65
1 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全 Vulnerability vs. Structure 攻防两端如何在结构性安全环境中寻求空间 Space in the structural environment 潘柱廷(大潘) Jordan Pan http://blog.jordanpan.cn mailto:[email protected]

安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

  • Upload
    lamdung

  • View
    261

  • Download
    19

Embed Size (px)

Citation preview

Page 1: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

1

安全与可信security and trusted

脆弱性安全 vs. 结构性安全Vulnerability vs. Structure攻防两端如何在结构性安全环境中寻求空间Space in the structural environment

潘柱廷(大潘) Jordan Panhttp://blog.jordanpan.cn

mailto:[email protected]

Page 2: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

2

摘要Summary

• 脆弱性安全Vulnerability-oriented security• 结构性安全Structural security• 结构性安全中的脆弱性

Vulnerabilities in structures• 结构性威胁Structural threats

Page 3: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

3

脆弱性安全Vulnerability-oriented security

Page 4: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

4

脆弱性Vulnerabilities

• 弱口令 simple password• 病毒 virus• 操作系统漏洞 OS flaw• 协议漏洞 protocol flaw• 造成拒绝服务攻击的性能限制

performance limitation• 防火墙配置不当 bad configuration of firewalls• … …

Page 5: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

5

面向脆弱性的安全Vulnerability-oriented security

• 防病毒系统 anti-virus system• 漏洞扫描系统 vulnerability scanner• 补丁管理系统 patch management system• 入侵检测系统 IDS• 防拒绝服务攻击系统 anti-DoS• 防火墙 Firewall• 多功能安全网关 UTM• … …

Page 6: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

6

PSPC需求驱动筐架

Requirement Driven BaCaMeth

需求筐架

Req.BCM.来自内部

From Internal来自外部

From External

主动引导

Active体系化

Systematic政策性

Policy

被动要求

Passive问题型

Problem合规性

Compliance

Page 7: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

7

面向脆弱性的风险管理Vulnerability-oriented risk management

Page 8: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

8

国家标准中的风险管理关系图Risk management elements in Chinese standard

使命Mission

脆弱性Vulnerability

安全需求Requirement

安全措施Safeguard

资产价值Asset value

资产Asset

威胁Threat

风险Risk

残余风险Residual R.

事件Event

依赖

On

拥有Have

被满

足Sa

tisfie

d by

抗击 Resist

利用

暴露Explore

降低Reduce

increase

增加Increase

增加Increase

导出Lead

演变

成O

ccur

未被满足 not satisfied by

未控制Uncontrolled

可能诱发Invoke

残留

Leave

成本

Cos

t

Page 9: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

9

最精简的风险管理3要素模型3-element risk management model

三要素风险管理模型

资产和业务 保障措施 威胁

Page 10: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

10

2006 SC Awards• Best anti-malware solution

– Best Anti-spyware– Best Anti-trojan– Best Anti-virus – Best Anti-worm

• Best Content Security Solution – Best Anti-spam – Best Email Content Filtering – Best Email Security – Best IM security – Best Intellectual Property Protection

• Best Network Security Solution – Best Wireless Security – Best Enterprise Firewall – Best Intrusion Detection – Best Intrusion Prevention – Best Desktop Firewall

• Best Remote Access – Best VPN - SSL – Best VPN - Ipsec– Best Endpoint Security Solution – Best Web Filtering – Best Encryption

• Best Identity Management Solution – Best Password Management – Best Authentication – Best Single Sign-on – Best Two-Factor Solution

• Best Unified Threat Solution – Best Integrated Security Software – Best Integrated Security Appliance – Best Managed Security Service – Best Email Managed Service

• Best Network Security Management – Best Event Management – Best Computer Forensics – Best Policy Management – Best Security Audit – Best Security Management Tool

• Best Vulnerability Assessment and Remediation

– Best Patch Management – Best Vulnerability Assessment

Source from: http://www.scmagazine.com/uk/awards/previous/26104/year/2006/

Page 11: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

11

脆弱性安全的产业环境Vulnerability-oriented security industrial environment

威胁方Threat agents

厂商Provider

用户User

Page 12: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

12

木桶原理的迷失Misleading of Cask Rule

• 误导– 将整体结构仅仅简化为防御结构

– 不考虑防御纵深问题

– 只考虑静态的结果状态

– 没有成本观念

– … …

• Misleading– Only consider prevention structure– Not consider deep prevention– Only consider static state– Not consider cost-effective– … …

Page 13: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

13

结构性安全Structural security

基本结构basic structure紧密结构 tight structure松散结构loose structure

Page 14: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

14

访问控制的RM机制Reference monitor of access control

• 访问控制的RM机制是非

常基本的安全结构

• Reference monitor of access control is a very basic security structure

Page 15: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

15

RM机制有效的结构性条件Structural conditions of valid RM mechanism

• 三个条件

– 不能被绕过

– 不可篡改

– 足够小,可以被证明

• 3 conditions of VRM– Can not be bypass– Can not be tampered– Be small enough, can

be proved

Page 16: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

16

Randomly GeneratedSymmetric Key (seed + PRNG)

AlicePublickey

Privatekey

Private key

Public key

Bob

密钥交换过程Key Exchange Process

messagemessage

X15/^ow83h7ERH39DJ3H

messagemessage

X15/^ow83h7ERH39DJ3H

Page 17: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

17

紧密安全结构的代表——可信计算Tight security structure — Trusted Computing

http://www.trustedcomputinggroup.org

• 可信的定义 Definition of trust– 可信就是,一个设备的行为是按照其预期目标和指定方式执行的

Trust is the expectation that a device will behave in a particular manner for a specific purpose.

