1Maita Final, Dec. 5, 2002 -- **Not for distribution** Adaptive Knowledge-Based Monitoring for Information Assurance Peter Szolovits MIT.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Performance Testing - Kanwalpreet Singh.
DARPA ITS PI Meeting – Honolulu – July 17-21, 2000Slide 1 Aegis Research Corporation Intrusion Tolerance Using Masking, Redundancy and Dispersion DARPA.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Chapter 19: Network Management Business Data Communications, 4e.
Intrusion Detection Systems and Practices
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Lecture 11 Reliability and Security in IT infrastructure.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Stephen S. Yau CSE , Fall Security Strategies.
Maintaining and Updating Windows Server 2008
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Module 10 Configuring and Managing Storage Technologies.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Hands-On Microsoft Windows Server 2008
COEN 252 Computer Forensics
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
© Grant Thornton | | | | | Guidance on Monitoring Internal Control Systems COSO Monitoring Project Update FEI - CFIT Meeting September 25, 2008.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Module 7: Fundamentals of Administering Windows Server 2008.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Automatic Trust Management for Adaptive Survivable Systems Howard Shrobe MIT AI Lab March 2002 PI Meeting Hilton Head.
Event Management & ITIL V3
Automatic Trust Management for Adaptive Survivable Systems Howard Shrobe MIT AI Lab Computational Vulnerability Analysis for Model Based Diagnosis July.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Carnegie Mellon University 10/23/2015 Survivability Analysis via Model Checking Oleg Sheyner Jeannette Wing Carnegie Mellon University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Distributed System Services Fall 2008 Siva Josyula
Security fundamentals Topic 10 Securing the network perimeter.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 10: Windows Firewall and Caching Fundamentals.
Approved for Public Release, Distribution Unlimited Detecting & Preventing Misuse of Privilege Bob Balzer (Teknowledge) Howie Shrobe (MIT)
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Role Of Network IDS in Network Perimeter Defense.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security fundamentals
SQL Database Management
CompTIA Security+ Study Guide (SY0-401)
Chapter 2: System Structures
CompTIA Security+ Study Guide (SY0-401)
Hypotheses and Objectives Experimentation and Transition
Chapter 2: Operating-System Structures
Chapter 2: Operating-System Structures
Presentation transcript:

1Maita Final, Dec. 5, **Not for distribution** Adaptive Knowledge-Based Monitoring for Information Assurance Peter Szolovits MIT LCS Howard Shrobe MIT AI William J. Long, Glenn S. Burke, Mike McGeachie, Delin Shen, Ying Zhang, Steve Bull, Joe Hastings, MIT Isaac S. Kohane, Marco Ramoni, The Children’s Hospital, Boston Jon Doyle, North Carolina State University Adaptive Knowledge-Based Monitoring

2Maita Final, Dec. 5, **Not for distribution** Impact Rapid reconfiguration enables adaptation to evolving threats "inside the loop" Dynamically and intelligently targeted monitors give commanders the information they need Rational response decisions ensure optimal, flexible, and robust defenses Trust models enable operations despite compromises to critical computing bases Common language and repository for IA&S knowledge strengthens defensive efforts Adaptive Knowledge-Based Monitoring Jon Doyle & Peter Szolovits Monitoring Processes Task Processes

3Maita Final, Dec. 5, **Not for distribution** Domain Background Defense against information attacks requires broad and deep understanding of: –Mission –Systems used to accomplish it –Ability to operate with diminished resources Trade-offs among competing objectives –Threats –Capabilities of adversary –Experience

4Maita Final, Dec. 5, **Not for distribution** Our Aims/Cyber Panel Provide situational awareness to commanders “Inside the loop” monitor construction/adaptation –Timely concerns –Empirical –Simplify CC of monitoring Guidance for automatic trust management –Self-monitoring, resource allocation Common description language(s) and library(ies)

5Maita Final, Dec. 5, **Not for distribution** Potential Contributions Conceptual –Advance role of probabilistic, decision analytic, preference-based dynamic reasoning –Develop new methods for adaptive knowledge-based monitoring –Learning of new monitoring methods –Expressive languages for description of domain, tasks, attacks, monitoring strategies, etc. Artifactual –Maita system as a testbed to foster and test above ideas

6Maita Final, Dec. 5, **Not for distribution** Our Overall Approach Knowledge-Based Monitoring Contextual Awareness Reusable monitoring methods Diagnostic methods to identify underlying problems Preference and utility-based specification of tactics

7Maita Final, Dec. 5, **Not for distribution** Monitoring Processes Task Processes Infocon Bravo Danger Safe Monitoring Knowledge & Library Monitoring Management Executive Monitor Control Panels System Health Monitor

