39
IW-Strategy: 1 Strategy

IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

Embed Size (px)

Citation preview

Page 1: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 1

Strategy

Page 2: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 2

Deception

“All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”

Page 3: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 3

Deception in Information Warfare

• Intent of attack

• Value in defense

• Extent of attack

• Depth of defense

• Methods of attack and defense

• Objects of attack

• Success of attack

Page 4: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 4

Facing the Enemy

“Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”

Page 5: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 5

Planning of Your Network

• How does the network look to valid users?

• How does the network look to casual scanners?

• How does the network look dedicated attackers?

• How does the network look internally?

Page 6: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 6

Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html

External view of Nets

Page 7: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 7

Internal View of Network

Page 8: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 8

Critical Issues

• What must you defend?– Mission of the organization– Assets of the organization

• What can you defend?– Personnel limitations– Information limitations

• What is likely to be attacked?

Page 9: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 9

Strategic Goals

Sun Tzu said: Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has to hasten to battle will arrive exhausted.

Therefore the clever combatant imposes his will on the enemy, but does not allow the enemy's will to be imposed on him.

By holding out advantages to him, he can cause the enemy to approach of his own accord; or, by inflicting damage, he can make it impossible for the enemy to draw near.

Page 10: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 10

Defensive Strategy

• Deceive the attacker

• Frustrate the attacker

• Resist the attacker

• Recognize and Respond to the attacker

Page 11: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 11

Analogous Example

• Arsonist profiling, misdirection = Deceive

• Grounded outlets, fire doors, inter-floor barriers = Frustrate/Resist

• Smoke detectors, alarm pulls = Recognize

• Fire-suppression systems = Respond

$

$

Page 12: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 12

Deceive the Enemy

Hence that general is skillful in attack whose opponent does not know what to defend; and he is skillful in defense whose opponent does not know what to attack.

• Hide the nature of your organization• Use obvious targets as alarms, not servers• Minimize the footprint of critical assets• Honeyd/Tarpit – fake servers/services

Page 13: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 13

Frustrate the EnemyIf we do not wish to fight, we can prevent the enemy

from engaging us even though the lines of our encampment be merely traced out on the ground. All we need do is to throw something odd and unaccountable in his way.

• Block what you can

• Prevent information flows critical to enemy

• Use obvious attack vectors as alarms

Page 14: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 14

Resist the Enemy• Asset identification, critical to mission

• Security requirements for assets

• Restoration of security

• Vulnerability identification related to mission

• Layered security

• Monitor and respond to change

• Audit and reassess

Page 15: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 15

Factors that Block Resistance

• Cost

• Personnel

• Pace of change

• Organizational coalitions

• Assumed survival

• Security through obscurity

Page 16: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 16

Recognize the Enemy

• Recognizing indications and warnings

• Investigating intrusions

• Applying fixes

• Monitoring users and applications

• Updating systems

• Scanning log and alert files

• Auditing system configurations

Page 17: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 17

Factors that block Recognition

• Administrator shortage

• Administrator overload

• Administrator ignorance

• System structure

• Network architecture

• Application structure

• Organizational goals

Page 18: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 18

Offensive Strategy

• Positioning -- high and low

• Visibility -- sun and shadow

• Nourishment -- life

• Occupation -- substance

• Risk Avoidance -- illness

Page 19: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 19

Inspirational Quote

Now the Army likes heights and abhors low areas, esteems the sunny (yang) and disdains the shady (yin). It nourishes life and occupies the substantial. An army that avoids the hundred illnesses is said to be certain of victory.

Sun Tzu

Page 20: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 20

Positioning

• What is a network high point?

• What is a network low point?

• What does positioning mean in a network world?

Page 21: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 21

Authentication - Scamming

• Also known as social engineering

• Exploit trust relationships between people

• Exploit service climate

• Exploit business methods

• If at first you don’t succeed, try a supervisor!

Page 22: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 22

When a packet sniffer is present, a copy of all packets that pass by it on the network are covertly captured.

Packet SnifferExecuting

Router

Packet Sniffing

Page 23: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 23

Visibility

• What is sun (yang) in a network world?

