Download presentation
Presentation is loading. Please wait.
Published byMatilda Robertson Modified over 9 years ago
1
Copyright 2008. Beyond Intrusion Prevention and Detection – Intrusion Tolerance Arun Sood George Mason University International Cyber Center and Department of Computer Science http://cs.gmu.edu/~asood/scit 703.347.4494 Research supported by contracts from Lockheed Martin and Virginia Center for Innovative Technologies (partner: Northrop Grumman) ICC supported by Lockheed Martin and Booz Allen Hamilton Cyber Security and Global Affairs Workshop supported by Office of Naval Research
2
Copyright 2009 slide 2 285 million records compromised in 2008 [Verizon] Average per-incident data breach costs in 2007 were $6.3 million [Ponemon Institute] Enterprise Server Firewall Hacker (Actual Photo) Introducing a new paradigm for server security—Intrusion Tolerance The Problem
3
Copyright 2009 slide 3 Intrusion Tolerance allows malware and hackers into a server… Enterprise Server Firewall Hacker (Actual Photo) …but uses virtualization to restore the OS and application to a pristine state after attack! SCIT Virtual Server SCIT Virtual Partition Every 55 seconds SCIT software cleans and restores the virtual server to its pristine state The SCIT Solution
4
Copyright 2009 slide 4 Multi-National Security Breach http://news.bbc.co.uk/2/hi/technology/7118452.stm “A huge campaign to poison web searches and trick people into visiting malicious websites has been thwarted.” If a user searched Google for terms such as "hospice", "cotton gin and its effect on slavery", "infinity" and many more The first result pointed to a website from which malicious software was downloaded and embedded on user system. Criminals in country A created domains that were mostly bought by companies in country B and hosted in country C. Tens of thousands of domains were used. These domains tricked the indexing strategy of Google to believe that these web pages were good and reliable source of information. Targeted and organized attacks.
5
Copyright 2009 slide 5 Securing Servers Servers and endpoints have to be protected Verizon Data Breach Investigation shows that 99% of the compromised records were from servers A key step in these attacks was the installation of customized malware, which cannot be detected by current systems Current protection can take place at the network level and for important asset protection at the host level Intrusion Prevention Systems including Firewalls Intrusion Detection Systems: statistical, anomaly and behavior based White list and Black lists: IP addresses and software Intrusion Tolerance – intrusions will happen, focus on minimizing losses http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf Cross Sector Cyber Threats Strategy 5
6
Copyright 2009 slide 6 Multi layered Approach to Security IPS depend on inspection of incoming packets IDS depend on inspection of incoming and outgoing packets With increasing bandwidth and more matching requirements, the cycles devoted to packet inspection will keep increasing Threat independent approaches are needed for protection Other approaches should be included in the mix, including approaches that do not rely on packet inspection and have potential for threat independent performance: White list of software Time dependent intrusion tolerance Cross Sector Cyber Threats Strategy 6
7
Copyright 2009 slide 7 Key Intrusion Tolerance Approaches SITARMAFTIASCIT Detection BasedStructure BasedTime Dependent Payload InspectionYesNo Voting AlgorithmYes, used to detect faulty replica and survive attacks Yes, used to detect faulty replica and survive attacks. No DeterministicNo Yes Performance Impact Impact on response time. Some impact on computing cycles for starting a new server instance. Execution of ITS algorithm In Application Data Flow Out-of-band DiversityRequired Optional, but diversity will make scheme more robust RecoveryAdaptive recovery performed upon detecting intrusion detection. Performed upon detecting intrusion. Faulty replica recovered according to healthy ones. Periodic recovery performed by Controller, based on master copy.
