Title: Intrusion Management Using Architecture and Configuration Models.
1Intrusion ManagementUsingArchitecture and
Configuration Models.
- Dennis Heimbigner
- University of Colorado at Boulder
- http//www.cs.colorado.edu/users/dennis
- http//www.cs.colorado.edu/serl
2Background Willow Project
- Goal Survive intrusions and other faults
- Continue sufficient level of service in the
face of unintended and malicious disruptions - analogy load shedding in national power grid
- System context
- Large-scale, heterogeneous, and distributed
- Component-based and evolving
- Interdependent
- E.g. Banking and
- Telecomm
3Primary Tool Reconfiguration
- Any and all planned changes applied to the
communication, interconnection, componentization,
and functionality of a system
4High-Level Research Hypotheses
- Reconfiguration in an assured, secure, and
automated fashion is a powerful approach to
surviving non-maskable service disruptions - Automated reconfiguration can react to
disruptions with a speed, accuracy, and scale not
achievable by manual procedures - Reconfiguration can proactively protect against
threats and reactively recover from disruptions
5Role of Models in Willow
- All phases of reconfiguration are driven by
architectural models of the distributed system - Survivability Analysis
- Driven by a coarse architecture model in Zed
- (Re-)Configuration
- Driven by models of system families (variants)
and executing systems
6Extending Willow Approach
- Hypothesis configurable architecture models
- Can provide a common framework for organizing and
integrating all phases of defending against
intrusions - Can provide a framework around which to organize
existing data - Goal extend Willows capabilities to support
more than just intrusion response - Complement, not replace
- Willow focus is on software systems not hosts or
networks (but cant ignore them)
7Intrusion Management Life Cycle
- Define the steps for handling intrusions
- From initial attack to final prevention
- From the defenders point of view
- Not an attack model (but related)
- Goal is to provide a theme for integrating
existing intrusion management components
8Intrusion Management Life Cycle
Detect
Intrusion Detection
Repel
Firewall, Re-posturing
Warn
Repair
Reconfiguration, Tripwire,...
Analyze
Forensics
Prevent
Patch,Deploy
Willow
- Response process
9What is Architecture?
- The architecture of a system represents the
components of the system and the interconnections
and dependencies between those components - Defined in terms of elements appropriate to the
models level - For e.g. deployment - it is the set of files
(code and data) comprising the system - For e.g. runtime - it is the set of executable
components plus various properties (e.g. ports)
plus interconnections
10What is Configuration?
- A system family represents the possible versions
and variants of the architecture of the system - Version revisions of the system architecture
over time - Variant range of alternative architectures for
any version - Configuration
- Process of choosing a specific family instance
- Properties that determine that instance
- Orthogonal to Architecture models
11Configuration Process
- We have a specific configuration process
- From Software Dock via Willow
12Model Sources
- Goal Maximum reuse of existing models
- Following slides are not intended to be exhaustive
13Model Sources (cont.)
- Software Engineering architecture models
- Target component level architecture
- Sources UCI (x)ADL, CMU (x)ARCH
- Model elements
- Components, Ports/Interfaces, Connectors,
Constraints, Dependencies
14Model Sources (cont.)
- Deployable Software Description (DSD)
- Target deployment of artifacts
- Source Colorado Software Dock project
- Model elements
- properties (internal, external), assertions,
dependencies, artifacts, processes
15Model Sources (cont.)
- Common Information Model (CIM)
- Target Host environment (limited) software
system architecture - Source Desktop Management Task Force (DMTF)
- Model elements
- Complex class structure
16Model Sources (cont.)
- Autoconfig
- Target Host environment
- Source FSF
- Model elements
- No declarative model as such
- Procedures for interrogating host environment
- Source of raw data
17Model Sources (cont.)
- Simple Network Management Protocol
- Management Information Bases (MIBs)
- Target Device and software system properties
- Source IETF
- Model elements
- Tree of properties with single or sequences of
values - Too primitive to be more than source of raw data
18Architectural Model Classification
- System Model
- Represents the structure and properties of the
software system to be configured - May be multi-part to cover distributed systems
- Environment Model
- Represents the structure and properties of the
site in which systems operate - E.g., OS, hardware, etc
- Think autoconfig but more sophisticated
19Architecture Sub-Models
- System Model
- I Family
- II Deployment
- III Activation
- Environment Model
- I Host
- II Network
- III Administration
20System Model I Family
- Model the range of legal configurations of a
software system - More or less a product-line description
- Basis DSDxADLCIM
- Technically includes all other system models
21System Model II Deployment
- Model the chosen configuration
- with respect to some environment
- Defines installed artifacts
- Derived by choosing a specific family instance
from family model - Basis Software Dock internal model
22System Model III Activation
- Model the running system
- E.g., the actual number of clients and servers
and their connections over time - with respect to some environment
- Define startup/shutdown dependencies
- Derived from deployment model architecture
model for running system - Basis xADL
23Environment Model I Host
- Lowest level of granularity in environment model
OS, hardware - Basis SNMP autoconfig CIM
- Not (currently) target for Willow reconfiguration
24Environment Model II Network
- Interconnections of hosts plus properties of the
whole network. - Strong overlap with existing network manager
(e.g. HP OpenView) - Basis SNMP
- OpenView models proprietary?
