Automatic Trust Management for Adaptive Survivable Systems Howard Shrobe MIT AI Lab Computational Vulnerability Analysis for Model Based Diagnosis July.

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Chapter Six Networking Hardware.
Walter Binder University of Lugano, Switzerland Niranjan Suri IHMC, Florida, USA Green Computing: Energy Consumption Optimized Service Hosting.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System and Network Security Practices COEN 351 E-Commerce Security.
CEG3185 Tutorial 7 Routers and Routing. IP Address An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Chapter 13 Embedded Systems
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Lecture 11 Reliability and Security in IT infrastructure.
seminar on Intrusion detection system
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Network Topologies.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Basic Concepts of Computer Networks
Ch 11 Managing System Reliability and Availability 1.
Automatic Trust Management for Adaptive Survivable Systems (ATM for ASS’s) Howard Shrobe MIT AI Lab Jon Doyle MIT Lab for Computer Science.
Hands-On Microsoft Windows Server 2008
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Using Windows Firewall and Windows Defender
COEN 252 Computer Forensics
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
University of Management & Technology 1 Operating Systems & Utility Programs.
COEN 252 Computer Forensics Collecting Network-based Evidence.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Automatic Trust Management for Adaptive Survivable Systems Howard Shrobe MIT AI Lab March 2002 PI Meeting Hilton Head.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Carnegie Mellon University 10/23/2015 Survivability Analysis via Model Checking Oleg Sheyner Jeannette Wing Carnegie Mellon University.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Networks. Network Hardware For any network to function successfully, you need specialized computer Hardware. However, without the right knowledge, you.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Automatic Trust Management for Adaptive Survivable Systems (ATM for ASS’s) Howard Shrobe MIT AI Lab Jon Doyle MIT Lab for Computer Science.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1Maita Final, Dec. 5, **Not for distribution** Adaptive Knowledge-Based Monitoring for Information Assurance Peter Szolovits MIT.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Approved for Public Release, Distribution Unlimited Detecting & Preventing Misuse of Privilege Bob Balzer (Teknowledge) Howie Shrobe (MIT)
Intrusion Detection System
Protocol Layering Chapter 11.
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
Role Of Network IDS in Network Perimeter Defense.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Maintaining and Updating Windows Server 2008 Lesson 8.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Lab A: Planning an Installation
OptiView™ XG Network Analysis Tablet
Chapter 2: System Structures
Outline Introduction Characteristics of intrusion detection systems
Network Architecture By Dr. Shadi Masadeh 1.
Presentation transcript:

Automatic Trust Management for Adaptive Survivable Systems Howard Shrobe MIT AI Lab Computational Vulnerability Analysis for Model Based Diagnosis July 2001 PI Meeting Santa Fe

Outline Overall Framework Review of Diagnostic Process Computational Vulnerability Analysis

Adaptive Survivable Systems Techniques that enable self-monitoring and diagnosis –Driven by representations of structure and purpose –The application knows the purposes of its components –The application checks that these are achieved –If these purposes are not achieved, the application localizes and characterize the failure Techniques that enable application adaptation –The application achieve its purpose as well as possible within the available infrastructure by choosing alternatives. –Driven by models of Trust (informed by diagnosis and monitoring) –Driven by models of computational alternatives –It must have more than one way to effect each critical computation –It should choose an alternative approach if the first one failed –It should make its initial choices in light of the trust model

The Active Trust Management Architecture Self Adaptive Survivable Systems Perpetual Analytical Monitoring Trust Model: Trustworthiness Compromises Attacks Rational Decision Making Other Information Sources: Intrusion Detectors Trend Templates System Models & Domain Architecture Rational Resource Allocation

Motivating Example Grammar Center Speech Processing Grammar Voice Capture text Start Omnibase query Display Generator response Display SleepyGrumpyDocDopey utterance Performance expectations Integrity Constraint Gui Directives

Diagnosis as Likely Mode Identification Single Level, Single Model Model Based Diagnosis –Tells you which components aren’t working as expected Multi-Mode Diagnosis –Tells you in what way they aren’t working as expected Multi-Level, Multi-Mode Diagnosis –Tells you how the misbehaviors are coupled through common- mode failures (or compromises) and ranks the failures by their probabilities. Attack Models –Tells you how the common mode failures (or compromised modes of the resources) are in turn coupled to common attacks exploiting vulnerabilities of the resources.

