A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab.

Slides:



Advertisements
Similar presentations
Brief-out: Isolation Working Group Topic discussion leader: Ken Birman.
Advertisements

TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
Operating System Security
Tamper Resistant Software An Implementation By David Aucsmith, IAL “This paper describes a technology for the construction of tamper resistant software.”
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Alternate Software Development Methodologies
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
SPECIFYING AND MONITORING GUARANTEES IN COMMERCIAL GRIDS THROUGH SLA Sven Graupner Vijay MachirajuAad van Moorsel IEEE/ACM International Symposium on Clustering.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Consistency of Assessment
OASIS Reference Model for Service Oriented Architecture 1.0
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Analysis Concepts and Principle.
© Copyright Eliyahu Brutman Programming Techniques Course.
(Geneva, Switzerland, September 2014)
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Purpose of the Standards
Configuration Management
T HE NATURE OF QUALITATIVE RESEARCH Gordana Velickovska Guest Professor Centre for Social Sciences.
Domain-Specific Software Engineering Alex Adamec.
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
The chapter will address the following questions:
Chapter 2 The process Process, Methods, and Tools
SWE 316: Software Design and Architecture – Dr. Khalid Aljasser Objectives Lecture 11 : Frameworks SWE 316: Software Design and Architecture  To understand.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Science of Security Experimentation John McHugh, Dalhousie University Jennifer Bayuk, Jennifer L Bayuk LLC Minaxi Gupta, Indiana University Roy Maxion,
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
The Architecture of Secure Systems Jim Alves-Foss Laboratory for Applied Logic Department of Computer Science University of Idaho By, Nagaashwini Katta.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
TIED: A Cluster of One. TIED: Trial Integration Environment DETER The DETER folks: Terry Benzel, Bob Braden, Ted Faber, John Hickey, Alefiya Hussain,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Methodology - Conceptual Database Design
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
Refining middleware functions for verification purpose Jérôme Hugues Laurent Pautet Fabrice Kordon
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Writing Systems Software in a Functional Language An Experience Report Iavor Diatchki, Thomas Hallgren, Mark Jones, Rebekah Leslie, Andrew Tolmach.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
CIS 112 Exam Review. Exam Content 100 questions valued at 1 point each 100 questions valued at 1 point each 100 points total 100 points total 10 each.
By Germaine Cheung Hong Kong Computer Institute
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
© 2006 Pearson Addison-Wesley. All rights reserved 2-1 Chapter 2 Principles of Programming & Software Engineering.
Security Vulnerabilities in A Virtual Environment
® IBM Software Group © 2009 IBM Corporation Essentials of Modeling with the IBM Rational Software Architect, V7.5 Module 15: Traceability and Static Analysis.
Process Asad Ur Rehman Chief Technology Officer Feditec Enterprise.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
Aspect Oriented Security Tim Hollebeek, Ph.D.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
Bringing Diversity into Impact Evaluation: Towards a Broadened View of Design and Methods for Impact Evaluation Sanjeev Sridharan.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Session 1: Technology Development August 15 NSF Workshop.
CHESS Methodology and Tool Federico Ciccozzi MBEES Meeting Sälen, January 2011 January 2011.
TMG Client Protection 6NPS – Session 7.
CompSci 280 S Introduction to Software Development
The GEMBus Architecture and Core Components
TechStambha PMP Certification Training
Distribution and components
IT 440: SYSTEM INTEGRATION
Security in Networking
Automatic Derivation, Integration and Verification
NSA Security-Enhanced Linux (SELinux)
Presentation transcript:

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab

Risky CyberSecurity Research CyberSecurity systems becoming more complex and widely deployed Complexity and scale breed threats Experimentation as a research tool must include these features and the threats against them malware botnets dangerous network conditions Goal: system to conduct risky experiments without harming infrastructure (testbeds, users, Internet)‏

Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity experiments: Testing malware behavior in the large “Active Defense” research – embedding code New defenses/new attacks – tailored malware All of them need to be controlled and monitored Shift from “Malware Containment”  “Risky Experiment Management”

Problem formulation “Classical Formulation” Focus on isolation De facto emphasis of much testbed work No bad stuff Bad stuff Containment Boundary

Problem formulation More accurate formulation Key issue: Moving from “isolation and containment” to “understanding and assurance” World Experiment Controlled interaction with outside environment Experiment Control Observation and monitoring

Model Two-stage approach: Unconstrained malware / experiment behavior Constrained malware / experiment behavior Assured / constrained external behavior Malware / Experiment behavior constraint transform: T1 Testbed behavior constraint transform: T2 Behavioral composition model: External behavior == T2(T1(experiment))‏

The Power of Two Stages Separation of concerns: Experimenter best equipped to understand impact of constraints on experiment validity - express T1 for experimenters Testbed designer best equipped to understand impact of constraints on testbed and external behavior - express T2 for testbed designers/implementors Each player speaks their own language Compositional Power Constraints are synergistic, not additive Composition of constraints in different domains yields expressiveness and power