8
Copyright 2008. Self Cleansing Intrusion Tolerance Next Generation Server Security Technology Infrastructure Servers Including those in DMZ Short Transactions Reduce Exposure Time
9
Copyright 2009 slide 9 Intrusion Tolerance Introducing SCIT, the Intrusion Tolerance System Optimizes application-specific exposure windows (AEW) Targets “overexposed” applications (transactions) Servers are sitting ducks Focus initially on Websites, DNS, Single Sign On Ongoing R&D Authentication (LDAP), Firewall Not targeted at applications with inherently long transaction times (FTP, VPN, etc) Leverages virtualization technology to reduce intrusion risk and costs Reduces exposure time to limit intrusion losses Adds time-based exposure control to intrusion prevention and detection solutions SCIT is based on a new paradigm, but is easy to integrate with existing systems New level of “Day-Zero” protection Increases security through real-time server rotation and cleansing: Enhances security of high availability systems Enables more flexible patch scheduling
10
Copyright 2009 slide 10 SCIT Software SCIT deploys on existing servers - does not require additional physical servers SCIT is cost effective, uses virtualization technology and increases system security SCIT does not interfere with existing IPS and IDS solutions SCIT is an additional layer of defense
11
Copyright 2009 slide 11 Anatomy of an Hack Foot print analysis Who is NSLookup Search Engines Enumeration Scanning Machines Ports Applications Exploitation Buffer Overflow Spoofing Password DOS Damage “Owning” IP Theft, Blackmail, Graffiti, Espoinage Destruction Analyze publicly available info. Set scope of attack and identify key targets Check for vulnerabilities on each target Attack targets using library of tools and techniques Foot print analysis Who is NSLookup Search Engines Enumeration Automated Scanning Machines Ports Applications Deliver Payload Custom Trojan Rootkit Damage “Owning” IP Theft, Blackmail, Graffiti, Espoinage Destruction Attack targets using installed software Richard Stiennon, May 2006, http://blogs.zdnet.com/threatchaos/?p=330 Manual Approach Automated Approach Identify Target Install Malicious Code Hack Other Machines Take over Domain Controller
12
Copyright 2009 slide 12 How Does SCIT Provide Additional Security? SCIT servers Regularly restored to a known state and remove malicious software installed by attackers. Provide protection while manufacturer is developing a patch, i.e. SCIT servers are protected in the time period between vulnerability detection and patch distribution. Gives data center managers an additional level of freedom in developing a systematic plan for patch management. SCIT DNS servers Domain name / IP address mapping is protected from malicious alteration, thus avoiding improper redirection of the traffic. SCIT Web servers Protect the corporate crown jewels, front ends for sensitive information, e.g. customer or employee data sets, IP, and informational web sites. Regularly restores the sites to known states, and makes it difficult for intruders to undertake harmful acts such as deleting files. Avoid long term defacements. Reduces the risk of large scale data ex-filtration.
13
Copyright 2009 slide 13 Comparison of IDS, IPS, IT IssueFirewall, IDS, IPSIntrusion tolerance Risk management.Reactive.Proactive. A priori information required. Attack models. Software vulnerabilities. Reaction rules. Exposure time selection. Length of longest transaction. Protection approach.Prevent all intrusions. Impossible to achieve. Limit losses. System Administrator workload. High. Manage reaction rules. Manage false alarms. Less. No false alarms generated. Design metric.Unspecified.Exposure time: Deterministic. Packet/Data stream monitoring. Required.Not required. Higher traffic volume requires. More computations.Computation volume unchanged. Applying patches.Must be applied immediately. Can be planned.