Model Based Diagnosis with Multiple Faults Each component is modeled by multi-directional constraints representing the normal behavior As a value is propagated through a component model, it is labeled with the assumption that this component works A conflict is detected at any place to which inconsistent values are propagated A conflict set is the set of all labels attached to the conflicting values A diagnosis is a set of assumptions which form a covering set of all Conflict set Goal is to find all minimum diagnoses

Model Based Troubleshooting GDE Times Plus Conflicts: Diagnoses: Blue or Violet Broken Green Broken, Red with compensating fault Green Broken, Yellow with masking fault 15 25

Consistent Diagnoses ABCMIDMIDProbExplanation LowHigh NormalNormalSlow C is delayed SlowFastNormal A Slow, B Masks runs negative! FastNormalSlow A Fast, C Slower NormalFastSlow B not too fast, C slow FastSlowSlow A Fast, B Masks, C slow SlowFastFast A Slow, B Masks, C not masking fast LHP Normal:3 6.7 Fast: Slow:730.2 IN 0 LHP Normal: Fast: Slow: OUT2 Observed:17 Predicted:Low = 8 High =16 LHP Normal:240.9 Fast: Slow: OUT1 Observed:5 Predicted:Low = 5 High = 10 A B C MID Low = 3 High = 6 Multi-Mode Diagnosis

Multi-Mode Multi-Tiered Diagnosis The model is augmented with another level of detail showing the dependence of computations on underlying resources Each resource has models of its state of compromise The modes of the resource models are linked to the modes of the computational models by conditional probabilities The model forms a bayesian network Normal: Delay: 2,4 Delayed: Delay 4,+inf Accelerated: Delay -inf,2 Node17 Located On Normal: Probability 90% Parasite: Probability 9% Other: Probability 1% Component 1 Has models Conditional probability =.2 Conditional probability =.4 Conditional probability =.3

A Host1 B D C E Host2Host4Host3 NH Normal.6.15 Peak.1.80 Off Peak.3.05 NH Normal.8.3 Slow.2.7 Normal.9 Hacked.1 Normal.85 Hacked.15 Normal.8 Hacked.2 Normal.7 Hacked.3 NH Normal Fast Slow NH Normal Slow Slower NH Normal Fast Slow An Example System Description

The System Description includes a Bayesian Network The Model can be viewed as a Two-Tiered Bayesian Network –Resources with modes –Computations with modes –Conditional probabilities linking the modes A Host1 B D C E Host2Host4Host3 NH Normal.6.15 Peak.1.80 Off Peak.3.05 NH Normal.8.3 Slow.2.7 Normal.9 Hacked.1 Normal.85 Hacked.15 Normal.8 Hacked.2 Normal.7 Hacked.3 NH Normal Fast Slow NH Normal Slow Slower NH Normal Fast Slow.25.50

The system description includes a behavioral model The Model can also be viewed as a behavioral model with multiple modes per device –Each model has behavioral description The modes have posterior probabilities linked by conditional probabilities to the probabilities of the modes of the resources AB D C E NH Normal.6.15 Peak.1.80 Off Peak.3.05 NH Normal.8.3 Slow.2.7 NH Normal Fast Slow NH Normal Slow Slower NH Normal Fast Slow.25.50

