53
Beyond Reactive Management of Network Intrusions Professor Sushil Jajodia Center for Secure Information Systems [email protected] http:// csis.gmu.edu/jajodia

Beyond Reactive Management of Network Intrusions

  • Upload
    quade

  • View
    33

  • Download
    0

Embed Size (px)

DESCRIPTION

Beyond Reactive Management of Network Intrusions. Professor Sushil Jajodia Center for Secure Information Systems [email protected] http:// csis.gmu.edu/jajodia. Outline. Problem Approach Benefits Challenges. The Perfect Storm. Network configurations are ever more sophisticated - PowerPoint PPT Presentation

Citation preview

Page 1: Beyond Reactive Management of Network Intrusions

Beyond Reactive Management of Network Intrusions

Professor Sushil Jajodia

Center for Secure Information [email protected]://csis.gmu.edu/jajodia

Page 2: Beyond Reactive Management of Network Intrusions

Outline•Problem•Approach•Benefits•Challenges

Page 3: Beyond Reactive Management of Network Intrusions

The Perfect Storm

• Network configurations are ever more sophisticated

• Vulnerabilities are becoming more complex• Remediation resources are sparseA total solution is a combination of technology and services I will describe the technology component

Page 4: Beyond Reactive Management of Network Intrusions

VulnerabilityScanner

WWWFrontendRouter

BackendRouter

Firewall

ServerLAN

ClientLAN

DMZ

W2K Web

Server

W2KExchange

Server

DMZRouter

Linux Mail

Server

`

WinXPClient

`

W2K ProClient

5 Server

3 Router

2 Firewall

2 PC

LegendSymbol Count Description

OracleDB

Server

W2K Web

Server

Firewall

DBLAN

4

VulnerabilityScanner

41 Vulns 15 Vulns

160Vulns

158Vulns

47Vulns

60 Vulns

107 Vulns

AttackTarget

External Attacker

Page 5: Beyond Reactive Management of Network Intrusions

Limitations of Vulnerability Scanners

• Generate overwhelming amount of data • Example Nessus scan

– Elapsed time: 00:48:07– Total security holes found: 255– High severity: 40– Low severity: 117– Informational: 98

• No indication of how vulnerabilities can be combined • Can an outside attacker obtain access to the Crown

Jewels?• Where does a security administrator start?

Page 6: Beyond Reactive Management of Network Intrusions

Limitations of IDSs• Generate overwhelming number of alerts• Many false alerts – normal traffic or

failed attacks• Alerts are isolated • No indication of how alerts can be

combined • Incomplete alert information• Where does a security administrator

start?• Is the attacker trying to obtain access to

Crown Jewels?• Require extensive human intervention

Page 7: Beyond Reactive Management of Network Intrusions

Summary

• Current security measures largely independent

• Little synergy among tools• Vulnerabilities considered in isolation may

seem acceptable risks, but attackers can combine them to produce devastating results

Page 8: Beyond Reactive Management of Network Intrusions

What is lacking?

• “A distributed system is one in which the failure of computer you didn’t even know existed can render your own computer unusable” – Leslie Lamport

• Context for total network security• How outsiders penetrate firewalls and

launch attacks from compromised hosts• Insider attacks

Page 9: Beyond Reactive Management of Network Intrusions

9

The reality – security concernsare highly interdependent.

Simply Listing ProblemsMisses the Big Picture!

Page 10: Beyond Reactive Management of Network Intrusions

Penetration Testing

• Few experts available• Red teams can be expensive• Tedious• Error-prone• Impractical for large networks• No formal claims

Page 11: Beyond Reactive Management of Network Intrusions

Attack Graphs• An attacker breaks into a network through a chain

of exploits where each exploit lays the groundwork for subsequent exploits

• Chain is called an attack path• Set of all possible attack paths form an attack

graph• Generate attack graphs to mission critical

resources• Report only those vulnerabilities associated with

the attack graphs

Page 12: Beyond Reactive Management of Network Intrusions

Related Work

• Phillips and Swiler NSPW 1998• Templeton and Levitt NSPW 2000• Ritchey and Ammann S&P 2000• Wing, Jha et al. CSFW 2002 • Ammann et al CCS 2002 • Ou et al. CCS 2006• Sawilla and Ou ESORICS 2008

Page 13: Beyond Reactive Management of Network Intrusions

Firewall

Attacker

Web Server Mail ServerHub

NT4.0IIS

Linuxattack tools

10.10.100.10

10.10.101.10

10.10.100.20

Linuxwu_ftpd

Page 14: Beyond Reactive Management of Network Intrusions
Page 15: Beyond Reactive Management of Network Intrusions
Page 16: Beyond Reactive Management of Network Intrusions
Page 17: Beyond Reactive Management of Network Intrusions
Page 18: Beyond Reactive Management of Network Intrusions
Page 19: Beyond Reactive Management of Network Intrusions

Reference

• Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams, "Cauldron: Mission-centric cyber situational awareness with defence in depth," Proc. MILCOM Conf., Baltimore, MD, November 7-10, 2011.