• What is shade (yin) in a network world?

• How do we exploit sun and shade?

• Why is visibility significant in a network world?

Page 24: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 24

Malicious Code

• Viruses

• Trojan Horses

• Worms

• Always verify the integrity and authenticity of downloaded content

• Always scan content for malicious code before opening

Page 25: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 25

Love Letter Virus

[email protected]

Check out this joke...

Trusted Colleague

IRC

Exchange

•VBS•JPG•MP3•others

Replace

Corrupt data/script files

Steal Passwords

Clog email

Page 26: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 26

Internet Auditing Project

• Unauthorized project systematically mapping Internet systems for selected vulnerabilities

• 36 million hosts (85% of active addresses) surveyed over 3-week period (1-21 Dec 98)

• 5 scanning hosts using newly created (free) Bulk Auditing Security Scanner (BASS)

• Scanning hosts in 5 different nations• 18 different vulnerabilities tested (from CERT

advisories)• 450,000 vulnerable hosts found• Source: Securityfocus.com paper dated Aug 11, 1999

Page 27: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 27

Nourishment

• Life: Survival, Defense, Basis for attack

• What is survival in a network world?

• What is defense in a network world?

• How do we turn survival and defense into a basis for attack

Page 28: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 28

Tactics of Network Attack

• Reconnaissance

• Exploit

• Communication

• Command

• Effect

• Reserve

Page 29: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 29

Strategies of Network Attack

• Timing: immediate, follow-on, phased

• Targeting: real, ostensible, coincidental

• Form of preparation: presupposition, creation

Page 30: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 30

Examples of Attack Strategies

Stepped attack

Isolated attack

Isolated follow-up

Masked Attack

Diversion

Massed Attack

Page 31: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 31

Rapid Detection and Response

Technology works for you

Rapid Response Minimized Impact

Rapid Detection BoundedScope

Mitigation ReducedFrequency

Page 32: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 32

Survival Tasks

• Rapid detection– detecting unauthorized access to data and systems

– detecting unauthorized changes to data and systems

– recognizing suspicious overuse of resources

• Rapid response– analyzing the incident

– disseminating information

– containing the damage

– recovering from the incident

Page 33: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 33

Occupation

• Substance: Cross product of strategy, terrain

• Which are the network nodes that key to victory?

• Which are the network nodes that key to survival?

• What does it mean to occupy networks?

Page 34: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 34

Moonlight Maze

• Sophisticated widespread attack on US military systems

• Goal seems to be intelligence gathering• Compromised accounts• Corrupted system programs• Redirected information (not print, send overseas)• ALL DoD publicly-connected accounts ordered to

have new passwords as of August 16, 1999

• Source: Sunday Times of London, July 25, 1999

Page 35: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 35

Avoidance

• Illnesses: Outside factors that lessen attack

• How do we accommodate to other network attacks?

• How do we deal with real-world events?

• What contingencies must we plan for?

Page 36: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 36

Layered Defenses

Frustrate

Deceive

Recognize

Respond

Goal 1

Goal 2

Goal 3

Goal 4Goal 5

Source: Shawn Butler, Security Attribute Evaluation Method

Goal 6

Goal 7

Goal 8

Page 37: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 37

Preparation: Exercises

• Designed to evaluate level of preparedness

• Run at intervals

• Red team -- attackers

• Blue team -- defenders

• White team -- exercise administrators

• For realism, needs to involve significant part of organization

Page 38: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 38

Desirable Exercises

• Blue team has goal other than defense

• Red team has scenario limiting its exercise

knowledge

• White team enforces rules of engagement

• Red team is visible and vulnerable to blue team

• Blue team is visible and vulnerable to red team

• White team is not visible nor vulnerable in context

Page 39: IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our

IW-Strategy: 39

Factors that Frustrate Exercises

• Exercise has goal other than assurance preparedness

• White team puts artificial limits on red team• Red team has no scenario, nor knowledge limits• Red team not representative of attackers• Red team part of white team, not vulnerable• Red team results are vulnerabilities of blue team,

not operational impact of vulnerabilities