Enterprise Wrappers OASIS PI Meeting Feb. 15, 2001 Mark Feldman Lee ftp://ftp.tislabs.com/pub/wrappers.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

J-Interop Open Source Java COM Bridge. Contents What is it ? Comparison with Java Native interface Comparison with J-Integra® for COM Benefits of using.
A Cooperative Approach to Support Software Deployment Using the Software Dock by R. Hall, D. Heimbigner, A. Wolf Sachin Chouksey Ebru Dincel.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Federal Student Aid Technical Architecture Initiatives Sandy England
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
02/12/00 E-Business Architecture
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
CS533 Concepts of Operating Systems Class 14 Virtualization.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Understanding Active Directory
Phu H. Phung Chalmers University of Technology JSTools’ 12 June 13, 2012, Beijing, China Joint work with Lieven Desmet (KU Leuven)
Emmanuel Cecchet et al.  Performance Scalability of J2EE application servers.  Test effect of: ◦ Application Implementation Methods ◦ Container Design.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
BMC Software confidential. BMC Performance Manager Will Brown.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
Integrity Through Mediated Interfaces PI Meeting: Feb 22-23, 2000 Bob Balzer Information Sciences Institute Legend: Changes from previous.
An Introduction to Software Architecture
CHAPTER FOUR COMPUTER SOFTWARE.
Introduction to Interactive Media Interactive Media Tools: Software.
第十四章 J2EE 入门 Introduction What is J2EE ?
The Grid Component Model: an Overview “Proposal for a Grid Component Model” DPM02 “Basic Features of the Grid Component Model (assessed)” -- DPM04 CoreGrid.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
PARMON A Comprehensive Cluster Monitoring System A Single System Image Case Study Developer: PARMON Team Centre for Development of Advanced Computing,
Enterprise Wrappers OASIS PI Meeting July 24, 2001 Bob Balzer Neil
© Copyright 2009 Sysgem AG, 8002 Zurich, Switzerland Sysgem Products Sysgem Enterprise Manager (SEM)  Identity & Access Management  System Management.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
Chapter 2 Operating System Overview
Windows XP. History Windows XP is based on the NT kernel developed in 1988 Windows XP is based on the NT kernel developed in 1988 XP was originally sold.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
1 Mobility Support by the Common API for Transparent Hybrid Multicast draft-irtf-samrg-common-api-03 Project Matthias Wählisch,
 Repository Model  Client-Server Model  Layered Model  Modular decomposition styles  Object Models  Function Oriented Pipelining  Control Styles.
SCALABLE EVOLUTION OF HIGHLY AVAILABLE SYSTEMS BY ABHISHEK ASOKAN 8/6/2004.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Integrity Through Mediated Interfaces PI Meeting: July 19-21, 2000 Bob Balzer Teknowledge Legend: Turquoise Changes from July 99.
System/SDWG Update Management Council Face-to-Face Flagstaff, AZ August 22-23, 2011 Sean Hardman.
Enterprise Wrappers OASIS PI Meeting August 19, 2002 Bob Balzer Neil Legend: Green Changes from February 02 PI meeting.
Integrity Through Mediated Interfaces PI Meeting July 24, 2001 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from July99.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Integrity Through Mediated Interfaces PI Meeting August 19, 2002 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from.
February 1999T. Haupt, DATORR meeting1 Gateway System New Generation of WebFlow.
Enterprise Wrappers OASIS PI Meeting March 12, 2002 Bob Balzer Neil Goldman Mahindra
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Enterprise Enterprise Wrappers for Information Assurance DARPA/SPAWAR Contract N66001-C-8023 Mark Feldman, Wayne Salamon, Steve Kiernan, John Axisa NAI.
Computer System Structures
TrueSight Operations Management 11.0 Architecture
The Open Grid Service Architecture (OGSA) Standard for Grid Computing
Consulting Services JobScheduler Architecture Decision Template
Chapter 3: Windows7 Part 1.
Mark Feldman, Lee Badger, Steve Kiernan, Larry Spector,
Chapter 19: Building Systems with Assurance
Outline Operating System Organization Operating System Examples
Presentation transcript:

Enterprise Wrappers OASIS PI Meeting Feb. 15, 2001 Mark Feldman Lee ftp://ftp.tislabs.com/pub/wrappers

A Parallel, Collaborative Effort Using Previous DARPA Research Prototypes as a Base Teknowledge: Windows NT/2000 NAI Labs: Multi-Platform, concentrating on Linux under this program ftp://ftp.tislabs.com/pub/wrappers

