153
Part 2 Access Control 1 Access Control

Part 2 Access Control 1 Access Control Part 2 Access Control 2 Access Control Two parts to access control Authentication: Are you who you say

  • View
    260

  • Download
    4

Embed Size (px)

Citation preview

Page 1: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 1

Access Control

Page 2: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 2

Access Control Two parts to access control Authentication: Are you who you say you

are?o Determine whether access is allowedo Authenticate human to machineo Or authenticate machine to machine

Authorization: Are you allowed to do that?o Once you have access, what can you do?o Enforces limits on actions

Note: “Access control” often used as synonym for authorization

Page 3: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 3

Authentication

Page 4: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 4

Are You Who You Say You Are?

How to authenticate a human to a machine?

Can be based on…o Something you know

For example, a password

o Something you have For example, a smartcard

o Something you are For example, your fingerprint

Page 5: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 5

Something You Know Passwords Lots of things act as passwords!

o PINo Social security numbero Mother’s maiden nameo Date of birtho Name of your pet, etc.

Page 6: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 6

Trouble with Passwords “Passwords are one of the biggest practical

problems facing security engineers today.” “Humans are incapable of securely storing high-

quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed.)”

Page 7: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 7

Why Passwords? Why is “something you know”

more popular than “something you have” and “something you are”?

Cost: passwords are free Convenience: easier for SA to

reset pwd than to issue user a new thumb

Page 8: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 8

Keys vs Passwords

Crypto keys Spse key is 64 bits Then 264 keys Choose key at

random… …then attacker

must try about 263 keys

Passwords Spse passwords are 8

characters, and 256 different characters

Then 2568 = 264 pwds Users do not select

passwords at random Attacker has far less

than 263 pwds to try (dictionary attack)

Page 9: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 9

Good and Bad Passwords Bad passwords

o franko Fidoo passwordo 4444o Pikachuo 102560o AustinStamp

Good Passwords?o jfIej,43j-EmmL+yo 09864376537263o P0kem0No FSa7Yagoo 0nceuP0nAt1m8o PokeGCTall150

Page 10: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 10

Password Experiment Three groups of users each group

advised to select passwords as followso Group A: At least 6 chars, 1 non-lettero Group B: Password based on passphraseo Group C: 8 random characters

Resultso Group A: About 30% of pwds easy to

cracko Group B: About 10% cracked

Passwords easy to remembero Group C: About 10% cracked

Passwords hard to remember

winner

Page 11: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 11

Password Experiment User compliance hard to achieve In each case, 1/3rd did not comply

o And about 1/3rd of those easy to crack! Assigned passwords sometimes best If passwords not assigned, best advice

is…o Choose passwords based on passphraseo Use pwd cracking tool to test for weak pwds

Require periodic password changes?

Page 12: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 12

Attacks on Passwords Attacker could…

o Target one particular accounto Target any account on systemo Target any account on any systemo Attempt denial of service (DoS) attack

Common attack patho Outsider normal user administratoro May only require one weak password!

Page 13: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 13

Password Retry Suppose system locks after 3 bad

passwords. How long should it lock?o 5 secondso 5 minuteso Until SA restores service

What are +’s and -’s of each?

Page 14: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 14

Password File Bad idea to store passwords in a file But need a way to verify passwords Cryptographic solution: hash the

passwordso Store y = h(password)o Can verify entered password by hashingo If Trudy obtains password file, she does not

obtain passwords But Trudy can try a forward search

o Guess x and check whether y = h(x)

Page 15: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 15

Dictionary Attack

Trudy pre-computes h(x) for all x in a dictionary of common passwords

Suppose Trudy gets access to password file containing hashed passwordso She only needs to compare hashes to her

pre-computed dictionaryo That is, same attack will work each time

Can we prevent this attack? Or at least make attacker’s job more difficult?

Page 16: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 16

Password File Store hashed passwords? Better to hash with salt Choose random s and compute

y = h(password, s) and store (s,y) in the password file

Note: The salt s is not secret It is still easy to verify password But Trudy must recompute dictionary

hashes for each user lots more work!

Page 17: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 17

Password Cracking:Do the Math

Assumptions Pwds are 8 chars, 128 choices per character

o Then 1288 = 256 possible passwords There is a password file with 210 pwds Attacker has dictionary of 220 common pwds Probability of 1/4 that a pwd is in dictionary Work is measured by number of hashes

Page 18: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 18

Password Cracking: Case I Attack 1 password without

dictionaryo Must try 256/2 = 255 on averageo Like exhaustive key search

Note that salt or no salt makes no difference in this caseo Why?

Page 19: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 19

Password Cracking: Case II Attack 1 password with dictionary With salt

o Expected work: 1/4 (219) + 3/4 (255) = 254.6

o In practice, try all pwds in dictionary…o …then work is at most 220 and probability of

success is 1/4 What if no salt is used?

o One-time work to compute dictionary: 220

o Expected work still same order as aboveo But with precomputed dictionary hashes, the

“in practice” attack is free…

Page 20: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 20

Password Cracking: Case III

Any of 1024 pwds in file, without dictionaryo Assume all 210 passwords are distinct o Need 255 comparisons before expect to find

pwd If no salt is used

o Each computed hash yields 210 comparisonso So expected work (hashes) is 255/210 = 245

If salt is usedo Expected work is 255 o Each comparison requires a hash computation

Page 21: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 21

Password Cracking: Case IV

Any of 1024 pwds in file, with dictionaryo Prob. one or more pwd in dict.: 1 – (3/4)1024 = 1o So, we ignore case where no pwd is in dictionary

If salt is used, expected work less than 222

o See book, or slide notes for details What if no salt is used?

o If dictionary hashes precomputed, then no worko If dictionary hashes not precomputed, work is

about 219/210 = 29

Page 22: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 22

Other Password Issues Too many passwords to remember

o Results in password reuseo Why is this a problem?

