Copyright 2008. Beyond Intrusion Prevention and Detection – Intrusion Tolerance Arun Sood George Mason University International Cyber Center and Department.

Slides:



Advertisements
Similar presentations
Ed Duguid with subject: MACE Cloud
Advertisements

The World of Access Controls
Internet Information Server 6.0. IIS 6.0 Enhancements  Fundamental changes, aimed at: Reliability & Availability Reliability & Availability Performance.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Smart Grid Cyber Security Framework
Lecture 11 Reliability and Security in IT infrastructure.
Controls for Information Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Maintaining and Updating Windows Server 2008
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
SCIT Minimizing Losses from Zero Days – A New Layer of Defense (SCIT) Next Generation Server Security Technology Arun Sood Ph. D. Dept of Computer Science.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ShareTech 2015 Next-Gen UTM.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Windows Azure Conference 2014 Deploy your Java workloads on Windows Azure.
Computer Emergency Notification System (CENS)
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Copyright © 2006, GemStone Systems Inc. All Rights Reserved. Increasing computation throughput with Grid Data Caching Jags Ramnarayan Chief Architect GemStone.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Top 5 Open Source Firewall Software for Linux User
Critical Security Controls
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Customized Solutions to your needs
Couchbase Server is a NoSQL Database with a SQL-Based Query Language
Beyond Intrusion Prevention and Detection – Intrusion Tolerance
Cloud based Open Source Backup/Restore Tool
Use of Simulation for Cyber Security Risk and Consequence Assessment
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Microsoft Virtual Academy
6. Application Software Security
Securing web applications Externally
Presentation transcript:

Copyright Beyond Intrusion Prevention and Detection – Intrusion Tolerance Arun Sood George Mason University International Cyber Center and Department of Computer Science Research supported by contracts from Lockheed Martin and Virginia Center for Innovative Technologies (partner: Northrop Grumman) ICC supported by Lockheed Martin and Booz Allen Hamilton Cyber Security and Global Affairs Workshop supported by Office of Naval Research

Copyright 2009 slide million records compromised in 2008 [Verizon] Average per-incident data breach costs in 2007 were $6.3 million [Ponemon Institute] Enterprise Server Firewall Hacker (Actual Photo) Introducing a new paradigm for server security—Intrusion Tolerance The Problem

Copyright 2009 slide 3 Intrusion Tolerance allows malware and hackers into a server… Enterprise Server Firewall Hacker (Actual Photo) …but uses virtualization to restore the OS and application to a pristine state after attack! SCIT Virtual Server SCIT Virtual Partition Every 55 seconds SCIT software cleans and restores the virtual server to its pristine state The SCIT Solution

Copyright 2009 slide 4 Multi-National Security Breach   “A huge campaign to poison web searches and trick people into visiting malicious websites has been thwarted.”  If a user searched Google for terms such as "hospice", "cotton gin and its effect on slavery", "infinity" and many more The first result pointed to a website from which malicious software was downloaded and embedded on user system.  Criminals in country A created domains that were mostly bought by companies in country B and hosted in country C. Tens of thousands of domains were used.  These domains tricked the indexing strategy of Google to believe that these web pages were good and reliable source of information. Targeted and organized attacks.

Copyright 2009 slide 5 Securing Servers Servers and endpoints have to be protected  Verizon Data Breach Investigation shows that 99% of the compromised records were from servers A key step in these attacks was the installation of customized malware, which cannot be detected by current systems  Current protection can take place at the network level and for important asset protection at the host level Intrusion Prevention Systems including Firewalls Intrusion Detection Systems: statistical, anomaly and behavior based White list and Black lists: IP addresses and software Intrusion Tolerance – intrusions will happen, focus on minimizing losses Cross Sector Cyber Threats Strategy 5

Copyright 2009 slide 6 Multi layered Approach to Security  IPS depend on inspection of incoming packets  IDS depend on inspection of incoming and outgoing packets With increasing bandwidth and more matching requirements, the cycles devoted to packet inspection will keep increasing  Threat independent approaches are needed for protection  Other approaches should be included in the mix, including approaches that do not rely on packet inspection and have potential for threat independent performance: White list of software Time dependent intrusion tolerance Cross Sector Cyber Threats Strategy 6

