24
PRIVILEGE STATES BASED ACCESS CONTROL FOR FINE GRAINED INTRUSION RESPONSE Ashish Kamra , Elisa Bertino Purdue University Presenter: Ashish Kundu 1

Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

Embed Size (px)

Citation preview

Page 1: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

1

PRIVILEGE STATES BASED ACCESS CONTROL FOR

FINE GRAINEDINTRUSION RESPONSE

Ashish Kamra, Elisa BertinoPurdue University

Presenter:Ashish Kundu

Page 2: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

2

The Real Authors

[email protected]

[email protected]

Page 3: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

3

Motivation

Databases

Anomaly Detection

Anomaly Response

Access Control

Page 4: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

4

Page 5: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

5

Access Control Decision Semantics

RequestReferenceMonitor

AllowDeny

Page 6: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

6

Extended Decision Semantics

RequestReferenceMonitor

AllowDeny

Taint

Suspend

Page 7: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

7

Primary Contribution

Mechanism to enhance the

decision semantics of an

access control implementation

Page 8: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

8

Why do we want to do that?

Page 9: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

9

Support for fine-grained intrusion response

Request

Detectionengine

Responseengine

Anomaly

Drop Reques

t

LogReques

t

2nd factor of authentication

Passive Monitoring

Page 10: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

10

Mapping

Passive Monitoring

Taint decision semantic

2nd factor of

authentication

Suspend decision

semantics

Page 11: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

11

Privilege States - glue for the mapping

Assign states to privileges

Response system changes privilege state fine-grained response actions

Response : access control decision semantics

Page 12: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

12

Privilege States

“state” to every privilege a user or role

Five privilege states

DENY

SUSPEND

TAINT

GRANT

UNASSIGN

Page 13: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

13

Privilege State Semantics

“DENY”: negative authorizations

“SUSPEND”: request suspension

“TAINT”: request tainting

“GRANT”: standard SQL GRANT

“UNASSIGN”: standard SQL REVOKE

Page 14: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

14

Example

U1 is a member of role R1

DBA assigns SELECT privilege in DENY on T1 to user

U1 SELECT privilege in TAINT on T1 to role

R1

Privilege state of SELECT on T1 for U1 ???

Page 15: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

15

Privilege State Dominance

X

means ‘X’ overrides ‘Y’

DENY

SUSPEND

TAINT

UNASSIGN

GRANT

Y

Page 16: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

16

Privilege State Transitions

+

/

+

+

??

?

/

/

/

+ /+ grant

deny

? suspend

/

unassign

taint

?

+

TAINT

SUSPEND

DENY

GRANT REVOKE

?

Page 17: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

17

Formal model

For details, please refer to the paper …

Page 18: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

18

Considering Role Hierarchies

Role hierarchy based on privilege inheritance

What about privileges in “deny”, “suspend” and “taint” states?

R_parent{insert}

R_child{select

}

{select}

Page 19: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

19

Privilege Orientation Modes

up

down

neutral

unassign, grant

deny, taint, suspend

Page 20: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

20

Privilege Propagation

R8

R5 R6 R7

R2 R3 R4

R1

{select,grant}

{select,grant}

{insert,deny,down}

{insert,deny,down}

Recursive Propagation

Page 21: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

21

Implementation in PostgreSQL

New SQL commands TAINT, SUSPEND

Enhanced Access Control Lists To support privilege states and

orientation modes

Re-authentication procedure for a privilege in “suspend” state

Page 22: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

22

Access Control Check Overhead No Role Hierarchy

16 32 64 128 256 5120

10

20

30

40

50

60

BASEPSAC

Overh

ead

(m

icro

secon

ds)

ACL Size

Page 23: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

23

16 32 64 128 256 5120

20

40

60

80

100

120

BASEPSAC

Overh

ead

(m

icro

secon

ds)

ACL Size

Access Control Check Overhead With Role Hierarchy

Page 24: Ashish Kamra, Elisa Bertino Purdue University Presenter: Ashish Kundu 1

24

Conclusions

Fine-granular access control in databases

Anomaly response mechanisms

Facilitates policy development

Formal model and experimental evaluation