Who suffers from bad password? o Login password vs ATM PIN

Failure to change default passwords Social engineering Error logs may contain “almost”

passwords Bugs, keystroke logging, spyware, etc.

Page 23: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 23

Passwords The bottom line… Password cracking is too easy

o One weak password may break securityo Users choose bad passwordso Social engineering attacks, etc.

Trudy has (almost) all of the advantages

All of the math favors bad guys Passwords are a BIG security problem

o And will continue to be a big problem

Page 24: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 24

Password Cracking Tools Popular password cracking tools

o Password Crackerso Password Portalo L0phtCrack and LC4 (Windows)o John the Ripper (Unix)

Admins should use these tools to test for weak passwords since attackers will!

Good articles on password crackingo Passwords - Conerstone of Computer Securit

yo Passwords revealed by sweet deal

Page 25: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 25

Biometrics

Page 26: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 26

Something You Are Biometric

o “You are your key” Schneier

Are

Know Have

Exampleso Fingerprinto Handwritten signatureo Facial recognitiono Speech recognitiono Gait (walking) recognitiono “Digital doggie” (odor

recognition)o Many more!

Page 27: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 27

Why Biometrics? Biometrics seen as desirable

replacement for passwords Cheap and reliable biometrics needed

o Today, an active area of research Biometrics are used in security today

o Thumbprint mouseo Palm print for secure entryo Fingerprint to unlock car door, etc.

But biometrics not too popularo Has not lived up to its promise (yet?)

Page 28: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 28

Ideal Biometric Universal applies to (almost) everyone

o In reality, no biometric applies to everyone Distinguishing distinguish with certainty

o In reality, cannot hope for 100% certainty Permanent physical characteristic being

measured never changeso In reality, OK if it to remains valid for long time

Collectable easy to collect required data o Depends on whether subjects are cooperative

Safe, easy to use, etc., etc.

Page 29: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 29

Biometric Modes Identification Who goes there?

o Compare one to manyo Example: The FBI fingerprint database

Authentication Are you who you say you are?o Compare one to oneo Example: Thumbprint mouse

Identification problem more difficulto More “random” matches since more comparisons

We are interested in authentication

Page 30: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 30

Enrollment vs Recognition Enrollment phase

o Subject’s biometric info put into databaseo Must carefully measure the required infoo OK if slow and repeated measurement

neededo Must be very preciseo May be weak point of many biometric

Recognition phaseo Biometric detection when used in practiceo Must be quick and simpleo But must be reasonably accurate

Page 31: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 31

Cooperative Subjects? Authentication — cooperative subjects Identification — uncooperative subjects For example, facial recognition

o Proposed for use in Las Vegas casinos to detect known cheaters (and terrorists in airports, etc.)

o Probably do not have ideal enrollment conditions

o Subject will try to confuse recognition phase Cooperative subject makes it much easier!

o We are focused on authenticationo So, subjects are generally cooperative

Page 32: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 32

Biometric Errors Fraud rate versus insult rate

o Fraud Trudy mis-authenticated as Aliceo Insult Alice not authenticated as Alice

For any biometric, can decrease fraud or insult, but other one will increase

For exampleo 99% voiceprint match low fraud, high insulto 30% voiceprint match high fraud, low insult

Equal error rate: rate where fraud == insulto Best metric for comparing different biometrics

Page 33: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 33

Fingerprint History 1823 Professor Johannes Evangelist

Purkinje discussed 9 fingerprint patterns 1856 Sir William Hershel used

fingerprint (in India) on contracts 1880 Dr. Henry Faulds article in

Nature about fingerprints for ID 1883 Mark Twain’s Life on the

Mississippi (murderer ID’ed by fingerprint)

Page 34: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 34

Fingerprint History 1888 Sir Francis Galton developed

classification systemo His system of “minutia” still used todayo Also verified that fingerprints do not change

Some countries require fixed number of points (minutia) to match in criminal caseso In Britain, at least 15 points o In US, no fixed number of points

Page 35: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 35

Fingerprint Comparison

Loop (double) Whorl Arch

Examples of loops, whorls, and arches Minutia extracted from these features

Page 36: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 36

Fingerprint Biometric

Capture image of fingerprint Enhance image Identify minutia

Page 37: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 37

Fingerprint Biometric

Extracted minutia are compared with user’s minutia stored in a database

Is it a statistical match? Aside: Do identical twins’ fingerprints differ

?

Page 38: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 38

Hand Geometry A popular biometric Measures shape of hand

o Width of hand, fingerso Length of fingers, etc.