Previous, Host-Based Prototype Design Goals Augment, Transform, Deny all interactions between COTS applications and resources on a COTS system (syscall interface on UNIX, DLLs on NT). High level of abstraction to remove ugliness of kernel or DLL API programming. Elegant, powerful language and environment Portability Non-bypassability

Existing UNIX Prototype FreeBSD, Solaris 2.6, Linux 2.2.x, Windows NT About 50K lines of (commented) C, Yacc, Lex, and Java. Now under the GNU GPL! Download it at: ftp://ftp.tislabs.com/pub/wrappers Wrapper Specifications in WDL Program OS Kernel External API Internal API Wrapper Enforcement Layer Program Wrapper GUI “DBMS” W1 W2 … Wn Dynamic OS Kernel Module

Accomplishments to Date Validation of hypothesis: practical security-enforcing wrappers can be added to broad-market COTS components with high performance, compatibility, portability. Numerous wrappers implemented: –administrative privilege control, synthetic execution environment, diagnostics, access control... –Suite of intrusion-detection wrappers. –Collection of intrusion-response wrappers. –Napoleon policy-enforcement wrapper. Available on systems of greatest impact. ftp://ftp.tislabs.com/pub/wrappers

Enterprise Wrappers Goals  Integrate host-based wrappers into scalable cyber- defense system  Create common, multi-platform, policy-enforcing infrastructure  Populate this infrastructure with useful monitors, authorizers, and controllers  Dynamically ensure a consistent, enterprise-wide policy “Scaling the power of the wrapper to the enterprise”

Enterprise Wrappers Objectives NWM Network Schema & Data Hardened System “Soft” System Manager Interface Other IA components, such as intrusion detection, sniffers, secure DNS, IDIP, etc. Boundary Controller... service WMI proxy Control Protocol Data Push/Pull Wrapper Network Interface –Off-board cyber-defense controllers –Off-board communication of wrapper data Host Controller –Manages dynamic insertion and removal of Wrappers –Multi-platform (Linux and NT) –Network-scalable Mutual protection/isolation of Host Controller & Wrappers from the system(s) being protected Linux or NT Wrapper Subsystem Data Base Hardened System(expanded) Host Controller M M M M MediationCocoon App M M M M MediationCocoon App

Integrating Enterprise Wrappers into 3GS Architecture Sense Detect Arbitrate Respond Wrapper i Wrapper Integration Modularize into SD,A,R Alerts Out Response Action Out Event access to modules Wrapper Policy Wrapper Policy Protocol Protocol for Arbitrate substitution Arbitrate Host Controller Wrapping Policy Off-BoardOn-Board Host Controller Integration Wrapping Policy Protocol Respond Wrapper Installer

Enterprise Wrapper APIs Enterprise lifecycle scales from host-based lifecycle. Deployed Deploy Installed Install Active Activate Sensed Deactivate Defined UndeployUninstall Define Focus Conceptual

InstalledDefined Enterprise Wrapper APIs Legend: Generates new instance of target state machine Destroys current instance of source state machine DeployedInstalledActiveDefined DeployInstallActivate UndeployUninstallDeactivate (Wrapper Def.) (Host) (Exec. Inst.) Define Sensed Focus

UNIX Wrapper Adapter Wrapper Policy Definition –Compiled WDL program (the wrapper) –Activation Criteria –Database contents for data-driven behavior Interfaces with existing API to allow secure, remote administration Provide publish/subscribe (pull) and push model for all wrapper data (wrappers, alerts, data)

Base Task: Options: Months after Project Start Option 3 Option 4 Option 5 Option 6 Option 7 Option 8 Option 9 Option 10 Option 11 Option 12 Option 13 Option 14 Option 1 Option 2 Task 1 Task 2 Host Controller Enterprise Wrapper Infrastructure Privilege Control Wrapper Program Sandboxing Wrapper Controlled Execution Wrapper Spec. Based Intrusion Detection Wrapper Synthetic Execution Environment Wrapper Windows NT Stand-Alone Wrapper Crypto. Resource Protection Wrapper Untrusted Wrapper Protection Intrusion Detection Response Wrapper Authentication Wrapper Integrity Labels Wrapper Host Boundary Controller Composition Safety Analysis Network Shield Controller Prototype Untrusted Wrapper Protection Network Wrapper Manager Project Milestones /12/00

Recent Work Development of common API Modularity of our LKM to provide –Composability with other LKMs under Linux that intercept system calls –Use of our “database” to other LKMs

Questions? ftp://ftp.tislabs.com/pub/wrappers Final Thought