Team starts with ‘root’ privilege on one host Intended Red Team attacks: –ARP cache poisoning to partition network –spoofing to trigger APOD ‘containment’ strategy, leading to self-denial-of-service –reverse engineering application components to cause malicious application behavior Lessons learned for Blue Team: –network partitioning a bigger problem than expected –some changes to mechanisms and strategy Formulating an experiment to test the limits of the APOD ‘outrun’ strategy is difficult

OPX PI Meeting 2002 February page 28 Results from First Experiment A defense-enabled application forced a highly-skilled and prepared attacker to work very hard and with no stealth against a purely automated defense to deny service Red Team eventually defeated APOD defenses with a combination of spoofing, ARP cache poisoning, and TCP connection flood –roughly a week of trial-and-error –final scripted attack takes 5 minutes and sets off numerous alarms (the undefended app, in comparison, could be killed immediately in the same situation)

OPX PI Meeting 2002 February page 29 More Results APOD defenses add roughly 5% to application request latency on average Unpredictable adaptation is good –nondeterministic placement of replicas helped –dynamic choice of communication ports would be better Corrupting running application processes to cause malicious behavior was not attempted, but may be harder than it seemed at first

OPX PI Meeting 2002 February page 30 Plans for Second Experiment Improve APOD strategy –TCP connection flood can be detected and responded to –other Add bandwidth management mechanism –detect and respond to (data) flooding –may use security-enhanced RSVP from NCSU to reserve bandwidth; will use dynamic packet-filtering to block floods –use strategically-placed Linux routers Consider augmenting purely automatic defense with tools for operator intervention

OPX PI Meeting 2002 February page 31 Technology Transition/Summary APOD defenses measurably “raise the bar” against cyber-attack, even against well-prepared attackers. APOD middleware encapsulates adaptive defense strategies for reuse in many applications. A distributed military application is sought – for testing the APOD technology against a real-world set of requirements – for testing how easily an existing application can be defense-enabled –for further research to improve APOD defenses