Workpackage 3 New security algorithm design ICS-FORTH Paris, 30 th June 2008
WISDOM WP3: New security algorithm design Objectives Identify critical security application components which can be efficiently implemented in the optical domain. Characterise constraints to algorithmic components and develop novel analytical techniques for simplified pattern matching. Design a Security Application Programming Interface (SAPI) which will be the interface between high-level security applications and low-level optical implementation Tasks - Deliverables WP 3.1: Security Applications Partitioning (M12) WP 3.2: Identification of simplified Security Algorithm Components (M24) WP 3.3: Definition of a Security Application Programming Interface: SAPI (M27)
WP3.1 Security Applications Partitioning Critical security operations in the optical domain Basic firewall functionality, inspect packet headers Less than 10% of rules, more than 90% of alerts Look at specific packet header field Block or filter traffic for specific protocols, ports, etc Optical filtering, optical pattern matching, optical routing Block or filter traffic for specific IP addresses Optical possible but not efficient Combined inspections of two header fields From specific IP addresses to specific ports Optical possible but combination of optical and electronic more efficient
WP3.1 Security Applications Partitioning Firewall rule example Inspection Deny all incoming traffic with IP matching internal IP source IP address Deny incoming from black-listed IP addresses source IP address Deny all incoming ICMP traffic IP protocol Deny incoming TCP/UDP 135/445 (RPC, Windows Sharing) destination port Deny incoming/outgoing TCP 6666/6667 destination port Allow incoming TCP 80, 443 (http, https) destination port to internal web server (destination IP address) Deny incoming TCP 25 to SMTP server destination port from external IP addresses (destination)/source IP address Allow UDP 53 to internal destination port DNS server (destination IP address) typical port assignments for some services/applications ftp TCP 21, ssh TCP 22, telnet TCP 23, POP3 TCP 110, IMAP TCP 143
WP3.1 Security Applications Partitioning Security OperationInspectionApplication Example Match network packet targeting a specific service Destination Port Number Filtering out traffic Match network packet originating from a specific service Source Port Number Filtering out a Web server’s response Match network packet targeting specific computer(s) Destination IP Address Preventing contact with a computer Match network packet originating from specific computer(s) Source IP Address Preventing access from a computer Match network packet with specific properties IP protocol header field Filtering out ICMP traffic Match network packet targeting a specific service and originating from specific computers Destination Port Number and Source IP Address SPAM filter Denial of Service attack detectionSYN flag Preventing TCP SYN flood attacks
WP3.2 Identification of Simplified Security Algorithms Components Optical pre-processing for more complex pattern recognition Restrictions in optical domain (buffering, level of integration, etc) Scalability of security pattern matching algorithms, optimum balance between optical and electronic processing (WP6 ) Develop algorithms that will allow optical bit-serial processing subsystems to operate as a pre-processor to more complex pattern recognition techniques in the electronic domain. D3.2 Identification of simplified Security Algorithms Components (M24)
WP3.2 Identification of Simplified Security Algorithms Components Identify feasible and efficient all-optical operations Extraction of specific fields in packet headers (protocol number, port number, etc) Pattern matching Routing Keep all options for conventional (electronic) IDS Design high speed optical pre-processing that makes electronic processing more efficient Demonstration of key security functions Example applications with efficient and reliable operation of a hybrid system consisting of both all-optical and electronic components
WP3.2 Identification of Simplified Security Algorithms Components Combine optical and electronic signature-based detection Optical traffic splitter optical header processing group packets, e.g., according to port number Multiple “specialized” (electronic) processors less packets to inspect per processor more efficient payload inspection by performing same operations to same type of packets A lot of issues to consider, such as load balancing, parallel/distributed configurations, anomaly-based detection, etc.
WP3.2 Identification of Simplified Security Algorithms Components “Pragmatic” approach All-optical inspection of packet headers only A few well chosen rules optically implemented Restrictions in memory and level of integration imply small number of selected rules can be implemented in optical domain Reconfigurable optical systems Seamless coupling of optics with electronics Security applications (including payload inspection) in electronic domain with more conventional NIDS tools Several NIDS/NIPS approaches and methods, as described in previous project deliverables
WP3.2 Identification of Simplified Security Algorithms Components Select rules through network traffic monitoring Monitoring Application Programming Interface (MAPI
WP3.2 Identification of Simplified Security Algorithms Components Network traffic monitoring and classification
WP3.2 Identification of Simplified Security Algorithms Components Statistics on suspect packets NoAH honeypots statistics Protocol Port
Country Packet Count Source IP Trend Packet Count Destination Port
WP3.2 Identification of Simplified Security Algorithms Components Network traffic monitoring Deployment of network of sensors for global view Protocols ICMP often used in attacks TCP most popular, UDP also heavily used Ports HEAnet Some high level applications use TCP/IP with pre-assigned port numbers Others use dynamically assigned port numbers, different for different connections Some attacks work on specific ports
WP3.2 Identification of Simplified Security Algorithms Components Benefits from optical splitting for electronic processing Similar approaches already proved successful in intensive NIDS applications Early filtering and forwarding Packets of the same type are grouped by the splitter and forwarded to specialized electronic processors Performance benefits (about 20%) with the use of digital network processors Clustering of packets with same destination port number improves performance of conventional IDS 40% increase in packet processing throughput 60% improvement in packet loss rate
WP3.2 Identification of Simplified Security Algorithms Components Available hybrid integrated optical circuits: XOR, AND logic gates buffer memory (limited) routing switch Bit pattern matching circuit Target pattern generator Pseudo random bit sequence generator Header sampler (proposal) CRC (proposal)
WP3.2 Identification of Simplified Security Algorithms Components Input: flux of packets, consisting of RZ pulses T Output: packets dropped or allowed to proceed Box: Header sampler Bit pattern matching Routing switch Buffer memory Latency approx. 150 T MZI1 CRC
WP3.2 Identification of Simplified Security Algorithms Components Same components, simplistic pipelined configuration Latency approx. 150 T (8 bit pattern matching) left box 450 T (16 bit pattern matching) center, right boxes Packet collisions, bottleneck
WP3.2 Identification of Simplified Security Algorithms Components “router”: round-robin, CRC
WP3.2 Identification of Simplified Security Algorithms Components Functional models of optical devices and simulator 1) Simple, basic building blocks are logic gates Useful for design and testing efficiency of proposed configurations, more complex algorithms, hybrid optical/electronic detection, etc. 2) Include physical models for actual optical components Useful in device development. Much more demanding… Building simulator starting with (1) and expand to (2), when necessary.
WP 3.3 Definition of a Security Application Programming Interface (SAPI) SAPI will bridge the gap between optical execution of key components and programming of security applications High-level programming, abstract all low-level details operate independent of system modifications, allow for integration of additional software and hardware components of increasing complexity Hardware – software interface fast optical processing, reconfigurable at much slower rates user interventions rare, at conventional speed of electronics D3.3 Definition of SAPI (M27)