Human hands not unique Hand geometry sufficient

for many situations OK for authentication Not useful for ID problem

Page 39: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 39

Hand Geometry Advantages

o Quick 1 minute for enrollment, 5 seconds for recognition

o Hands are symmetric so what? Disadvantages

o Cannot use on very young or very oldo Relatively high equal error rate

Page 40: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 40

Iris Patterns

Iris pattern development is “chaotic” Little or no genetic influence Different even for identical twins Pattern is stable through lifetime

Page 41: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 41

Iris Recognition: History 1936 suggested by Frank Burch 1980s James Bond films 1986 first patent appeared 1994 John Daugman patented

best current approacho Patent owned by Iridian Technologies

Page 42: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 42

Iris Scan Scanner locates iris Take b/w photo Use polar coordinates… 2-D wavelet transform Get 256 byte iris code

Page 43: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 43

Measuring Iris Similarity Based on Hamming distance Define d(x,y) to be

o # of non match bits/# of bits comparedo d(0010,0101) = 3/4 and d(101111,101001)

= 1/3 Compute d(x,y) on 2048-bit iris code

o Perfect match is d(x,y) = 0o For same iris, expected distance is 0.08o At random, expect distance of 0.50o Accept as match if distance less than 0.32

Page 44: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 44

Iris Scan Error Rate

distance

0.29

1 in 1.31010

0.30

1 in 1.5109

0.31

1 in 1.8108

0.32

1 in 2.6107

0.33

1 in 4.0106

0.34

1 in 6.9105

0.35

1 in 1.3105

distance Fraud rate

== equal error rate

Page 45: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 45

Attack on Iris Scan Good photo of eye can be scanned

o Attacker could use photo of eye

Afghan woman was authenticated by iris scan of old photoo Story is here

To prevent attack, scanner could use light to be sure it is a “live” iris

Page 46: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 46

Equal Error Rate Comparison

Equal error rate (EER): fraud == insult rate Fingerprint biometric has EER of about 5% Hand geometry has EER of about 10-3

In theory, iris scan has EER of about 10-6

o But in practice, may be hard to achieveo Enrollment phase must be extremely accurate

Most biometrics much worse than fingerprint! Biometrics useful for authentication…

o …but identification biometrics almost useless today

Page 47: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 47

Biometrics: The Bottom Line

Biometrics are hard to forge But attacker could

o Steal Alice’s thumbo Photocopy Bob’s fingerprint, eye, etc.o Subvert software, database, “trusted path”

… And how to revoke a “broken”

biometric? Biometrics are not foolproof! Biometric use is limited today That should change in the (near?) future

Page 48: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 48

Something You Have Something in your possession Examples include following…

o Car keyo Laptop computer (or specific MAC address)o Password generator (we’ll look at this next)o ATM card, smartcard, etc.

Page 49: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 49

Password Generator

Alice receives random “challenge” R from Bob Alice enters PIN and R in password generator Password generator hashes symmetric key K

with R Alice sends “response”, h(K,R), back to Bob Bob verifies response Note: Alice has pwd generator and knows PIN

AliceBob

K

1. “I’m Alice”

2. R

5. h(K,R)

3. PIN, R

4. h(K,R)

passwordgenerator

K

Page 50: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 50

2-factor Authentication Requires any 2 out of 3 of

o Something you knowo Something you haveo Something you are

Exampleso ATM: Card and PINo Credit card: Card and signatureo Password generator: Device and PINo Smartcard with password/PIN

Page 51: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 51

Single Sign-on A hassle to enter password(s) repeatedly

o Users want to authenticate only onceo “Credentials” stay with user wherever he goeso Subsequent authentication is transparent to user

Kerberos --- example single sign-on protocol Single sign-on for the Internet?

o Microsoft: Passporto Everybody else: Liberty Allianceo Security Assertion Markup Language (SAML)

Page 52: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 52

Web Cookies Cookie is provided by a Website and

stored on user’s machine Cookie indexes a database at Website Cookies maintain state across sessions

o Web uses a stateless protocol: HTTP Cookies also maintain state within a

session Sorta like a single sign-on for a website

o But, a very, very weak form of authentication Cookies also create privacy concerns

Page 53: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 53

Authorization

Page 54: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 54

Authentication vs Authorization

Authentication Are you who you say you are?o Restrictions on who (or what) can access system

Authorization Are you allowed to do that?o Restrictions on actions of authenticated users

Authorization is a form of access control Authorization enforced by

o Access Control Lists (ACLs)o Capabilities (C-lists)

Page 55: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 55

Lampson’s Access Control Matrix

rx rx r --- ---

rx rx r rw rw

rwx rwx r rw rw

rx rx rw rw rw

OSAccounting

programAccounting

dataInsurance

dataPayrolldata

Bob

Alice

Sam

Accountingprogram

Subjects (users) index the rows Objects (resources) index the columns

Page 56: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 56

Are You Allowed to Do That?