8Maita Final, Dec. 5, **Not for distribution** Maita Monitors Maita is based on a general-purpose distributed system archtecture whose primitive (and composed) components are monitors –Control inputs via specialized HTTP server –Set of input terminals; a monitor with no inputs is a data source, often “wrapping” a lower-level system resource. –Set of output terminals; a monitor with no outputs is a display or alerting service

9Maita Final, Dec. 5, **Not for distribution** Other Maita Components MOM (Monitor of Monitors) Human/Computer Interface –Control Panels –General-purpose display Boot server – starts monitors on its machine

10Maita Final, Dec. 5, **Not for distribution** Outline Incremental Progress since Charleston PI meeting (Not here: –Preference compilation –Markov analysis of system call traces –Multi-stream data segmentation –Efficient trend matching) Maita Vulnerability Analysis Lessons Learned

11Maita Final, Dec. 5, **Not for distribution** Progress since PI Meeting Making Maita implementation more –Complete Run on Windows as well as Unix platforms Ability for monitoring processes to save checkpoint data in MoM –Robust Restart capabilities from various kinds of system, communication, … failure More thorough self-monitoring Status: progress, but still not completed*

12Maita Final, Dec. 5, **Not for distribution** Progress since PI Meeting More sources of monitoring data –System log (ftp, sendmail, imapd) –Auth log (logins, ipmon, popper) –Daemon log (ftp details, stunnel, telnet, …) –Sendmail volume, relaying –Disk utilization –Backup sizes –CPU load –Lincoln Labs TCPDUMP Additional filters & detectors, with HCI, using –Configurable parameters –Temporal sequencing

13Maita Final, Dec. 5, **Not for distribution** Routinely monitoring

14Maita Final, Dec. 5, **Not for distribution** Control Panel showing various monitors

15Maita Final, Dec. 5, **Not for distribution** Sendmail/relaying & trend lines

16Maita Final, Dec. 5, **Not for distribution** Backup sizes

17Maita Final, Dec. 5, **Not for distribution** FTP activity

18Maita Final, Dec. 5, **Not for distribution** FTP analysis

19Maita Final, Dec. 5, **Not for distribution** SNORT

20Maita Final, Dec. 5, **Not for distribution** FTP Transshipment Trend Template ESA = external site activity average RLA = resource load activity average ESA RLA Start of abnormal probing Cessation of abnormal probing Start of unusual transfersSaturation of host capacity Leveling off of unusual Transfer destinations

21Maita Final, Dec. 5, **Not for distribution** Events recognized by ftp-monitor as preconditions and as events Parameters that must match for precondition to enable event Label to put on resulting event Recognizing: passwordscan(IP) -> ftp uploads(IP) -> excess diskuse

22Maita Final, Dec. 5, **Not for distribution** Work in Progress Writing “Completion” of Maita code to distributable state Web site summarizing project accomplishments and distributing results Student research –Preferences for student interest matching, collaboration, and retrieval of focused information –Real-time machine learning from intensive care unit data –Markov analysis of system call patterns as another basis for detecting anomalies Planning for future use: –mMesh proposal (distributed health records, system monitoring) –ARMS (IXO) proposal on secure ship computing environment infrastructure –Potential industrial collaborations (under discussion)

23Maita Final, Dec. 5, **Not for distribution** Computational Vulnerability Analysis Grounding the attack model in systematic analysis Ontology of: –System Properties –System Types –System Structure –Control and Dependencies

24Maita Final, Dec. 5, **Not for distribution** Generating Attack Models Through Vulnerability Analysis The problem: Where does the attack model and its links to behavioral modes come from? –So far, by hand crafting Vulnerability Analysis supplants this by a systematic analysis: –Forming an ontology of how computer systems are structured –Building models of the environment Network topology: nodes, routers, switches, filter, firewalls System types: hardware, operating systems Server and user suites: Which servers and users run where –Analyzing how properties depend on resources –Analyzing the vulnerabilities of the resources

25Maita Final, Dec. 5, **Not for distribution** Modeling System Structure Hardware Processor Memory Device Controllers Devices controls Part-of Operating System Logon Controller Scheduler Device Drivers Part-of Job Admitter Resides-In controls User Set Work Load File System Access Controller resources controls files Part-of Input-to controls Scheduler Policy

26Maita Final, Dec. 5, **Not for distribution** Modeling the topology Machine name: sleepy OS Type: Windows-NT Server Suite: IIS….. User Authentication Pool: Dwarfs… Router: Enclave restrictions. …. Topology tells you: who can share (and sniff) which packets who can affect what types of connections to whom Switch: subnet restrictions. …. Switch: subnet restrictions. ….