Page 20: Beyond Reactive Management of Network Intrusions

g

g

1

Minimal-Cost Network

Hardening

Page 21: Beyond Reactive Management of Network Intrusions

Solution 1 Solution 1Solution 1

Page 22: Beyond Reactive Management of Network Intrusions

Solution 1 Solution 1Solution 1

Solution 2 Solution 2

Solution 2 Solution 2

Page 23: Beyond Reactive Management of Network Intrusions

No impactNo impact

Page 24: Beyond Reactive Management of Network Intrusions

Reference

• Massimiliano Albanese, Sushil Jajodia, Steven Noel, "A time-efficient approch to cost-effective network hardening using attack graphs," Proc. 42nd Annual IEEE/IFIP International Conference on Dependable and Networks (DSN), Boston, Mass, June 25-28, 2012.

Page 25: Beyond Reactive Management of Network Intrusions

25

Attack Graph Visualization Problem

Even small networks can yield complex attack graphs!

Page 26: Beyond Reactive Management of Network Intrusions

2/21/2008 26

WWWFrontendRouter

BackendRouter

Firewall

ServerLAN

ClientLAN

DMZ

W2K Web

Server

W2KExchange

Server

DMZRouter

Linux Mail

Server

`

WinXPClient

`

W2K ProClient

5 Server

3 Router

2 Firewall

2 PC

LegendSymbol Count Description

OracleDB

Server

W2K Web

Server

Firewall

DBLAN

AttackTarget

External Attacker

Page 27: Beyond Reactive Management of Network Intrusions

27

Page 28: Beyond Reactive Management of Network Intrusions

2/21/2008 28

Page 29: Beyond Reactive Management of Network Intrusions

2/21/2008 29

Page 30: Beyond Reactive Management of Network Intrusions

Alert Correlation

• Correlate alerts to build attack scenarios• For efficient response, this must be done in

real time

Page 31: Beyond Reactive Management of Network Intrusions

Related Work

• Based on a priori knowledge, such as the prepare-for relationship (Cuppens et al S&P’02, Ning et al CCS’02 CCS’03, etc.)

• Based on statistical analysis, such as temporal similarity between alert sequences (Lee et al RAID’03, Dacier et al KDD’02, Valdes et al RAID’01, etc.)

• Hybrid approaches (Ning et al ACSAC’04, Lee et al ESORICS’04, Morin et al RAID’02, etc.)

Page 32: Beyond Reactive Management of Network Intrusions

Attack Graph Approach

• Provides context for alarms• Can help with forensic analysis, attack

response, attack prediction

Page 33: Beyond Reactive Management of Network Intrusions

Hypothesizing and Predicting Alerts• Correlation based on the prepare-for relationship is

vulnerable to alerts missed by IDSs - Reassembling a broken attack scenario is expensive and error-prone

• By reasoning about the inconsistency between the knowledge (encoded in attack graph) and the facts (represented by received alerts), missing alerts can be hypothesized

• By extending the facts in a way that is consistent with the knowledge, possible consequences of current attacks can be predicted

Page 34: Beyond Reactive Management of Network Intrusions

Reference

• Lingyu Wang, Anyi Liu, Sushil Jajodia, "An efficient and unified approach to correlating, hypothesizing, and predicting network intrusion alerts," Proc. 10th European Symposium on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 3679, September 2005, pages 247-266.

Page 35: Beyond Reactive Management of Network Intrusions

Two Sides of Security

• Just what is “predictive?

• Common Operating Picture

• Situational Awareness

• I have 700 vulnerabilities – now what?!?

Monitoring/Management Predictive

Plus more than 60 other vendors

3 vendors

“Put my problems/my risks in context”

Page 36: Beyond Reactive Management of Network Intrusions

Our Approach• Network Capture

– builds a model of the network

– represents data in terms of corresponding elements in Vulnerability Reporting and Exploit Specifications

• Vulnerability Database – a comprehensive repository

of reported vulnerabilities• Graph Engine

– simulates multi-step attacks through the network, for a given user-defined Attack Scenario

– analyzes vulnerability dependencies, matching exploit preconditions and post-conditions

– generates all possible paths through the network (for a given attack scenario)

Network Capture

VisualAnalysis

OptimalCounter

Measures

Vulnerability Database

NVD

ExploitConditions

AttackScenario

GraphEngine

EnvironmentModel

Vulnerability Scanning

FoundScan

Asset Inventory

Firewall Rules

Aggregate / Correlate / Visualize

Page 37: Beyond Reactive Management of Network Intrusions

Benefit from Synergies

• Common Operating Picture

• Situational Awareness

• Patching servers vs changing firewalls

• Combined vulnerabilities are real

FirewallsVulnerability Scans

Patch Mgmt/Asset MgmtOther

Where do I need to focus my resources?!

