Title: Survival by Defense-Enabling
1Survival by Defense-Enabling
- Partha Pal, Franklin Webber, Richard Schantz
- BBN Technologies LLC
- Proceedings of the Foundations of Intrusion
Tolerant Systems(2003) - Presented by J.H. Su
2Authors(1/3)
- Partha Pal
- a Division Scientist at BBN Technologies. His
research interest is in the area of survivable
distributed systems.
3Authors(2/3)
- Franklin Webber
- a software engineer, have primarily been
supporting BBN Technologies doing DARPA-sponsored
research on strengthening the resistance of
computer systems to malicious attack.
4Authors(3/3)
- Richard Schantz
- Works At Intelligent Distributed Computing
Department in BBN.
5Outline
- Introduction
- Survival by Defense of Critical Application
- Acquisition of Privilege
- Control of Resources
- Use of Defensive Adaptation in Applications
Survival - Issues and Limitations
- Related Work
- Conclusion
6Introduction(1/4)
- Attack survival
- The ability to provide some level of service
despite an ongoing attack by tolerating its
impact.
7Introduction(2/4)
- Attack prevention
- Lead to the development of what is known as a
trusted computing base (TCB). - Attack detection and situational awareness
- Lead to the development of various intrusion
detection system (IDS).
8Trusted Computing Base (TCB)
- Confidentiality
- Authentication
- Integrity
9Introduction(3/4)
- Drawback
- In fact, many of the worlds computer systems
today run operating systems and networking
software that are far from the TCB ideal. - IDS mostly works off-line, without any direct
runtime interaction or coordination with the
applications (and with other IDSs) that they aim
to protect.
10Introduction(4/4)
- Survival by protection
- Seeks to prevent the attacker from gaining
privileges - Survival by defense
- Includes protection but also seeks to frustrate
an attacker in case protection fails and the
attacker gains some privileges anyway
11Survival by Defense of Critical Application(1/5)
- Focus on
- The specific need of a specific type of
applications. - What is a critical applications?
- These applications are critical in the sense that
the functions they implement are the main purpose
of the computer system on which they run.
12Survival by Defense of Critical Application(2/5)
- Assumption
- We can modify or extend the design and
implementation of the critical applications.
13Survival by Defense of Critical Application(3/5)
- Corruption
- An application that does not function correctly
- Reasons of Application corrupt
- An accident, such as a hardware failure, or
because of malice - Flaws in its environment or in its own
implementation cause it to misbehave.
14Survival by Defense of Critical Application(5/5)
- The Goal
- The attackers acquisition of privileges must be
slowed down. - The defense must respond and adapt to the
privileged attackers abuse of resources.
15Acquisition of Privilege(1/4)
- Divide the system into several security domains,
each with its own set of privileges - The domains are chosen and configured to make
best use of the existing protection in the
environment to limit the spread of privilege. - The domains must not overlap.
- Each security domain may offer many different
kinds of privilege. - The attacker cannot accumulate privileges
concurrently in any such set of domains.
16Acquisition of Privilege(2/4)
- Kinds of Privilege
- anonymous user privilege
- domain user privilege
- domain administrator privilege
- application-level privilege
17Acquisition of Privilege(3/4)
- Three ways for an attacker to gain new privileges
- Convert domain or anonymous user privilege into
domain administrator privilege. - Convert domain administrator privilege in one
domain into domain administrator privilege in
another. - Convert domain administrator privilege into
application-level privilege.
18Acquisition of Privilege(4/4)
- Solution for Case1
- Careful configuration of hosts and firewalls.
- Solution for Case2
- Proper host configuration and administration
- Having a heterogeneous environment with various
types of hardware and operating systems. - Solution for Case3
- Use cryptographic techniques
19Control of Resource(1/3)
- The attacker and the critical applications
compete over system resources - Use of redundancy
- Monitoring
- Adaptation
20Control of Resource(2/3)
- Use of redundancy
- Replicate every essential part of the application
and place the replicas in different domains. - The replicas must be coordinated to ensure that,
as a group, they will not be corrupted when the
attacker succeeds in corrupting some of them.
21Control of Resource(3/3)
- Monitoring
- QoS
- Self-checking
- whether the application continues to satisfy
invariants specified by its developers.
22Use of Defensive Adaptation in Applications
Survival(1/4)
- A classification of defensive adaptations
- Dimension1The level of system architecture at
which these adaptations work . - Dimension2how aggressively the attack can be
countered.
23Use of Defensive Adaptation in Applications
Survival(2/4)
Defeat Attack Work Around Attack Guard Against Future Attack
Application level Retry failed request Redirect request degrade service Increase self-checking
QoS management level Reserve CPU, bandwidth migrate replicas Tighten cryptographic, access control
Infrastructure level Block IP sources Change ports, protocols Configure IDSs
24Use of Defensive Adaptation in Applications
Survival(3/4)
- The importance of the capability to change
between various modes and the associated
trade-offs. - Defensive adaptation is mostly reactive.
- Defensive adaptation could be pro-active.
25Use of Defensive Adaptation in Applications
Survival(4/4)
- Make these adaptive responses unpredictable.
- some uncertainty needs to be injected.
- Separate the design of the functional (or
business) aspects of the application from the
design of defensive adaptation. - Put the latter into middleware.
- reusable for many different applications.
26Issues and Limitations
- The reliance on crypto systems.
- It is not simple to combine multiple mechanisms
in a defense strategy. - selection of appropriate mechanism, potential
conflict analysis and resolution has to be done
manually by an expert. - Relies on the fact that attacks proceed
sequentially
27Related Work
- MAFTIA
- an ESPRIT project developing an open architecture
for transactional operations on the Internet. - The Survivability Architectures project
- Aims to separate survivability requirements from
an applications functional requirements. - The An Aspect-Oriented Security Assurance
Solution project - implement security-related code transformations
on an application program.
28Conclusion
- We are implementing technology for defense
enabling under the DARPA project titled
Applications that Participate in their Own
Defense (APOD). - Defense enabling can increase an applications
resistance to malicious attack. - Greater survivability for the application on its
own and an increased chance for system
administrators to detect and thwart the attack
before it succeeds.
29Thanks for your listening