– 一个可信平台应当至少提供三个基本特性:保护能力、完整性测量和完整性报告

A trusted platform should provide at least three basic features:protected capabilities, integrity measurement and integrity reporting.

(From section 4.1, TCG Architecture Overview 1.0)

Page 18: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

18

TCG的基石性原理Fundamental rule of TCG

• 信任根就像“公理”一样,是信任的基础。在PC系统中,常常用硬件芯片实现。

• Roots of trust– In TCG systems roots of trust are components that

must be trusted because misbehavior might not be detected.

• 信任链则是信任传递的机制。常常采用密码技术。

• Chains of trust– Transitive trust also known as “Inductive Trust”,

is a process where the Root of Trust gives a trustworthy description of a second group of functions.

Page 19: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

19

一个包含TPM的PCReference PC platform containing a TCG TPM

Page 20: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

20

TCG – 可信平台模块TCG – Trusted Platform Module (TPM)

• 一个可信平台常常拥有三个可信根

There are commonly three Roots of Trust in a trusted platform– 测量可信根 root of trust for measurement (RTM)– 存储可信根 root of trust for storage (RTS) – 报告可信根 root of trust for reporting (RTR)

Page 21: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

21

证明协议和消息交换Attestation protocol and message exchange

Page 22: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

22

TPM – 存储可信根的体系结构TPM – Root of Trust for Storage (RTS)

Page 23: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

23

TPM 部件体系结构TPM component architecture

Page 24: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

24

TCG 软件分层TCG software layering

Page 25: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

25

可信平台的生命周期The trusted platform lifecycle

Page 26: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

26

可信平台上的用户认证User authentication using trusted platforms

Page 27: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

27

可信平台上的用户认证User authentication using trusted platforms

Page 28: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

28

经典的四角模型The classical four corners model

Page 29: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

29

四角模型的可信平台实现Detailed TP deployment architecture

Page 30: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

30

TCG对于可信计算平台的划分8 categories of Trusted platform

体系结构体系结构ArchitectureArchitecture

移动设备移动设备MobileMobile

TPMTPM

客户端客户端PC ClientPC Client

服务器服务器ServerServer

软件包软件包Software StackSoftware Stack

存储存储StorageStorage可信网络连接可信网络连接

Trusted Network ConnectTrusted Network Connect

Page 31: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

31

TCG的IWG和TNC的对应关系the IWG and TNC architecture

Page 32: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

32

TNC体系结构TNC architecture

Page 33: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

33

TNC体系结构下的消息流Message flow between components

Page 34: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

34

拥有TPM的TNC体系结构The TNC architecture with the TPM

Page 35: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

35

思科的自防御网络体系Cisco’s self-defending network

Page 36: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

36

思科的自防御网络体系Cisco’s self-defending network

Page 37: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

37

松散安全结构的代表——框架和方案Loose security structure — Framework

• 松散结构中的各个部件关联关系,常常靠人的集成来实现

The connection among the components of loose structure is always integrated by human.

• 松散结构常常表现为框架Framework– 技术框架Technology framework– 管理体系Management system

• ISO27001, ISO20000, etc.

Page 38: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

38

Page 39: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

39

技术功能是PDR的衍生PDR can express technology framework

Page 40: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

40

检测能力是松散技术结构的关联要素Detection make the loose structure tight

• 攻击者不得不面对越来越多的

Attackers have to face more– 入侵检测 IDS– 漏洞扫描 scanner– 应用审计系统 Application auditing system– 日志系统 log system– 蜜罐 honey pot– 取证系统 forensic system– 监控平台 monitoring platform– 等等 etc.

Page 41: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

41

一个信息安全管理体系的结构Structure of a ISMS (modified ISO27001)

Page 42: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

42

结构性安全中的脆弱性Vulnerabilities in structures

Page 43: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

43

你对刚才阐述的结构性安全有什么感觉?What’s your feeling about structural security?