Access control matrix has all relevant info

But how to manage a large matrix? Could be 1000’s of users, 1000’s of

resources Then matrix with 1,000,000’s of entries Need to check this matrix before access to

any resource is allowed Hopelessly inefficient…

Page 57: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 57

Access Control Lists (ACLs) ACL: store access control matrix by column Example: ACL for insurance data is in blue

rx rx r --- ---

rx rx r rw rw

rwx rwx r rw rw

rx rx rw rw rw

OSAccounting

programAccounting

dataInsurance

dataPayrolldata

Bob

Alice

Sam

Accountingprogram

Page 58: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 58

Capabilities (or C-Lists) Store access control matrix by row Example: Capability for Alice is in red

rx rx r --- ---

rx rx r rw rw

rwx rwx r rw rw

rx rx rw rw rw

OSAccounting

programAccounting

dataInsurance

dataPayrolldata

Bob

Alice

Sam

Accountingprogram

Page 59: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 59

ACLs vs Capabilities

Note that arrows point in opposite directions… With ACLs, need to associate users to files

Access Control List Capability

file1

file2

file3

file1

file2

file3

r---r

Alice

Bob

Fred

wr

---

rwrr

Alice

Bob

Fred

rwrw

---rr

r---r

Page 60: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 60

Confused Deputy Two resources

o Compiler and BILL file (billing info)

Compiler can write file BILL

Alice can invoke compiler with a debug filename

Alice not allowed to write to BILL

Access control matrix

x ---

rx rw

Compiler BILL

Alice

Compiler

Page 61: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 61

ACL’s and Confused Deputy

Compiler is deputy acting on behalf of Alice Compiler is confused

o Alice is not allowed to write BILL Compiler has confused its rights with Alice’s

Alice BILL

Compiler

debug

filename BILLBILL

Page 62: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 62

Confused Deputy Compiler acting for Alice is confused There has been a separation of

authority from the purpose for which it is used

With ACLs, difficult to avoid this problem With Capabilities, easier to prevent

problemo Must maintain association between authority

and intended purposeo Capabilities also easy to delegate authority

Page 63: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 63

ACLs vs Capabilities ACLs

o Good when users manage their own fileso Protection is data-orientedo Easy to change rights to a resource

Capabilitieso Easy to delegateo Easy to add/delete userso Easier to avoid the confused deputyo More difficult to implemento The “Zen of information security”

Capabilities loved by academics o Capability Myths Demolished

Page 64: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 64

Multilevel Security (MLS) Models

Page 65: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 65

Classifications and Clearances

Classifications apply to objects Clearances apply to subjects US Department of Defense uses 4

levels of classifications/clearancesTOP SECRETSECRETCONFIDENTIALUNCLASSIFIED

Page 66: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 66

Clearances and Classification

To obtain a SECRET clearance requires a routine background check

A TOP SECRET clearance requires extensive background check

Practical classification problemso Proper classification not always clearo Level of granularity to apply classificationso Aggregation flipside of granularity

Page 67: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 67

Subjects and Objects Let O be an object, S a subject

o O has a classificationo S has a clearanceo Security level denoted L(O) and L(S)

For DoD levels, we haveTOP SECRET > SECRET > CONFIDENTIAL >

UNCLASSIFIED

Page 68: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 68

Multilevel Security (MLS) MLS needed when subjects/objects at

different levels use/on same system MLS is a form of Access Control Military and government interest in MLS

for many decades o Lots of funded research into MLSo Strengths and weaknesses of MLS well

understood (but, almost entirely theoretical)o Many possible uses of MLS outside military

Page 69: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 69

MLS Applications Classified government/military information Business example: info restricted to

o Senior management only, all management, everyone in company, or general public

Network firewall Confidential medical info, databases, etc. Usually, MLS not a viable technical system

o More a legal device than technical system

Page 70: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 70

MLS Security Models MLS models explain what needs to be

done Models do not tell you how to implement Models are descriptive, not prescriptive

o That is, high level description, not an algorithm There are many MLS models We’ll discuss simplest MLS model

o Other models are more realistico Other models also more complex, more

difficult to enforce, harder to verify, etc.

Page 71: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 71

Bell-LaPadula BLP security model designed to express

essential requirements for MLS BLP deals with confidentiality

o To prevent unauthorized reading Recall that O is an object, S a subject

o Object O has a classificationo Subject S has a clearanceo Security level denoted L(O) and L(S)

Page 72: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 72

Bell-LaPadula BLP consists of

Simple Security Condition: S can read O if and only if L(O) L(S)

*-Property (Star Property): S can write O if and only if L(S) L(O)

No read up, no write down

Page 73: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 73

McLean’s Criticisms of BLP McLean: BLP is “so trivial that it is hard to

imagine a realistic security model for which it does not hold”

McLean’s “system Z” allowed administrator to reclassify object, then “write down”

Is this fair? Violates spirit of BLP, but not expressly

forbidden in statement of BLP Raises fundamental questions about the

nature of (and limits of) modeling

Page 74: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 74

B and LP’s Response BLP enhanced with tranquility property

o Strong tranquility property: security labels never changeo Weak tranquility property: security label can only

change if it does not violate “established security policy”

Strong tranquility impractical in real worldo Often want to enforce “least privilege”o Give users lowest privilege needed for current worko Then upgrade privilege as needed (and allowed by

policy)o This is known as the high water mark principle

Weak tranquility allows for least privilege (high water mark), but the property is vague

Page 75: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 75

BLP: The Bottom Line

BLP is simple, probably too simple BLP is one of the few security models

that can be used to prove things about systems

BLP has inspired other security modelso Most other models try to be more realistico Other security models are more complexo Models difficult to analyze, apply in practice