14
Copyright 2009 slide 14 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical
15
Copyright 2009 slide 15 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical
16
Copyright 2009 slide 16 Server Rotations Example: 5 online and 3 offline servers Server Rotation Offline servers; in self-cleansing Online servers; potentially compromised Servers -Virtual -Physical
17
Copyright 2009 slide 17 Server State Transitions
18
Copyright 2009 slide 18 Intrusion Tolerance Increase security by reducing exposure window Exposure window is the time a server is online between rotations Optimizes application-specific exposure windows to servers Decreasing available time for intrusion, reduces potential losses T T Cost
19
Copyright 2009 slide 19 Target Applications E-Commerce payments – long session of multiple short transactions Streaming media VPN Complex Database Queries Back end processing Transaction Length Long Short Low High Value for Exposure Window Management Web servers DNS services Single Sign On Firewalls Authentication (LDAP) Transaction Processors File Transfer (size dependent)
20
Copyright 2009 slide 20 Exposure Time Reductions ApplicationCurrent ServerSCIT Server Websites – Windows Server 1 day to 3 month60 seconds Websites – UNIX Server1 month to 6 months60 seconds DNS services – Linux Server 3 months to 1 year30 seconds In the following slides we show that: Reducing Exposure Time Significantly Reduces Expected Loss
21
Copyright 2009 slide 21 Security Risk Assessment Follows SecurityFocus.com (Symantec), Microsoft
22
Copyright 2009 slide 22 SCIT vs Traditional Cumm Single Loss Expectancy SCIT Exposure Time Reducing Exposure Time Significantly Reduces Expected Loss Multi Tier Architecture Web server DNS server Content Manager Database server
23
Copyright 2009 slide 23 Avoidance is Better Than Cleaning You cannot clean a compromised system by patching it. removing the back doors. using some vulnerability remover. using a virus scanner. reinstalling the operating system over the existing installation. You cannot trust any data copied from a compromised system. the event logs on a compromised system. your latest backup. The only proper way to clean a compromised system is to flatten and rebuild. CLEANING COMPROMISED SYSTEMS IS DIFFICULT. IT IS BETTER TO AVOID HACKING.
24
Copyright 2009 slide 24 Sample Requirements Met by SCIT Servers Web site should not be defaced longer than 1 minute DNS tables should be restored within 1 minute Security architecture should reduce data ex- filtration – SCIT server along with IDS will reduce the volume of data that can be maliciously retrieved To ensure clean servers, remove malware every minute Use diversity to change the face of the webserver every minute
25
Copyright 2009 slide 25 Performance & Functionality Stress Tests Workload: number of user sessions/minute (50,100,125) User session: Series of request and response from server Select item from drop down list and add it to persistent storage OpenSTA is used to generate workload 3 runs per case. Duration of run = 3 * Exposure time for the run each VM is tested at least once Workload consists of N requests every 10 secs. Exposure times of 2,3 and 4 minutes, No Rotation Stand alone web server for Non-SCIT test.
26
Copyright 2009 slide 26 Performance Test Results SCIT Server Environment Entry Level DELL System Dual processor – 4 cores each Memory: 4 GB Slackware OS Apache, Tomcat, Shopping Cart (Java) Exp Time (minutes) User Sessions Avg. Response Time (secs) STD Dev 2 m506.160.07 2 m1006.240.01 2 m1256.270.02 3 m506.100.04 3 m1006.150.02 3 m1256.310.05 4 m506.080.04 4 m1006.150.02 4 m1256.140.02 No Rotation506.030.01 No Rotation1006.030.00 No Rotation1256.040.00
27
Copyright 2009 slide 27 Response Times for Different Exposure Times
28
Copyright 2009 slide 28 Preliminary Performance Data Each user session includes a series of requests and responses. Average “think” time = 2 seconds between requests. Each session involves selecting an item from a drop down list and adding it into the persistent storage. Repeated 3 times. DEPEND 2009, June 09
29
Copyright 2009 slide 29 SCIT Parameters Copyright 2009 slide 29 Active window W o : server accepts requests from the network Grace period W g : server stops accepting new requests and fulfills outstanding requests in its queue. Exposure window: W = W o + W g. N total : total nodes in the cluster. N total, W, and the cleansing-time T cleansing are inter- related.