• 复杂 complex• 怀疑其完备性 concern about the completion• 成本 cost• 蠢人永远有 stupid guys are there• … …

Page 44: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

44

不要被“结构性安全”给忽悠了!Do not be misled by structural security

• 不要被“结构性安全”给忽悠了!脆弱性安全和结

构性安全并不是对立的,也不是两个发展阶段;脆弱性安全也有结构,结构性安全也有脆弱性。

• Do not be misled by structural security– Vulnerability-oriented security also has structure– Structural security also has vulnerabilities

Page 45: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

45

借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts

Randomly GeneratedSymmetric Key (seed + PRNG)

AlicePublickey

Privatekey

Private key

Public key

Bob

Page 46: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

46

借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts

Randomly GeneratedSymmetric Key (seed + PRNG)

AlicePublickey

Privatekey

Private key

Public key

Bob Private key

Public key

Carl

线路的透明插入,可以完成对于加密通信的嗅探攻击

Page 47: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

47

借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts

Randomly GeneratedSymmetric Key (seed + PRNG)

AlicePublickey

Privatekey

Private key

Public key

Bob Private key

Public key

Carl

Page 48: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

48

结构性安全的局限性Limitation of structural security

• 结构是在环境中的、有边界的

environment and boundary

Page 49: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

49

在生命周期中寻找弱点Find vulnerabilities along the lifecycle

• 厂家的生产环节常常会埋有后门

back doors embedded during manufacturing• 没有一个系统是完美的

No perfect system• … …

Page 50: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

50

在结构的时序中寻找突破Find vulnerabilities through time sequence

• 以文档保密系统为例

Sample: Document protection system• 文档的生成环节最可能存在漏洞

Vulnerabilities during creating documentation

Page 51: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

51

结构性安全的局限性Limitation of structural security

• 结构是在环境中的、有边界的

environment and boundary• 在不同阶段、不同人手中保持安全很困难

different phases and organizations

Page 52: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

52

在人性中寻找弱点Find vulnerabilities from human behavior

• 社交工程攻击Social Engineering• 隐私保护Privacy protection• 自由倾向Anti-DRM• 懒惰Lazy• … …

Page 53: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

53

结构性安全的局限性Limitation of structural security

• 结构是在环境中的、有边界的

environment and boundary• 在不同阶段、不同人手中保持安全很困难

different phases and organizations• 人把科学变成了艺术

Human transform science to art

Page 54: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

54

结构本身可能就有问题Find vulnerabilities from structure itself

Page 55: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

55

• 对于AR/PEP/PDP的伪装,可能打破整个结构

every role may be spoofed• 所有看似漂亮的结构,其性能和可用性问题可能会非常严重,会轻易被拒绝服务攻击击垮

Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.

• 那么多传统攻击方式,可能有的还有效

Some traditional attacks are still effective

结构本身可能就有问题Find vulnerabilities from structure itself

Page 56: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

56

结构性安全还要继续博弈We are still in the game

• 怎么博弈?

How to Play the game?– 你了解对方的结构吗?

Do you know the structure of all players?– 你了解对方了解多少自己的结构吗?

Do you know “how much have the other player known about your structure” ?

Page 57: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

57

结构性威胁Structural threats

知识、资源和原则

Knowledge, Resources and Principles

Page 58: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

58

知识Knowledge

• 寻求对于系统更深层次技术结构的研究

Who know lower?• 寻求对于系统宏观结构的了解

Who know the macro-structure better?• 寻求对于具体对象的全面了解

How many details do you know?• … …

Page 59: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

59

资源Resources

• 从分布式拒绝服务攻击到僵尸网络,掌握具有结构和组织的攻击体

Botnet is a sample of structural software organization for attacking

• 在时序上组成结构,非常有利于攻击

Time sequence spreading is a good thinking of structural attack

• … …

Page 60: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

60

结构的一些关键字Key words of structure

• Business• Distribution• Hierarchy• Time sequence• Life-cycle• Management

– Organization– Regular– Process Control

• Value

• 业务• 分布式• 层次• 时序• 生命周期• 管理

– 组织– 制度– 过程控制

• 价值

Page 61: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

61

流程化的结构思路Process-oriented structure

processprocess

inputinput outputoutput

Process ownerProcess owner

operatoroperator

InfraInfra--structurestructure

KnowledgeKnowledgebasebase

LOGLOGArchiveArchive

ProcessProcessimprovingimproving

MonitorMonitor

Page 62: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

62

原则Principles

• 安全没有百分之百 No 100% Security• 安全相对性的三个原则 3 security relativity rule

–生存原则 survival rule

–风险原则 Risk rule

–保镖原则 bodyguard rule自身完备性要求

Perfective requirement

Page 63: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

63

总结 Conclusion

• 脆弱性安全Vulnerability-oriented security• 结构性安全Structural security• 结构性安全中的脆弱性

Vulnerabilities in structures• 结构性威胁Structural threats

Page 64: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

64

总结:一个可以持续研究下去的课题Conclusion: A good problem to keep approaching

脆弱性防御V.O. defend

结构性防御Structural

defend

脆弱性攻击V.O. attack

结构性攻击Structural

attack

脆弱性和结构性 Vulnerability-oriented vs. structural

攻击和防守

defe

nd v

s. a

ttack

Page 65: 安全与可信 security and trusted 脆弱性安全 vs. 结构性安全xcon.xfocus.net/XCon2006/archieves/Jordan_Pan-Vulnerability_vs... · From Internal 来自外部 From ... •

65

谢谢…Thanks…

大潘 Jordan Pan