Page 76: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 76

Biba’s Model BLP for confidentiality, Biba for

integrityo Biba is to prevent unauthorized writing

Biba is (in a sense) the dual of BLP Integrity model

o Spse you trust the integrity of O but not Oo If object O includes O and O then you

cannot trust the integrity of O Integrity level of O is minimum of the

integrity of any object in O Low water mark principle for integrity

Page 77: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 77

Biba Let I(O) denote the integrity of object O

and I(S) denote the integrity of subject S

Biba can be stated asWrite Access Rule: S can write O if and

only if I(O) I(S)(if S writes O, the integrity of O that of S)

Biba’s Model: S can read O if and only if I(S) I(O)

(if S reads O, the integrity of S that of O) Often, replace Biba’s Model with

Low Water Mark Policy: If S reads O, then I(S) = min(I(S), I(O))

Page 78: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 78

BLP vs Biba

level

high

low

L(O)

L(O) L(O)

Confidentiality

BLP

I(O)

I(O)

I(O)

Biba

level

high

lowIntegrity

Page 79: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 79

Compartments

Page 80: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 80

Compartments Multilevel Security (MLS) enforces access

control up and down Simple hierarchy of security labels may not

be flexible enough Compartments enforces restrictions across Suppose TOP SECRET divided into TOP

SECRET {CAT} and TOP SECRET {DOG} Both are TOP SECRET but information flow

restricted across the TOP SECRET level

Page 81: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 81

Compartments Why compartments?

o Why not create a new classification level? May not want either of

o TOP SECRET {CAT} TOP SECRET {DOG}o TOP SECRET {DOG} TOP SECRET {CAT}

Compartments designed to enforce the need to know principleo Regardless of your clearance, you only have

access to info that you need to know

Page 82: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 82

Compartments Arrows indicate “” relationship

Not all classifications are comparable, e.g.,

TOP SECRET {CAT} vs SECRET {CAT, DOG}

TOP SECRET {CAT, DOG}

TOP SECRET {CAT}

TOP SECRET

SECRET {CAT, DOG}

SECRET {DOG}

SECRET

TOP SECRET {DOG}

SECRET {CAT}

Page 83: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 83

MLS vs Compartments MLS can be used without compartments

o And vice-versa But, MLS almost always uses

compartments Example

o MLS mandated for protecting medical records of British Medical Association (BMA)

o AIDS was TOP SECRET, prescriptions SECRETo What is the classification of an AIDS drug?o Everything tends toward TOP SECRETo Defeats the purpose of the system!

Compartments-only approach used instead

Page 84: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 84

Covert Channel

Page 85: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 85

Covert Channel MLS designed to restrict legitimate

channels of communication May be other ways for information to flow For example, resources shared at different

levels may “signal” information Covert channel: a communication path

not intended as such by system’s designers

Page 86: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 86

Covert Channel Example Alice has TOP SECRET clearance, Bob

has CONFIDENTIAL clearance Suppose the file space shared by all

users Alice creates file FileXYzW to signal “1”

to Bob, and removes file to signal “0” Once per minute Bob lists the files

o If file FileXYzW does not exist, Alice sent 0o If file FileXYzW exists, Alice sent 1

Alice can leak TOP SECRET info to Bob!

Page 87: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 87

Covert Channel Example

Alice:

Time:

Create file Delete file Create file Delete file

Bob: Check file Check file Check file Check fileCheck file

Data: 1 0 1 01

Page 88: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 88

Covert Channel Other possible covert channels?

o Print queueo ACK messageso Network traffic, etc., etc., etc.

When does covert channel exist?1. Sender and receiver have a shared

resource2. Sender able to vary some property of

resource that receiver can observe3. “Communication” between sender and

receiver can be synchronized

Page 89: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 89

Covert Channel Covert channels exist almost everywhere “Easy” to eliminate covert channels:

o Eliminate all shared resources…o …and all communication

Virtually impossible to eliminate covert channels in any useful systemo DoD guidelines: goal is to reduce covert

channel capacity to no more than 1 bit/second

o Implication? DoD has given up on eliminating covert channels!

Page 90: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 90

Covert Channel Consider 100MB TOP SECRET file

o Plaintext stored in TOP SECRET locationo Ciphertext (encrypted with AES using 256-

bit key) stored in UNCLASSIFIED location Suppose we reduce covert channel

capacity to 1 bit per second It would take more than 25 years to

leak entire document thru a covert channel

But it would take less than 5 minutes to leak 256-bit AES key thru covert channel!

Page 91: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 91

Real-World Covert Channel

Hide data in TCP header “reserved” field Or use covert_TCP, tool to hide data in

o Sequence numbero ACK number

Page 92: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 92

Real-World Covert Channel Hide data in TCP sequence numbers Tool: covert_TCP Sequence number X contains covert info

A. Covert_TCPsender

C. Covert_TCP receiver

B. Innocent server

SYNSpoofed source: CDestination: BSEQ: X

ACK (or RST)Source: BDestination: CACK: X

Page 93: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 93

Inference Control

Page 94: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 94

Inference Control Example

Suppose we query a databaseo Question: What is average salary of female

CS professors at SJSU?o Answer: $95,000o Question: How many female CS professors

at SJSU?o Answer: 1

Specific information has leaked from responses to general questions!

Page 95: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 95

Inference Control and Research

For example, medical records are private but valuable for research

How to make info available for research and protect privacy?

How to allow access to such data without leaking specific information?

Page 96: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 96

Naïve Inference Control

Remove names from medical records?

Still may be easy to get specific info from such “anonymous” data

Removing names is not enougho As seen in previous example

What more can be done?