Integrating model based and Bayesian reasoning Start with each behavioral model in the “normal” state Repeat: Check for Consistency of the current model If inconsistent, –Add a new node to the Bayesian network This node represents the logical-and of the nodes in the conflict. It’s truth-value is pinned at FALSE. –Prune out all possible solutions which are a super-set of the conflict set. –Pick another set of models from the remaining solutions If consistent, add to the set of possible diagnoses Continue until all inconsistent sets of models are found Solve the Bayesian network Conflict: A = NORMAL B = NORMAL C = NORMAL Discrepancy Observed Here Least Likely Member of Conflict Most Likely Alternative is SLOW AB D C E NH Normal.6.15 Peak.1.80 Off Peak.3.05 NH Normal.8.3 Slow.2.7 NH Normal Fast Slow NH Normal Slow Slower NH Normal Fast Slow.25.50

Adding Attack Models An Attack Model specifies the set of attacks that are believed to be possible in the environment Each resource has a set of vulnerabilities –Vulnerabilities enable attacks on that resource A successful attack exploits the vulnerability, putting the resource into a non-normal behavioral mode This is given as a set of conditional probabilities –If the attack succeeded on a resource of this type then the likelihood that the resource is in mode-x is P –This now forms a three tiered Bayesian network Host1 Buffer-Overflow Has- vulerability Overflow-Attack Enables Unix-Family Resource-type Causes Normal Slow.5.7

Three Tiered Model

What the diagnostic process tells us All non-conflicting combination of models are possible diagnoses The posterior probabilities tell you how likely each diagnosis is. This guides recovery processing Each mode of each resource has a posterior probability This guides resource selection in the future The attack models couple the resource models, given a system wide view. This informs the trust model This couples to long-term monitoring, that looks for complex multi-stage attacks

Computational Vulnerability Analysis Grounding the attack model in systematic analysis Ontology of: –System Properties –System Types –System Structure –Control and Dependencies

Generating Attack Models Through Vulnerability Analysis The problem: Where does the attack model and its links to behavioral modes come from? –So far, by hand crafting Vulnerability Analysis supplants this by a systematic analysis: –Forming an ontology of how computer systems are structured –Building models of the environment Network topology: nodes, routers, switches, filter, firewalls System types: hardware, operating systems Server and user suites: Which servers and users run where –Analyzing how properties depend on resources –Analyzing the vulnerabilities of the resources

Modeling System Structure Hardware Processor Memory Device Controllers Devices controls Part-of Operating System Logon Controller Scheduler Device Drivers Part-of Job Admitter Resides-In controls User Set Work Load File System Access Controller resources controls files Part-of Input-to controls Scheduler Policy

Modeling the topology Machine name: sleepy OS Type: Windows-NT Server Suite: IIS….. User Authentication Pool: Dwarfs… Router: Enclave restrictions. …. Topology tells you: who can share (and sniff) which packets who can affect what types of connections to whom Switch: subnet restrictions. …. Switch: subnet restrictions. ….

Modeling Dependencies Start with the desirable properties of systems: –Reliable performance –Privacy of communications –Integrity and/or privacy of data Analyze which system components impact those properties –Performance - scheduler –Privacy - access-controller To affect a desirable property control a component that contributes to the delivery of that property

Controlling components (1) One way to gain control of a component is to directly exploit a known vulnerability –One way to control a Microsoft IIS web server is to use a buffer overflow attack on it. IIS Web Server Process Buffer-Overflow Attack Takes control of IIS Web Server Buffer-Overflow Attack Is vulnerable to

Controlling components (2) Another way to control a component is to find an input to the component and then find a way to modify the input –Modify the scheduler policy parameters Scheduler Policy Parameters Input to Scheduler control by Modification- action Scheduler Policy Parameters

Controlling components (3) Another way to control a component is to find one of its components and then to find a way to gain control the sub-component Job-Admitter User Job Admitter Component-of Job-Admitter control by Control- action User Job Admitter

Modifying Inputs (1) One way to modify an input is to find a component which controls the input and then to find a way to gain control component Scheduler Workload Input-of Scheduler control by Job AdmitterWorkload Job Admitter Controls Attack. Controls

Modifying Inputs (2) One way to modify an input is to find a component of the input and then to find a way to modify the component Scheduler Workload Input-of Scheduler control by User Workload Workload User Workload Component Attack. Modify