- Not (currently) target for Willow reconfiguration
25Environment Model III Administrative
- Security and administrative overlay on the hosts
and network - Administrative domains
- Firewall boundaries
- Overlays other environment models
- Basis unknown
- Not (currently) target for Willow reconfiguration
26Applying Models to Intrusion Life Cycle
- Examine the roles that the identified models can
play in the steps of the Intrusion Management
Life Cycle
27Intrusion Detection
- Most IDS operate at low level of detail
- e.g. packets
- That is where the big payoff occurs
- Specification-based IDS is closer to our level
- Primarily watches behavior of software systems
- at the level of e.g. system calls
- complementary to architecture models
- Architecture is framework for behavior info
- Reconfigure target system to include intrusion
sensors - Manage IDS system itself (HiDRA project)
- E.g., sensor deployment
28Intrusion Repelling
- Firewall rule changes are common means for
repelling attacks - Reconfigure to temporarily add/drop/modify
functionality - This is Willow approach
- No free lunch repelling costs resources
29Intrusion Warning
- Notify others of progress of this domain through
the life cycle - when intrusion is detected
- the local administrator
- other systems (networks, hosts, etc)
- when a repel or repair is successful
- Naively, there appears room for research here
- What happened to CDIF and its successors?
30Intrusion Repair
- Determine state of the compromised system
- Restart components
- From trusted sources
- State repair is hard
- Requires careful checkpointing
31Intrusion Analysis Forensics
- Current forensic tools are fairly low level
- Architecture model provides a high level
framework for structuring the raw data produced
by e.g. core dumps - Allow an analyst to look for anomalies at the
level of the architecture - Automated Support
- Much of the initial mapping of the core-dump to
the architecture can be automated - Conversations with Rome Labs indicate movement in
this direction
32Intrusion Prevention
- Analysis can identify the nature of the attack
- This enables the development of mechanisms for
mitigating future attacks of this type - Patches - require deployment to all affected
systems (including running instances) - General reconfiguration
33Issues
- Analysis of models
- For what? When (online vs offline)?
- Fidelity between running system and the models
- Ability of ADL or ARCH to model running systems
- State management
- Attacks on infrastructure
- Need common representation for all models
- RDF, DAML/OIL, CIM
34Next Steps
- Complete our models for Willow
- Integrate models
- Explore architecture-based IDS
- UC Davis help would be invaluable here
- Explore architecture-based forensics system
- Again, need partner with forensics expertise
- Provide an integrated intrusion management
infrastructure IDS Willow Forensics - Hard
- Longer term
35CU - UC Davis Collaboration Opportunity
- I see strong synergy with Karls proposal of last
week - Willow would provide strong candidate for
- the intrusion control actuation system
- Automated installation and maintenance system
- Willow provides one possible way to respond to
intrusions - Complementary to other approachs
- We currently dont do detection or forensics
- If there is interest, contact me
36Willow - UC Davis Synergy
37BACKGROUND SLIDES
38Approach regional intrusion control actuation
- Regional CoA Playbooks are predefined to respond
to single or multi-domain threats - Playbooks consists of one or more response
primitives - Automated CoA selection will employ regional CoA
playbooks in response to multi-enterprise threats - Advance research will pursue automated playbook
formulation - Synchronization of regional intrusion control
systems will resolve CoA conflicts and overkill
Example Actuator eResponder Primitives 1.
diagnose. For diagnosing, and possibly
restarting critical services or for filesystem
exhaustion handling. Â 2. lockout. For locking
out a user account via password disabling.
Usually used right before a killall (sometime
kill, as in non-anon FTP stuff). 3.
killall. For killing all processes owned by a
user. Â 4. kill. For killing a user session and
subprocesses. Â 5. checkcfg For Oki purposes.
Informative only. No response necessary. Â 6.
fixperms for performing chmod and chown. Â 7.
filter for firewall response directives. Â 8.
notify for forwarding notification to a
non-admin user that his/her data may have been
subject to some misuse attempt. Â 9. reset
provides information needed for a response engine
to sever malicious TCP connection via TCP reset.
This directive reports information from an
observed packet in the connection. The response
agent will use this information to craft a set of
RST packets so that one will be accepted by the
target (see RFC 793). Â 10. recovered provides
information that a diagnosed service failure has
recovered. Â 11. targeted provides information
that services have been the target of a probe
Regional Intrusion Control
INFOSEC alert aggregator
eResponder
Remote Directives R-Policy
local domain
eResponder
eResponder
eResponder
eResponder
39Technology transition structuring for
adaptability
- Open source framework
- provisions for optional proprietary plug-ins
- Interfaces to standard management and security
systems - commercial network configuration and management
systems - OpenView, Tivoli, etc.
- commercial and open-source intrusion detectors
and firewalls - RealSecure, NetRanger, Dragon, snort, EMERALD,
etc. - Gauntlet, PIX, Check Point, Raptor, ipchains,
etc. - internet security management standards
- SNMP, Intrusion Detection Message Format, and
others - Automation for installation and maintenance
- network inventory and configuration
- intrusion sensor deployment, configuration, and
activation - security policy definition and dissemination
- isolation and recovery mechanisms and agents