Page 97: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 97

Less-naïve Inference Control

Query set size controlo Don’t return an answer if set size is too

small N-respondent, k% dominance rule

o Do not release statistic if k% or more contributed by N or fewer

o Example: Avg salary in Bill Gates’ neighborhood

o This approach used by US Census Bureau Randomization

o Add small amount of random noise to data Many other methods none satisfactory

Page 98: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 98

Inference Control Robust inference control may be impossible Is weak inference control better than

nothing?o Yes: Reduces amount of information that leaks

Is weak covert channel protection better than nothing?o Yes: Reduces amount of information that leaks

Is weak crypto better than no crypto?o Probably not: Encryption indicates important

datao May be easier to filter encrypted data

Page 99: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 99

CAPTCHA

Page 100: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 100

Turing Test Proposed by Alan Turing in 1950 Human asks questions to one human and

one computer (without seeing either) If human questioner cannot distinguish

the human from the computer responder, computer passes the test

The gold standard in artificial intelligence

No computer can pass this todayo But some claim to be close to passing

Page 101: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 101

CAPTCHA CAPTCHA Completely Automated Public

Turing test to tell Computers and Humans Apart

Automated test is generated and scored by a computer program

Public program and data are public Turing test to tell… humans can pass the

test, but machines cannot pass the test Also known as HIP == Human Interactive

Proof Like an inverse Turing test (sort of…)

Page 102: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 102

CAPTCHA Paradox? “…CAPTCHA is a program that can

generate and grade tests that it itself cannot pass…”o “…much like some professors…”

Paradox computer creates and scores test that it cannot pass!

CAPTCHA used so that only humans can get access (i.e., no bots/computers)

CAPTCHA is for access control

Page 103: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 103

CAPTCHA Uses? Original motivation: automated bots stuffed

ballot box in vote for best CS schoolo SJSU vs Stanford?

Free email services spammers like to use bots to sign up for 1000’s of email accountso CAPTCHA employed so only humans can get accts

Sites that do not want to be automatically indexed by search engineso CAPTCHA would force human intervention

Page 104: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 104

CAPTCHA: Rules of the Game

Easy for most humans to pass Difficult or impossible for machines to

passo Even with access to CAPTCHA software

From Trudy’s perspective, the only unknown is a random numbero Somewhat analogous to Kerckhoffs’ Principle

Desirable to have different CAPTCHAs in case some person cannot pass one typeo Blind person could not pass visual test, etc.

Page 105: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 105

Do CAPTCHAs Exist? Test: Find 2 words in the following

Easy for most humans A (difficult?) OCR problem for computer

Page 106: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 106

CAPTCHAs Current types of CAPTCHAs

o Visual like previous exampleo Audio distorted words or music

No text-based CAPTCHAso May be this is impossible…

Page 107: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 107

CAPTCHA’s and AI OCR is a challenging AI problem

o Hard part is the segmentation problemo Humans good at solving this problem

Distorted sound makes good CAPTCHAo Humans also good at solving this

Hackers who break CAPTCHA have solved a hard AI problemo So, putting hacker’s effort to good use!

Other ways to defeat CAPTCHAs???

Page 108: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 108

Firewalls

Page 109: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 109

Firewalls

Firewall must determine what to let in to internal network and/or what to let out

Access control for the network

InternetInternalnetworkFirewall

Page 110: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 110

Firewall as Secretary A firewall is like a secretary To meet with an executive

o First contact the secretaryo Secretary decides if meeting is importanto So, secretary filters out many requests

You want to meet chair of CS department?o Secretary does some filtering

You want to meet the POTUS?o Secretary does lots of filtering

Page 111: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 111

Firewall Terminology No standard firewall terminology Types of firewalls

o Packet filter works at network layero Stateful packet filter transport

layero Application proxy application layer

Also, personal firewall for single user, home network, etc.

Page 112: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 112

Packet Filter Operates at network layer Can filters based on…

o Source IP addresso Destination IP addresso Source Porto Destination Porto Flag bits (SYN, ACK, etc.)o Egress or ingress

application

transport

network

link

physical

Page 113: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 113

Packet Filter Advantages?

o Speed Disadvantages?

o No concept of stateo Cannot see TCP connectionso Blind to application data

application

transport

network

link

physical

Page 114: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 114

Packet Filter Configured via Access Control Lists (ACLs)

o Different meaning than at start of Chapter 8

Allow Inside Outside Any 80 HTTP

Allow Outside Inside 80 > 1023 HTTP

Deny All All All All All

Action

Source IP

Dest IP

Source

Port

Dest Port Protoco

l

Intention? Restrict traffic to Web browsing

Any

ACK

All

FlagBits

Page 115: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 115

TCP ACK Scan Attacker scans for open ports thru firewall

o Port scanning is first step in many attacks

Attacker sends packet with ACK bit set, without prior 3-way handshake

Violates TCP/IP protocol ACK packet pass thru packet filter firewall

o Appears to be part of an ongoing connection

RST sent by recipient of such packet

Page 116: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 116

TCP ACK Scan

Attacker knows port 1209 open thru firewall A stateful packet filter can prevent this (next)

o Since ACK scans not part of established connection

PacketFilter

Trudy InternalNetwork

ACK dest port 1207

ACK dest port 1208

ACK dest port 1209

RST

Page 117: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 117

Stateful Packet Filter

Adds state to packet filter Operates at transport layer Remembers TCP

connections, flag bits, etc. Can even remember UDP

packets (e.g., DNS requests)

application

transport

network

link

physical

Page 118: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 118

Stateful Packet Filter Advantages?