Copyright 2009 slide 7 Key Intrusion Tolerance Approaches SITARMAFTIASCIT Detection BasedStructure BasedTime Dependent Payload InspectionYesNo Voting AlgorithmYes, used to detect faulty replica and survive attacks Yes, used to detect faulty replica and survive attacks. No DeterministicNo Yes Performance Impact Impact on response time. Some impact on computing cycles for starting a new server instance. Execution of ITS algorithm In Application Data Flow Out-of-band DiversityRequired Optional, but diversity will make scheme more robust RecoveryAdaptive recovery performed upon detecting intrusion detection. Performed upon detecting intrusion. Faulty replica recovered according to healthy ones. Periodic recovery performed by Controller, based on master copy.

Copyright Self Cleansing Intrusion Tolerance Next Generation Server Security Technology Infrastructure Servers Including those in DMZ Short Transactions Reduce Exposure Time

Copyright 2009 slide 9 Intrusion Tolerance  Introducing SCIT, the Intrusion Tolerance System Optimizes application-specific exposure windows (AEW)  Targets “overexposed” applications (transactions) Servers are sitting ducks Focus initially on Websites, DNS, Single Sign On Ongoing R&D Authentication (LDAP), Firewall Not targeted at applications with inherently long transaction times (FTP, VPN, etc)  Leverages virtualization technology to reduce intrusion risk and costs Reduces exposure time to limit intrusion losses Adds time-based exposure control to intrusion prevention and detection solutions SCIT is based on a new paradigm, but is easy to integrate with existing systems New level of “Day-Zero” protection  Increases security through real-time server rotation and cleansing: Enhances security of high availability systems Enables more flexible patch scheduling

Copyright 2009 slide 10 SCIT Software  SCIT deploys on existing servers - does not require additional physical servers  SCIT is cost effective, uses virtualization technology and increases system security  SCIT does not interfere with existing IPS and IDS solutions  SCIT is an additional layer of defense

Copyright 2009 slide 11 Anatomy of an Hack Foot print analysis Who is NSLookup Search Engines Enumeration Scanning Machines Ports Applications Exploitation Buffer Overflow Spoofing Password DOS Damage “Owning” IP Theft, Blackmail, Graffiti, Espoinage Destruction Analyze publicly available info. Set scope of attack and identify key targets Check for vulnerabilities on each target Attack targets using library of tools and techniques Foot print analysis Who is NSLookup Search Engines Enumeration Automated Scanning Machines Ports Applications Deliver Payload Custom Trojan Rootkit Damage “Owning” IP Theft, Blackmail, Graffiti, Espoinage Destruction Attack targets using installed software Richard Stiennon, May 2006, Manual Approach Automated Approach  Identify Target  Install Malicious Code  Hack Other Machines  Take over Domain Controller

Copyright 2009 slide 12 How Does SCIT Provide Additional Security?  SCIT servers Regularly restored to a known state and remove malicious software installed by attackers. Provide protection while manufacturer is developing a patch, i.e. SCIT servers are protected in the time period between vulnerability detection and patch distribution. Gives data center managers an additional level of freedom in developing a systematic plan for patch management.  SCIT DNS servers Domain name / IP address mapping is protected from malicious alteration, thus avoiding improper redirection of the traffic.  SCIT Web servers Protect the corporate crown jewels, front ends for sensitive information, e.g. customer or employee data sets, IP, and informational web sites. Regularly restores the sites to known states, and makes it difficult for intruders to undertake harmful acts such as deleting files. Avoid long term defacements. Reduces the risk of large scale data ex-filtration.

Copyright 2009 slide 13 Comparison of IDS, IPS, IT IssueFirewall, IDS, IPSIntrusion tolerance Risk management.Reactive.Proactive. A priori information required. Attack models. Software vulnerabilities. Reaction rules. Exposure time selection. Length of longest transaction. Protection approach.Prevent all intrusions. Impossible to achieve. Limit losses. System Administrator workload. High. Manage reaction rules. Manage false alarms. Less. No false alarms generated. Design metric.Unspecified.Exposure time: Deterministic. Packet/Data stream monitoring. Required.Not required. Higher traffic volume requires. More computations.Computation volume unchanged. Applying patches.Must be applied immediately. Can be planned.