27Maita Final, Dec. 5, **Not for distribution** The Key Notion is Dependency Start with the desirable properties of systems: –Reliable performance –Privacy of communications –Integrity and/or privacy of data Analyze which system components impact those properties –Performance - scheduler –Privacy - access-controller Rule 1: To affect a desirable property control a component that contributes to the delivery of that property

28Maita Final, Dec. 5, **Not for distribution** Controlling components (1) One way to gain control of a component is to directly exploit a known vulnerability –One way to control a Microsoft IIS web server is to use a buffer overflow attack on it. IIS Web Server Process Buffer-Overflow Attack Takes control of IIS Web Server Buffer-Overflow Attack Is vulnerable to

29Maita Final, Dec. 5, **Not for distribution** Controlling components (2) Another way to control a component is to find an input to the component and then find a way to modify the input –Modify the scheduler policy parameters Scheduler Policy Parameters Input to Scheduler control by Modification- action Scheduler Policy Parameters

30Maita Final, Dec. 5, **Not for distribution** Controlling components (3) Another way to control a component is to find one of its sub-components and then to find a way to gain control of the sub-component Job-Admitter User Job Admitter Component-of Job-Admitter control by Control- action User Job Admitter

31Maita Final, Dec. 5, **Not for distribution** Modifying Inputs (1) One way to modify an input is to find a component which controls the input and then to find a way to gain control component Scheduler Workload Input-of Scheduler control by Job AdmitterWorkload Job Admitter Controls Attack. Controls

32Maita Final, Dec. 5, **Not for distribution** Modifying Inputs (2) One way to modify an input is to find a component of the input and then to find a way to modify the component Scheduler Workload Input-of Scheduler controlled by User Workload Component User Workload Workload Component Attack. Modify

33Maita Final, Dec. 5, **Not for distribution** Access Rights Each object specifies a set of capabilities required for each operation on that object –Capabilities are organized in an DAG –This generalizes the access mechanisms of all OS’s. Each actor (user or process) possesses certain capabilities. An actor can perform an action on an object only if it possesses a capability at least as strong as that required for the operation –This is a generalization of the access mechanisms in all current OS’s. An access pool is a set of machines that shares resources, password & access right descriptions

34Maita Final, Dec. 5, **Not for distribution** Netchex The AI Lab Topology (partial) Router Netchex Filters out Telnet. Server Switch 8th- Floor-1 8th- Floor-2 7th- Floor-1 Router Access pool Life Kenmore Maytag Server Access Pool Doc Dopey Sleepy Dwarf Access Pool Sneezy Sakharov Truman Quincy- Adams Lisp Access Pool Jefferson Wilson Creepy Crawler General Access Pool

35Maita Final, Dec. 5, **Not for distribution** Obtaining Access (1) One way to gain access to an operation on an object is to find a process with an adequate capability and take control of the process Typical User File User Read Capability Required for Read Typical User File To Read Control- action Typical User Process Typical User Process User Read Capability Possesses Capability

36Maita Final, Dec. 5, **Not for distribution** Obtaining Access (2) Another way to gain access to an operation on an object is to find a user with an adequate capability and find a way to log in as that user and launch a process with the user’s capabilities Typical User File User Read Capability Required for Read Typical User File To Read Logon as Typical User User Process Typical User User Read Capability Posseses Capability Launches

37Maita Final, Dec. 5, **Not for distribution** Logging On Logging on requires obtaining knowledge of a password To gain knowledge of a password –Guess it, using guessing attacks –Sniff it By placing a parasitic virus on the user’s machine By monitoring network traffic –Change it By hacking the password file, for example.

38Maita Final, Dec. 5, **Not for distribution** Monitoring and Changing Network Traffic Network are broken down into subnet segments Segments are connected by Routers –Routers can monitor traffic on any connected segment Each segment may be: – Shared media Coaxial ethernet Wireless ethernet Any connected computer can monitor traffic –Switched media 10 (100, 1000) base-T Only the switch (or reflected ports) can monitor Traffic Switches and Routers are computers –They can be controlled –But they may be members of special access pools To gain knowledge of some information, gain the ability to monitor network traffic

39Maita Final, Dec. 5, **Not for distribution** Residences Components reside in several places –Main memory –Boot files –Paging Files They migrate between residences –Through local peripheral controllers –Through networks To modify/observe a component find a residence of the component and modify/observe it in the residence To modify/observe a component find a migration path and modify/observe it during the transmission

40Maita Final, Dec. 5, **Not for distribution** Formats and Transformations Components live in several different formats –Source code –Compiled binary code –Linked executable images Processes transform one format into another –Compilation –Linking To modify a component change an upstream format and cause the transformations to happen To modify a component gain control of the processes that perform the transformations

41Maita Final, Dec. 5, **Not for distribution** Modification during Transmission To control traffic on a network segment launch a “man in the middle attack” –Get control of a machine, redirect traffic to it To observe network traffic get control of a switch/router and a user machine and then reflect traffic to the user machine To modify network traffic launch an “inserted packet” attack. –Get control of a machine –Send a packet from the controlled machine with the correct serial number but wrong data before the sender sends the real packet

42Maita Final, Dec. 5, **Not for distribution** An Example Affecting reliable performance: –Control the scheduler - The scheduler is a component that impacts performance –By modifying the scheduler’s policy parameters The policy parameters are inputs to the scheduler –By gaining root access The policy parameters require root access for writing –By using a buffer overflow attack on the web-server The web-server process possesses root capabilities The web-server process is vulnerable to a buffer-overflow attack. For this attack to impact performance, all the actions must succeed –Each has an a priori probability based on its inherent difficulty and current evidence suggesting that it occurred.