o Can do everything a packet filter can do plus...

o Keep track of ongoing connections

o Prevents TCP ACK scan, for example

Disadvantages?o Cannot see application datao Slower than packet filtering

application

transport

network

link

physical

Page 119: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 119

Application Proxy A proxy is something

that acts on your behalf Application proxy looks at

incoming application data Verifies that data is safe

before letting it in

application

transport

network

link

physical

Page 120: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 120

Application Proxy Advantages?

o Complete view of connections and applications data

o Filter bad data at application layer (viruses, Word macros)

Disadvantages?o Speed

application

transport

network

link

physical

Page 121: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 121

Application Proxy Creates a new packet before sending it

thru to internal network Attacker must talk to proxy and

convince it to forward message Proxy has complete view of connection Prevents some scans stateful packet

filter cannot next slides

Page 122: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 122

Firewalk Tool to scan for open ports thru firewall Attacker knows IP address of firewall and

IP address of one system inside firewallo Set TTL to 1 more than number of hops to

firewall, and set destination port to N

If firewall allows data on port N thru firewall, get time exceeded error message o Otherwise, no response

Page 123: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 123

Firewalk and Proxy Firewall

This will not work thru an application proxy (why?) The proxy creates a new packet, destroys old TTL

Dest port 12345, TTL=4

Dest port 12344, TTL=4

Dest port 12343, TTL=4

Time exceeded

Trudy

Packetfilter

RouterRouterRouter

Page 124: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 124

Personal Firewall To protect one user or home

network Can use any of the methods

o Packet filtero Stateful packet filtero Application proxy

Page 125: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 125

Firewalls and Defense in Depth

Typical network security architecture

Internet

Intranet withPersonalFirewalls

PacketFilter

ApplicationProxy

DMZ

FTP server

DNS server

Web server

Page 126: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 126

Intrusion Detection Systems

Page 127: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 127

Intrusion Prevention Want to keep bad guys out Intrusion prevention is a traditional

focus of computer securityo Authentication is to prevent intrusionso Firewalls a form of intrusion preventiono Virus defenses aimed at intrusion

preventiono Like locking the door on your car

Page 128: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 128

Intrusion Detection In spite of intrusion prevention, bad guys

will sometime get in Intrusion detection systems (IDS)

o Detect attacks in progress (or soon after)

o Look for unusual or suspicious activity

IDS evolved from log file analysis IDS is currently a hot research topic How to respond when intrusion detected?

o We don’t deal with this topic here…

Page 129: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 129

Intrusion Detection Systems

Who is likely intruder?o May be outsider who got thru firewallo May be evil insider

What do intruders do?o Launch well-known attackso Launch variations on well-known attackso Launch new/little-known attackso “Borrow” system resourceso Use compromised system to attack others. etc.

Page 130: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 130

IDS Intrusion detection approaches

o Signature-based IDS

o Anomaly-based IDS

Intrusion detection architectureso Host-based IDS

o Network-based IDS

Any IDS can be classified as aboveo In spite of marketing claims to the contrary!

Page 131: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 131

Host-Based IDS Monitor activities on hosts for

o Known attacks

o Suspicious behavior

Designed to detect attacks such aso Buffer overflow

o Escalation of privilege, …

Little or no view of network activities

Page 132: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 132

Network-Based IDS Monitor activity on the network for…

o Known attackso Suspicious network activity

Designed to detect attacks such aso Denial of serviceo Network probeso Malformed packets, etc.

Some overlap with firewall Little or no view of host-base attacks Can have both host and network IDS

Page 133: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 133

Signature Detection Example

Failed login attempts may indicate password cracking attack

IDS could use the rule “N failed login attempts in M seconds” as signature

If N or more failed login attempts in M seconds, IDS warns of attack

Note that such a warning is specifico Admin knows what attack is suspectedo Easy to verify attack (or false alarm)

Page 134: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 134

Signature Detection

Suppose IDS warns whenever N or more failed logins in M secondso Set N and M so false alarms not commono Can do this based on “normal” behavior

But, if Trudy knows the signature, she can try N 1 logins every M seconds…

Then signature detection slows down Trudy, but might not stop her

Page 135: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 135

Signature Detection

Many techniques used to make signature detection more robust

Goal is to detect “almost” signatures For example, if “about” N login attempts

in “about” M secondso Warn of possible password cracking attempto What are reasonable values for “about”?o Can use statistical analysis, heuristics, etc.o Must not increase false alarm rate too much

Page 136: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 136

Signature Detection Advantages of signature detection

o Simpleo Detect known attackso Know which attack at time of detectiono Efficient (if reasonable number of signatures)

Disadvantages of signature detectiono Signature files must be kept up to dateo Number of signatures may become largeo Can only detect known attackso Variation on known attack may not be

detected

Page 137: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 137

Anomaly Detection Anomaly detection systems look for

unusual or abnormal behavior There are (at least) two challenges

o What is normal for this system?

o How “far” from normal is abnormal?