30
Copyright 2009 slide 30 SCIT State Transition Diagram Simple diagram. Pa: probability of successful attack. Pc: probability of cleansing when in A. F: low chance of occurrence, but still possible: Virtual machine and/or the host machine no longer responds to the Controller. Controller itself fails due to a hardware fault. Copyright 2009 slide 30 G: Good V: Vulnerable A: Successful Attack F: Failed GVAF G0100 V1–P a 0PaPa 0 APcPc 001-P c F0001
31
Copyright 2009 slide 31 MTTSF and W W ↓ → (P a ≤ 1 - e -λW ) ↓ W ↓ → (P c ≥ e -λW ) ↑ Then: W ↓ → MTTSF scit ↑ MTTSF SCIT ≥ F(W), where F(W) is a decreasing function of W: Significance: engineer instance of SCIT architecture by tuning W in order to increase or decrease the value of MTTSF SCIT. Copyright 2009 slide 31
32
Copyright 2009 slide 32 MTTSF and Grace Period Grace period used by Controller to issue cleansing mode signal. N outstanding : average # of outstanding requests in the queue when the server enters the grace period. Entire incoming traffic ̴ Poisson(α). It is known: λ = k.α, with k ≤ 1. N outstanding ≤ α W o. S: service rate in terms of number of serviced requests per unit time: W g = N outstanding /S ≤ (α W o ) / S Since α/S < 1, estimate for grace period: W g < W o. Then: control MTTSF SCIT by online window W o Copyright 2009 slide 32
33
Copyright 2009 slide 33 SCIT Research – Status & Future On-going for 6 years Supported by Army, NIST/CIPP, SUN, VA -CIT/NG, Lockheed Demos for SCIT Web, SSO, DNS Presentation, persistent, session Testing at corporate labs Mostly security driven Basic concept has been validated Malware automatically deleted every rotation cycle (about 1 minute) Automatic recovery from defacement every minute Ecommerce demo ( open source pet store software) No packet inspection: increased bandwidth does not impact performance Exposure time based - no false alarms generated Reduce managed services cost cs.gmu.edu/~asood/scit Pubs + 1 patent approved + 3 patents applied Video of demo on YouTube, MyDeo Scalability for enterprise environments Simulate a large server farm (v0) Sys admin interface for managing multiple servers (v0) Software tools to support deployment Randomized defense strategies Add diversity to SCIT Memory image, application, OS Add IP hopping to SCIT Distributed redundancy to achieve resilience DNSSEC requirements Extend to other apps / functions DNS cache poisoning, DNSSEC key protection, email, LDAP, long duration transactions Virtualization security: cloud Multifunction virtualized platform Performance degradation How to reduce exposure time Improve performance of SCIT Multiple cores (16 +); large memory Audit logs, monitoring, feedback 2009 plans Future Current Status
34
Copyright 2009 slide 34 Observations and Thoughts Specifying security without a time framework is very hard It is easier to assess risk for proactive systems as compared to reactive systems Threat independent protection is critical Protect while patches are being developed We need easy to understand metrics and / or benchmarks SCIT makes it harder for intruder, but how much harder? Cost vs hardening assessment
35
Copyright 2009 slide 35 Conclusion SCIT significantly reduces risk levels for targeted application using virtualization technology Augments existing IPS and IDS solutions – another layer of defense – no interference Completed SCIT web server and SSO server, SCIT DNS server in Q4 Research issues: long duration transactions, randomized defensive strategies, scalability, functionality under load, “penetration” testing, other servers (e.g. email)
36
Copyright 2009 slide 36 SCIT Publications + Contact Info SCIT technical publications Links to media reports Links to demo videos Links to demo videos http://cs.gmu.edu/~asood/scit Questions? Arun Sood asood@gmu.edu 703.347.4494
37
Copyright 2009 slide 37 Questions SCIT goal is to make it harder for an intruder to do damage. We need a way to say that by having an exposure time of X the task will become Y times harder. Are there ways of assessing this without the use of red teams? What is a good enough exposure time? What metrics and benchmarks are more meaningful to decision makers? Given limited knowledge of future attack methodologies, how does one justify a multi-layered security architecture? Can SCIT simplify the constraints on IDS and thus reduce false alarms?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.