Copyright 2009 slide 14 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical

Copyright 2009 slide 15 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical

Copyright 2009 slide 16 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical

Copyright 2009 slide 17 Server State Transitions

Copyright 2009 slide 18 Intrusion Tolerance  Increase security by reducing exposure window Exposure window is the time a server is online between rotations  Optimizes application-specific exposure windows to servers  Decreasing available time for intrusion, reduces potential losses T T Cost

Copyright 2009 slide 19 Target Applications E-Commerce payments – long session of multiple short transactions Streaming media VPN Complex Database Queries Back end processing Transaction Length Long Short Low High Value for Exposure Window Management Web servers DNS services Single Sign On Firewalls Authentication (LDAP) Transaction Processors File Transfer (size dependent)

Copyright 2009 slide 20 Exposure Time Reductions ApplicationCurrent ServerSCIT Server Websites – Windows Server 1 day to 3 month60 seconds Websites – UNIX Server1 month to 6 months60 seconds DNS services – Linux Server 3 months to 1 year30 seconds In the following slides we show that: Reducing Exposure Time Significantly Reduces Expected Loss

Copyright 2009 slide 21 Security Risk Assessment Follows SecurityFocus.com (Symantec), Microsoft

Copyright 2009 slide 22 SCIT vs Traditional Cumm Single Loss Expectancy SCIT Exposure Time Reducing Exposure Time Significantly Reduces Expected Loss Multi Tier Architecture Web server DNS server Content Manager Database server

Copyright 2009 slide 23 Avoidance is Better Than Cleaning  You cannot clean a compromised system by patching it. removing the back doors. using some vulnerability remover. using a virus scanner. reinstalling the operating system over the existing installation.  You cannot trust any data copied from a compromised system. the event logs on a compromised system. your latest backup.  The only proper way to clean a compromised system is to flatten and rebuild.  CLEANING COMPROMISED SYSTEMS IS DIFFICULT. IT IS BETTER TO AVOID HACKING.

Copyright 2009 slide 24 Sample Requirements Met by SCIT Servers  Web site should not be defaced longer than 1 minute  DNS tables should be restored within 1 minute  Security architecture should reduce data ex- filtration – SCIT server along with IDS will reduce the volume of data that can be maliciously retrieved  To ensure clean servers, remove malware every minute  Use diversity to change the face of the webserver every minute

Copyright 2009 slide 25 Performance & Functionality Stress Tests  Workload: number of user sessions/minute (50,100,125)  User session: Series of request and response from server Select item from drop down list and add it to persistent storage  OpenSTA is used to generate workload 3 runs per case.  Duration of run = 3 * Exposure time for the run each VM is tested at least once  Workload consists of N requests every 10 secs.  Exposure times of 2,3 and 4 minutes, No Rotation  Stand alone web server for Non-SCIT test.

Copyright 2009 slide 26 Performance Test Results SCIT Server Environment Entry Level DELL System Dual processor – 4 cores each Memory: 4 GB Slackware OS Apache, Tomcat, Shopping Cart (Java) Exp Time (minutes) User Sessions Avg. Response Time (secs) STD Dev 2 m m m m m m m m m No Rotation No Rotation No Rotation

Copyright 2009 slide 27 Response Times for Different Exposure Times

Copyright 2009 slide 28 Preliminary Performance Data Each user session includes a series of requests and responses. Average “think” time = 2 seconds between requests. Each session involves selecting an item from a drop down list and adding it into the persistent storage. Repeated 3 times. DEPEND 2009, June 09

Copyright 2009 slide 29 SCIT Parameters Copyright 2009 slide 29  Active window W o : server accepts requests from the network  Grace period W g : server stops accepting new requests and fulfills outstanding requests in its queue.  Exposure window: W = W o + W g.  N total : total nodes in the cluster.  N total, W, and the cleansing-time T cleansing are inter- related.