Page 38: Beyond Reactive Management of Network Intrusions

OverallGraph

GraphElements

HardeningLog

ExploitDetails

Main AttackGraph View

ExploitField

HardeningRecommendations

Toolbars

38

Page 39: Beyond Reactive Management of Network Intrusions

UnconstrainedStart/Goal

39

Page 40: Beyond Reactive Management of Network Intrusions

AttackStart

Constrained Start

40

Page 41: Beyond Reactive Management of Network Intrusions

AttackStart

AttackGoal

Constrained Start and Goal

41

Page 42: Beyond Reactive Management of Network Intrusions

AttackStart

AttackGoal

AttackStart

Direct Paths

42

Page 43: Beyond Reactive Management of Network Intrusions

Harden

First-LayerRecommendation

43

Page 44: Beyond Reactive Management of Network Intrusions

Harden

Harden

Last-LayerRecommendation

44

Page 45: Beyond Reactive Management of Network Intrusions

Harden

Harden

Minimum-EffortRecommendation

45

Page 46: Beyond Reactive Management of Network Intrusions

2/21/2008 46

Security Metrics

AlarmCorrelationAnd AttackResponse

SensorPlacement

NetworkHardening

CAULDRON has NumerousApplications

Page 47: Beyond Reactive Management of Network Intrusions

Summary of CAULDRON• Automated analysis of all possible attack paths

through a network– Resulting attack “roadmap” provides context for

optimal defenses– Transforms volumes of isolated facts into manageable,

actionable results• Integrates with existing tools for capturing

network configuration• Your network is provably secure, with minimum

effort• A useful tool for making informed decisions about

network security

Page 48: Beyond Reactive Management of Network Intrusions

Zero-day Attacks

• Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel, "k-Zero day safety: Measuring the security risk of networks against unknown attacks," Proc. 15th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 6345, 2010, pages 540-557.

Page 49: Beyond Reactive Management of Network Intrusions

49

Cyber Situation Awareness• An ever increasing number of critical applications and

services rely on Information Technology infrastructures– Increased risk of cyber attacks– Increased negative impact of cyber attacks

• Attackers can exploit network configurations and vulnerabilities (both known and unknown) to incrementally penetrate a network and compromise critical systems– Manual analysis is labor-intensive and error-prone– Vulnerabilities are often interdependent, making traditional point-

wise vulnerability analysis ineffective– Services and machines on a network are interdependent

• Need for tools that provide analysts with a “big picture” of the cyber situation

Page 50: Beyond Reactive Management of Network Intrusions

50

CSA Capabilities: Enterprise Network

Internet

Web Server (A)

Mobile App Server (C)

Catalog Server (E)

Order Processing Server (F)

DB Server (G)

Local DB Server (D)

Local DB Server (B)

Current situation. Is there any ongoing attack? If yes, where is the attacker?

Impact. How is the attack impacting the enterprise or mission? Can we asses the damage?

Evolution. How is the situation evolving? Can we track all the steps of an attack?

Behavior. How are the attackers expected to behave? What are their strategies?

Forensics. How did the attacker create the current situation? What was he trying to achieve?

Information. What information sources can we rely upon? Can we assess their quality?

Prediction. Can we predict plausible futures of the current situation?

Scalability. How can we ensure that solutions scale well for large networks?

Page 51: Beyond Reactive Management of Network Intrusions

51

Situation Knowledge Reference Model

Index & Data

Structures

Topological Vulnerability Analysis

CSA Framework Architecture

Monitored Network

Analyst

Alerts/Sensory Data

Cauldron Switchwall

Vulnerability Databases

NVD OSVDCVE

Stochastic Attack Models

GeneralizedDependency Graphs

Graph Processing

and Indexing

Dependency AnalysisNSDMine

r

Scenario Analysis & Visualization

Network Hardening

Unexplained Activities Model

Adversarial modeling

Heavy Iron

Page 52: Beyond Reactive Management of Network Intrusions

Reference• Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., Cyber

Situational Awareness: Issues and Research, ISBN: 98-1-4419-0139-2, Springer International Series on Advances in Information Security, 2009, 252 pages.

• Arun Natrajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson, "NSDMine: Automated discovery of network service dependencies," Proc. 31st Annual Int'l. Conf. on Computer Communications (INFOCOM), Orlando, FL, March 25-30, 2012, pages 2507-2515.

• Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "Scalable analysis of attack scenarios," Proc. 16th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 6879, V. Atluri and C. Diaz, eds., Leuven, Belgium, September 12-14, 2011, pages 416-433.

Page 53: Beyond Reactive Management of Network Intrusions

Further Information:

Sushil [email protected](703) 993-1653http://csis.gmu.edu/jajodia