43Maita Final, Dec. 5, **Not for distribution** Affecting Data Privacy (1)

44Maita Final, Dec. 5, **Not for distribution** Affecting Data Privacy (2)

45Maita Final, Dec. 5, **Not for distribution** Affecting Data Privacy (3)

46Maita Final, Dec. 5, **Not for distribution** Affecting Performance (1)

47Maita Final, Dec. 5, **Not for distribution** Affecting Performance (2)

48Maita Final, Dec. 5, **Not for distribution** Trust Model: Trustworthiness Compromises Attacks Attack Models and Monitoring

49Maita Final, Dec. 5, **Not for distribution** Using Attack Scenarios This information is captured in an object-oriented Knowledge Representation and a rule-base system that reasons about it. The inference process develops multi-stage attack scenarios The scenarios can be transformed into trend templates for plan recognition purposes The scenarios can be transformed into Bayesian network fragment for diagnostic purposes The model can be used to audit an environment for possible cascaded vulnerabilities

50Maita Final, Dec. 5, **Not for distribution** Technical Validation Conceptual adequacy of –Descriptive languages –Monitoring methods –Learning approaches Performance of artifacts –Ability to recognize events of interest to human sysadmins –Resource utilization

51Maita Final, Dec. 5, **Not for distribution** Schedule (and Future Milestones) End-to-end data feed, analysis and display –Accomplished New, more efficient Trend Template matcher as monitor component –Partly Accomplished Maita system –Robust “complete” implementation (almost) –Demonstration on local data sources (accomplished) –Validation against sysadmins (not done) Preference  utility function compiler –Complete, numerous applications under way Analyses, refinements and papers

52Maita Final, Dec. 5, **Not for distribution** Transition Potentially transferable results: –Monitoring architecture –Languages of descriptions –Monitoring methods –Diagnostic methods –Learning of trend templates –Compilation of utilities –Visualizations Plans and Interest –Preference compiler Teknowledge interest Harvard/MIT HST program interest matching “Red Book” –Maita monitors NLM proposal for distributed clinical data sharing Potential commercial collaboration/transfer

53Maita Final, Dec. 5, **Not for distribution** Lessons Recognize as large systems problem –Distributed, secure, authenticated, dynamic, self- monitoring computing infrastructure Design and implement for robustness, generality Collaborate with others Recognize as large knowledge-based system problem –Need lots of knowledge –Systematic representation –Basic inference system as substrate

54Maita Final, Dec. 5, **Not for distribution** More Lessons Recognize as large HCI problem The total problem is unsolvable –Focus on limited goals –Collaborate with others Need good data for development and “formative” evaluation

55Maita Final, Dec. 5, **Not for distribution** Recent Publications 1.McGeachie, Michael, “Efficient Utility Functions for Ceteris Paribus Preferences”, AAAI Shrobe, Howard, “Computational Vulnerability Analysis for Information Survivability”, AAAI Long, William, Doyle, Jon, Burke, Glenn, and Szolovits, Peter, Detection of Intrusion across Multiple Sensors, submitted. 4.McGeachie, Michael and Doyle, Jon, “Utility Functions for Ceteris Paribus Preferences”, submitted. 5.Steven Bull, “Diagnostic Process Monitoring with Temporally Uncertain Models,” MIT EECS SM Thesis, May Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits, "Agile Monitoring for Cyber Defense", Second DARPA Information Survivability Conference and Exposition (DISCEX-II), Anaheim, California, June 12-14, Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits, "Event recognition beyond signature and anomaly", Second IEEE-SMC Information Assurance Workshop, West Point, New York, June 5-6,

56Maita Final, Dec. 5, **Not for distribution** Financial Status (12/5/2002) Total funds received = $1,987,403 Total funds expended = all* Remaining = $295,720 Depletion: ~9/30/2002 Total funding = $1,987,403 Total contract = $2,487,144 * possible return of disability

57Maita Final, Dec. 5, **Not for distribution** Current personnel Peter Szolovits Howie Shrobe Bill Long Glenn Burke Students: Delin Shen, Ying Zhang, Joe Hastings Fern DiOliveira Children’s Hospital: Isaac Kohane, Marco Ramoni