Copyright 2009 slide 30 SCIT State Transition Diagram  Simple diagram.  Pa: probability of successful attack.  Pc: probability of cleansing when in A.  F: low chance of occurrence, but still possible: Virtual machine and/or the host machine no longer responds to the Controller. Controller itself fails due to a hardware fault. Copyright 2009 slide 30 G: Good V: Vulnerable A: Successful Attack F: Failed GVAF G0100 V1–P a 0PaPa 0 APcPc 001-P c F0001

Copyright 2009 slide 31 MTTSF and W  W ↓ → (P a ≤ 1 - e -λW ) ↓  W ↓ → (P c ≥ e -λW ) ↑  Then: W ↓ → MTTSF scit ↑  MTTSF SCIT ≥ F(W), where F(W) is a decreasing function of W:  Significance: engineer instance of SCIT architecture by tuning W in order to increase or decrease the value of MTTSF SCIT. Copyright 2009 slide 31

Copyright 2009 slide 32 MTTSF and Grace Period  Grace period used by Controller to issue cleansing mode signal.  N outstanding : average # of outstanding requests in the queue when the server enters the grace period.  Entire incoming traffic ̴ Poisson(α).  It is known: λ = k.α, with k ≤ 1.  N outstanding ≤ α W o.  S: service rate in terms of number of serviced requests per unit time: W g = N outstanding /S ≤ (α W o ) / S  Since α/S < 1, estimate for grace period: W g < W o.  Then: control MTTSF SCIT by online window W o Copyright 2009 slide 32

Copyright 2009 slide 33 SCIT Research – Status & Future  On-going for 6 years  Supported by Army, NIST/CIPP, SUN, VA -CIT/NG, Lockheed  Demos for SCIT Web, SSO, DNS Presentation, persistent, session  Testing at corporate labs Mostly security driven  Basic concept has been validated Malware automatically deleted every rotation cycle (about 1 minute) Automatic recovery from defacement every minute Ecommerce demo ( open source pet store software) No packet inspection: increased bandwidth does not impact performance Exposure time based - no false alarms generated Reduce managed services cost  cs.gmu.edu/~asood/scit Pubs + 1 patent approved + 3 patents applied Video of demo on YouTube, MyDeo  Scalability for enterprise environments Simulate a large server farm (v0) Sys admin interface for managing multiple servers (v0) Software tools to support deployment  Randomized defense strategies Add diversity to SCIT Memory image, application, OS Add IP hopping to SCIT Distributed redundancy to achieve resilience  DNSSEC requirements  Extend to other apps / functions DNS cache poisoning, DNSSEC key protection, , LDAP, long duration transactions  Virtualization security: cloud Multifunction virtualized platform Performance degradation  How to reduce exposure time  Improve performance of SCIT Multiple cores (16 +); large memory  Audit logs, monitoring, feedback 2009 plans Future Current Status

Copyright 2009 slide 34 Observations and Thoughts  Specifying security without a time framework is very hard  It is easier to assess risk for proactive systems as compared to reactive systems  Threat independent protection is critical Protect while patches are being developed  We need easy to understand metrics and / or benchmarks SCIT makes it harder for intruder, but how much harder? Cost vs hardening assessment

Copyright 2009 slide 35 Conclusion  SCIT significantly reduces risk levels for targeted application using virtualization technology  Augments existing IPS and IDS solutions – another layer of defense – no interference  Completed SCIT web server and SSO server, SCIT DNS server in Q4  Research issues: long duration transactions, randomized defensive strategies, scalability, functionality under load, “penetration” testing, other servers (e.g. )

Copyright 2009 slide 36 SCIT Publications + Contact Info  SCIT technical publications  Links to media reports  Links to demo videos Links to demo videos Questions? Arun Sood

Copyright 2009 slide 37 Questions  SCIT goal is to make it harder for an intruder to do damage. We need a way to say that by having an exposure time of X the task will become Y times harder. Are there ways of assessing this without the use of red teams?  What is a good enough exposure time? What metrics and benchmarks are more meaningful to decision makers?  Given limited knowledge of future attack methodologies, how does one justify a multi-layered security architecture?  Can SCIT simplify the constraints on IDS and thus reduce false alarms?