Access Rights Each object specifies a set of capabilities required for each operation on that object –Capabilities are organized in an DAG –This generalizes the access mechanisms of all OS’s. Each actor (user or process) possesses certain capabilities. An actor can perform an action on an object only if it possesses a capability at least as strong as that required for the operation –This is a generalization of the access mechanisms in all current OS’s. An access pool is a set of machines that shares resources, password & access right descriptions

Netchex The AI Lab Topology (partial) Router Netchex Filters out Telnet. Server Switch 8th- Floor-1 8th- Floor-2 7th- Floor-1 Router Access pool Life Kenmore Maytag Server Access Pool Doc Dopey Sleepy Dwarf Access Pool Sneezy Sakharov Truman Quincy- Adams Lisp Access Pool Jefferson Wilson Creepy Crawler General Access Pool

Obtaining Access (1) One way to gain access to an operation on an object is to find a process with an adequate capability and take control of the process Typical User File User Read Required for Read Typical User File To Read Control- action Typical User Process Typical User Process User Read Posseses Capability

Obtaining Access (2) Another way to gain access to an operation on an object is to find a user with an adequate capability and find a way to log in as that user and launch a process with the user’s capabilities Typical User File User Read Required for Read Typical User File To Read Logon as Typical User User Process Typical User User Read Posseses Capability Launches

Logging On Logging on requires obtaining knowledge of a password To gain knowledge of a password –Guess it, using guessing attacks –Sniff it By placing a parasitic virus on the user’s machine By monitoring network traffic –Hack the password file

Monitoring and Changing Network Traffic Network are broken down into subnet segments Segments are connected by Routers –Routers can monitor traffic on any connected segment Each segment may be: – Shared media Coaxial ethernet Wireless ethernet Any connected computer can monitor traffic –Switched media 10 (100, 100) base-T Only the switch (or reflected ports) can monitor Traffic Switches and Routers are computers –They can be controlled –But they may be members of special access pools To gain knowledge of some information gain the ability to monitor network traffic

Residences Components reside in several places –Main memory –Boot files –Paging Files They migrate between residences –Through local peripheral controllers –Through networks To modify/observe a component find a residence of the component and modify/observe it in the residence To modify/observe a component find a migration path and modify/observe it during the transmission

Formats and Transformations Components live in several different formats –Source code –Compiled binary code –Linked executable images Processes transform one format into another –Compilation –Linking To modify a component change an upstream format and cause the transformations to happen To modify a component gain control of the processes that perform the transformations

Modification during Transmission To control traffic on a network segment launch a “man in the middle attack” –Get control of a machine, redirect traffic to it To observe network traffic get control of a switch/router and a user machine and then reflect traffic to the user machine To modify network traffic launch an “inserted packet” packet. –Get control of a machine –Send a packet from the controlled machine with the correct serial number but wrong data before the sender sends the real packet

An Example Affecting reliable performance: –Control the scheduler - The scheduler is a component that impacts performance –By modifying the scheduler’s policy parameters The policy parameters are inputs to the scheduler –By gaining root access The policy parameters require root access for writing –By using a buffer overflow attack on the web-server The web-server process possesses root capabilities The web-server process is vulnerable to a buffer-overflow attack. For this attack to impact the performance all the actions must succeed –Each has an a priori probability based on its inherent difficulty and current evidence suggesting that it occurred.

Affecting Data Privacy (1)

Affecting Data Privacy (2)

Affecting Data Privacy (3)

Affecting Performance (1)

Affecting Performance (2)

Using Attack Scenarios This information is captured in an Object-Oriented knowledge representation and rule-base system that reasons with it. The inference process develops multi-stage attack scenarios The scenarios are transformed into trend templates for recognition purpose The scenarios are transformed into Bayesian network fragment for diagnostic purposes

Integration Opportunities Projects that provide self-monitoring capabilities –We depend on self-monitoring –We typical assume coarse-grain (e.g. method wrapping) –Could use lower-level tools as well Projects that provide policy enforcement –Attempted violations of policies should trigger diagnostic activity Projects that provide recovery capabilities Participation in framework development