No avoiding statistics here!o mean defines normal

o variance gives distance from normal to abnormal

Page 138: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 138

What is Normal? Consider the scatterplot below

x

y

White dot is “normal”

Is red dot normal? Is green dot

normal? How abnormal is

the blue dot? Stats can be tricky!

Page 139: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 139

How to Measure Normal?

How to measure normal?o Must measure during “representative”

behavioro Must not measure during an attack…o …or else attack will seem normal!o Normal is statistical meano Must also compute variance to have

any reasonable idea of abnormal

Page 140: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 140

How to Measure Abnormal?

Abnormal is relative to some normalo Abnormal indicates possible attack

Statistical discrimination techniques include o Bayesian statisticso Linear discriminant analysis (LDA)o Quadratic discriminant analysis (QDA)o Neural nets, hidden Markov models (HMMs),

etc. Fancy modeling techniques also used

o Artificial intelligenceo Artificial immune system principleso Many, many, many others

Page 141: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 141

Anomaly Detection (1) Spse we monitor use of three commands:

open, read, close Under normal use we observe Alice:

open, read, close, open, open, read, close, … Of the six possible ordered pairs, we see

four pairs are normal for Alice,(open,read), (read,close), (close,open), (open,open)

Can we use this to identify unusual activity?

Page 142: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 142

Anomaly Detection (1)

We monitor use of the three commands

open, read, close If the ratio of abnormal to normal pairs is

“too high”, warn of possible attack Could improve this approach by

o Also use expected frequency of each pairo Use more than two consecutive commandso Include more commands/behavior in the

modelo More sophisticated statistical discrimination

Page 143: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 143

Anomaly Detection (2) Over time, Alice

has accessed file Fn at rate Hn

H0 H1 H2 H3

.10 .40 .40 .10

Is this normal use for Alice? We compute S = (H0A0)2+(H1A1)2+…+(H3A3)2

= .02o We consider S < 0.1 to be normal, so this is normal

How to account for use that varies over time?

Recently, “Alice” has accessed Fn at rate An

A0 A1 A2 A3

.10 .40 .30 .20

Page 144: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 144

Anomaly Detection (2) To allow “normal” to adapt to new use, we

update averages: Hn = 0.2An + 0.8Hn

In this example, Hn are updated… H2=.2.3+.8.4=.38 and H3=.2.2+.8.1=.12

And we now have

H0 H1 H2 H3

.10 .40 .38 .12

Page 145: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 145

Anomaly Detection (2) The updated long

term average is

H0 H1 H2 H3

.10 .40 .38 .12

Is this normal use? Compute S = (H0A0)2+…+(H3A3)2 = .0488

o Since S = .0488 < 0.1 we consider this normal And we again update the long term

averages: Hn = 0.2An + 0.8Hn

Suppose new observed rates…

A0 A1 A2 A3

.10 .30 .30 .30

Page 146: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 146

Anomaly Detection (2) The starting

averages were

H0 H1 H2 H3

.10 .40 .40 .10

Statistics slowly evolve to match behavior This reduces false alarms for admin But also opens an avenue for attack…

o Suppose Trudy always wants to access F3

o Can she convince IDS this is normal for Alice?

After 2 iterations, averages are

H0 H1 H2 H3

.10 .38.364

.156

Page 147: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 147

Anomaly Detection (2) To make this approach more robust, must

incorporate the variance Can also combine N stats Si as, say,

T = (S1 + S2 + S3 + … + SN) / N

to obtain a more complete view of “normal”

Similar (but more sophisticated) approach is used in an IDS known as NIDES

NIDES combines anomaly & signature IDS

Page 148: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 148

Anomaly Detection Issues Systems constantly evolve and so must IDS

o Static system would place huge burden on admin

o But evolving IDS makes it possible for attacker to (slowly) convince IDS that an attack is normal

o Attacker may win simply by “going slow” What does “abnormal” really mean?

o Indicates there may be an attacko Might not be any specific info about “attack”o How to respond to such vague information?o In contrast, signature detection is very specific

Page 149: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 149

Anomaly Detection Advantages?

o Chance of detecting unknown attacks Disadvantages?

o Cannot use anomaly detection alone…o …must be used with signature detectiono Reliability is unclearo May be subject to attacko Anomaly detection indicates “something

unusual”, but lacks specific info on possible attack

Page 150: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 150

Anomaly Detection: The Bottom Line

Anomaly-based IDS is active research topic Many security experts have high hopes for

its ultimate success Often cited as key future security

technology Hackers are not convinced!

o Title of a talk at Defcon: “Why Anomaly-based IDS is an Attacker’s Best Friend”

Anomaly detection is difficult and tricky As hard as AI?

Page 151: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 151

Access Control Summary

Authentication and authorizationoAuthentication who goes

there? Passwords something you know Biometrics something you are

(you are your key) Something you have

Page 152: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 152

Access Control Summary Authorization are you allowed to do

that?o Access control matrix/ACLs/Capabilitieso MLS/Multilateral securityo BLP/Bibao Covert channelo Inference controlo CAPTCHAo Firewallso IDS

Page 153: Part 2  Access Control 1 Access Control Part 2  Access Control 2 Access Control  Two parts to access control  Authentication: Are you who you say

Part 2 Access Control 153

Coming Attractions… Security protocols

o Generic authentication protocolso SSHo SSLo IPSeco Kerberoso WEPo GSM

We’ll see lots of crypto applications in the protocol chapters