Download presentation
Presentation is loading. Please wait.
Published byErin Day Modified over 9 years ago
1
The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System Reconfiguration
2
2 The Willow Team University of Colorado: Alexander Wolf, Dennis Heimbigner, Antonio Carzaniga Naveed Arshad, Marco Castaldi, John Giacomoni Nathan Ryan University of Virginia: John Knight, Jonathan Hill, Mike Tashbook, Phil Varner University of CA, Davis: Prem Devanbu, Michael Gertz, Brian Toone
3
3 Aspects of Intrusion Tolerance Very Large Networks Interdependent Networks Heterogeneous Nodes Explicit Sense/Analyze/Respond Non-Local Faults Sequential Faults
4
4 Network Sensors Actuators Network State &Analysis Model Self Healing Tolerate Anticipated Faults Planned Posture Change System Update System Deployment External Input Dimensions of Intrusion Tolerance Secure & Decentralized Logical Structure
5
5 Interesting Scenario Very large network, crucial services Many OASIS elements operational in system System software upgrade underway (or your stuff) Several (<10) servers report e-mail with viruses: Safely stop system software upgrade Isolate local networks containing affected nodes E-mail attack worsens, wide area affected: Safely stop local isolation process (no point) Isolate critical databases, stop some applications Etc.
6
6 Willow Architectural Issues Control loop interactions: Asynchronous Priority & resources Conflicting goals Network scale: State model Wide area change Exceptions and results: Dynamic network Absolute vs. statistical Aggregation? Target system actuation: Lightweight Standard interface & protocol Network Sensors Actuators Network State &Analysis Model Self Healing Tolerate Anticipated Faults Planned Posture Change System Update System Deployment External Input
7
7 Implementation Overview Coordination Management Proactive Reconfiguration Reactive Reconfiguration Other E.g., Offense Network Siena P/S Actuation External Entities Mediators Sensing
8
8 Implementation Overview Coordination Management Proactive Reconfiguration Reactive Reconfiguration Other E.g., Offense Network Siena P/S Actuation External Entities Mediators Sensing
9
9 Coordination Management Approach Hierarchical workflows Priorities Intention counsel (council?) Site-selective communication Distributed agent structure (Cougaar) Payload delivery
10
10 Cougaar Agent Structure PI Plan Asset (Attributes) Society (Abstract Child) Organizational (Abstract Child) Task Blackboard Pub/sub System
11
11 Willow Implementation Plug Ins Site selective command Work request receiver Resource allocation Intention counseling Payload delivery Payload support services
12
12 Willow Architecture Agents Wide Area Domain Local Area Domain Network Nodes
13
13 Site-Selective Command 1 2 payload 2 2 1 2
14
14 An Intrusion Tolerance Example Intention:=StopPropagatingVirus.StopEmailVirus At:=LAN(10<=emailVirusAlerts<=5 0000) AND NetworkNode(any) AND EmailServer(active) At:=WAN(any) Actuators shut down server Intention:=Parent+DisableCapability (Email).ShutdownServer Intention:=Parent+ReduceCapabil ity(Email).DisableAttachments At:=NetworkNode(administrator =false) AND EmailCient(active) Actuators disable attachments
15
15 An Intrusion Tolerance Example WAN LAN Network Nodes Email Clients and Servers Network Nodes
16
16 Example of Intention Council Intentions are compounded from most general to most specific intentions in layers (forced by specification) Halt_Intrusions(Buffer).Uninstalling_Application(Excel) (Priority 7.1) Countermeasure(VirusInfected,Containment).Activate(TrapDoorExcel) (Priority 8.2) Repair_Application(Excel) Finite state machine with the following rule: Do not repair applications that are recently uninstalled Do not finish repairs of applications that are to be uninstalled Excel repair is cancelled if it is scheduled later, and is aborted/cancelled if it activated prior to arrival of the uninstall.
17
17 Implementation Overview Coordination, Resource Management Proactive Reconfiguration Reactive Reconfiguration Other E.g., Offense Network Siena P/S Actuation External Entities Mediators Sensing
18
18 Light-Weight Actuator Interface Goals Remote management of applications and components Specifically to actuate reconfigurations Light-weight mechanism capable of using new or existing mechanisms Approach Define a standardized interface for managing a single component or application Coordinated actuation for multiple components Based on a simple and general protocol Minimal component support required Implemented by the managed component Architecture-based vs ad hoc
19
19 Dynamic Reconfiguration Single Component Reconfiguration Application Reconfiguration ? ? ?
20
20 Protocol System inspired by Network Management (SNMP) Manipulation of “variables” to achieve effects Get – determine component state Set – set state; side effect can cause reconfiguration Call – combination of set/get to achieve function calls Notify – asynchronous output from component These variables are specified in a Component Description (similar to a MIB) The developer defines and “exports” the variables
21
21 Light-Weight Actuator Architecture Component Agent: per-component code that manages component-specific reconfiguration mechanisms Implementation: in-component, wrapper, separate process Application Agent: per-application code that coordinates and delegates component-level reconfiguration Manager: the interface with the reconfiguration decision maker (automatic or manual) Application Agent Management Protocol Comp Description Manager Comp Component Agent Application Description Management Protocol
22
22 Field Reconfiguration Controller Configured Components Activated System Activated System Notification Service Models Agents Models Agents Configured Components Reconfiguration control and/or data channel Event channel Application control and/or data channel Component activation Component deactivation Standard reconfiguration interface Mediator + Authority Depot Models Agents Components Mediator Field Reconfiguration Controller Mediator Admin. Workbench Workflow Manager Recovery FSMs Willow Architecture
23
23 Example Component Based Application A A A A A A A A Application Agent Manager Willow Field Reconfiguration Controller (FRC)
24
24 Benefits of this Architecture General The system is independent with respect to applications, operating systems,... Component/Application Descriptions and Management Protocol specification allow interoperability with other management systems Scalable Agents can be composed hierarchically E.g., Treat whole application as “component” Manager coordinates and uses component-level agent to perform dynamic reconfiguration at the application level
25
25 Status Initial target application: Joint Battlespace Infosphere (JBI) tracking demonstration Disseminators (Siena publish/subscribe servers) now reconfigure using standard interface Next target: all fuselets comprising our JBI tracking demonstration Prototype Manager and Application Agents implemented Next step: J2EE reconfiguration
26
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.