Practical Effects Simplified experiment design, increased reusability Defined T1 “invariants” (experiment constraints) simplify design of experiments with known external properties Increased assurance verifiability T2 (testbed) constraints used for many experiments can be extensively tested Behavior of T2(T1()) may be subject to formal analysis Richer function Simplifies reasoning about a wider range of desired behaviors Simplifies tradeoff between different experimenter goals

A (pedagogical) example T1: worm code constrained* to commit suicide if it does not receive a heartbeat msg from specific sender every 30 seconds T2: heartbeat msg blocked from leaving testbed facility T2(T1(experiment)): worm dies if it leaves the testbed *we’ll get to how later

Example - part 2 Problem: very fast-acting worm might still spread far within 30 second constraint. T1': worm propagates once per heartbeat message T2(T1'(exp)): worm dies in < 1 generation if outside testbed zone Key question: does the message rate limit affect the experiment? It depends. That’s a good thing! Feature: constraints are explicit and tailorable

Constraint sets Constraint sets are Pre-established sets of T1/T2 constraints Tuned for classes of experiments: Design Patterns To be useful, a constraint set must be Useful to the experimenter Some set of interesting experiments must execute correctly within the given constraints Useful to the testbed designer The given constraints must allow the testbed designer to ensure a desired set of external behaviors Implementable Have to be able to ensure that the experiment actually meets the given T1 constraints.

Constraint Sets and Usability All sets meet assurance goals Provide a usability scale Unconstrained malware / experiment behavior Constrained malware / experiment behavior Assured / constrained external behavior Very weak T1 constraints Very strong T2 restrictions Complex locked down experiment Stronger T1 constraints Weaker T2 restrictions Simpler, more flexible experiment Strongest T1 constraints Weakest T2 restrictions Simplest, richest experiment

Implementing T1 constraints Q1: What is the basis of the constraint? Belief Verification Audit Enforcement Q2: How might T1 constraints be enforced? Wrapping Code modification Emulation Auditing Key question: can enforced T1 constraints be implemented in a practical system?

Implementation Plans: Environment DETER Testbed USC/ISI-created/operated, Emulab-based, NSF/DHS-funded testbed Collection of CyberSecurity experiment management tools Community of experimenters and expertise in CyberSecurity More information:

Implementation Scope Representative but restricted risky behavior Malware Disruptive behavior: e.g. DDoS Access to external sites Categorized Risks Malware disrupts later experiments Experiment disrupts testbed infrastrusture Experiment disrupts or infects outside world

Implementation Methodology Implement testbed constraint sets Directed toward identified risk domains Tight design loop with users Experimenters select from these implementations Testbed monitors and enforces their use

Composition in Our Implementation T1 constraint: mark risky traffic Malware experiment: propagation messages marked DDoS experiment: attack (flood) traffic is marked T2 constraint options Marked packets blocked Malware propagation prevented Marked packets rate-limited DDoS Attack defanged Two constraint sets Appropriate constraint set manages risk

Conclusions Containment to Management Enhances flexibility Enables usability Two-level constraint model Separates concerns Makes constraints explicit Implementation to try these ideas out

Nature of the approach Not an answer, but a tradeoff space Analogy to biological laboratories Very strong containment (level 4)‏ Very complex lab Very complex experimental protocol Very high experimenter hassle …and vice versa (level 1)‏ Proper experiment in proper lab Experimenters follow appropriate protocols Testbed requirements and protections tied to risk levels

Nature of approach (analogy limits)‏ CyberSecurity testbeds are not Bio-labs because: Understanding and assurance different from containment Multi-dimensional problem space CyberSecurity has more attack vectors Facility is more open: convenience matters More dimensions, more researchers Experimenters cannot specialize in testbed protocol CyberSecurity experimenters cooperate in establishing as well as following experimental protocol

Beyond Implementation Developing REALM: language for expressing risk Creating REALM-based tools to: Describe risk of new experiments Apply T1 constraints to experiments Request T2 constraints on experiments Integrate these tools with DETER's experiment management system: SEER

Diversion: A challenging alternative It may be [in some cases, “is”] possible to reason formally about the overall behavior of the T2(T1)exp)) system. This might allow fine grain, possibly automatic derivation of experiment (T1) and testbed configuration (T2) constraints to limit a particular experiment’s potential external behavior without damaging its experimental value Such a tool would provide a highly general facility for limiting the risk of risky experiments

T1 constraint scope What is the scope over which a T1 constraint might be specified? A single thread/process/ host/virus/worm instance? Some larger region? Problem and opportunity: Composite behavior of multiple malware instances is not the same as a single instance Looks a bit like federation Looks a bit more like “classical” containment architecture May preserve some desirable properties of full model separation of concerns Modularity and defined intermediate behaviors Exp. T1 Eval and control, T2 Rest of World

Further agenda Motivating examples and applicability/fit with two-stage model (Monday AM)‏ Ted, Jelena, Calvin Overall model (Monday AM/PM)‏ Explore its value Learn better how to explain it.. Cliff.. Specifics and details (Monday PM)‏ Previous/early implementation approaches - Ron, Kevin Constraint enforcement and validation mechanisms Useful constraint sets Useful external property sets Protective attributes Porosity attributes Federation, the two-stage model, and risky experiments (Tues AM)‏ Federation work progress and results Possible relationship to risky experiment problem Ted, Keith, Arun(?)‏