Value Driven Security Threat Modeling for Off The Shelf Software Systems

advertisement
University of Southern California
Center for Systems and Software Engineering
Value Driven Security Threat Modeling
for Off The Shelf Software Systems
Yue Chen
USC Center for Systems and Software Engineering
Emails: {yuec, boehm, lshep}@usc.edu
Feb 14, 2007
CSSE Annual Research Review
Los Angeles, U.S.A.
©USC-CSSE
1
University of Southern California
Center for Systems and Software Engineering
Trends: Increasing Concerns on COTS
Vulnerability
Increasing Trend of COTS Based Applications
• Increasing COTS
usage
Data source: [Boehm et al
2003][Standish]
• Increasing
number of COTS
vulnerabilities
published
Data source: [CERT
Statistics]
©USC-CSSE
2
Introduction
University of Southern California
Center for Systems and Software Engineering
Prioritizing COTS Vulnerability is Important
• Significant Loss: CSI/FBI 2006 Survey reported a
total loss of $52,494,290 caused by security
incidents from 313 organizations
• Limited resources for security: 47% spend equal or
less than 2% in IT security
Data source: CSI/FBI Computer Crime and Security Survey 2006
• Challenge: How to spend limited amount of security
resources smartly?
©USC-CSSE
3
Introduction
University of Southern California
Center for Systems and Software Engineering
Current Practices
• System context neutral, static vulnerability rankings
are recommended by authority organizations such
as BugTraq/Symantec, CERT, ISS, NIST, Microsoft,
SANS
• Coarse granularity of rankings: three ~ four levels of
rankings (e.g. Critical, Important, Moderate, Low)
are used to differentiate 23,620 known COTS
vulnerabilities
• An Real-life Story
– USC Ticketing Office System (Source: USC-ISD)
• Decisions made based on [Butler, 2002]
– Best knowledge
– Individual experience
– Ad hoc
©USC-CSSE
4
Introduction
University of Southern California
Center for Systems and Software Engineering
Proposal: Threat Modeling framework based
on Attack Path analysis (T-MAP)
A novel threat modeling framework for COTS based
systems that is sensitive to system stakeholder value
context, dynamic, and tool-automated
Current Approaches:
COTS
Vulnerability
COTS
Vulnerability
Rankings
Value Neutral
Assessment
T- MAP:
COTS
Vulnerability
Value Neutral
Assessment
Scenario
Evaluation
COTS
Vulnerability
Rankings
Evaluation criteria
based on
stakeholder value
propositions
©USC-CSSE
5
Introduction
University of Southern California
Center for Systems and Software Engineering
Nature of The Problem
Attacking Paths
Permitted Ports
Unblocked vulnerabilities
Vulnerabilities impacting
confidentiality, availability,
integrity
Blocked vulnerabilities
Firewall Wrapper
e.g. Windows Server
2003
e.g. SQL Server
2000
Software Applications, COTS
e.g. Web Server
e.g. IIS 6.0
e.g. CRM Server
IT Infrastructure
e.g. Regulatory
Productivity
Org. Values
©USC-CSSE
Reputation
T-MAP 6
Framework
University of Southern California
Center for Systems and Software Engineering
Castle Defense Analog
Measure the security of a castle by the value of
treasures in the castle, the number of holes on the
walls, as well as the size of the holes.
©USC-CSSE
T-MAP 7
Framework
University of Southern California
Center for Systems and Software Engineering
T-MAP Framework
• Step 1: Identify key stakeholders and value propositions (the treasures in
the castle);
• Step 2: Establish a set of security evaluation criteria based on
stakeholder value propositions;
• Step 3: Use tool to enumerate and analyze attack paths based on a
comprehensive COTS vulnerability database containing 23,620
vulnerability information (the holes);
• Step 4: Evaluate the severity of each scenario in terms of numeric ratings
against the evaluation criteria established in Step 2 (the size of the
holes);
• Step 5: The security threat of each vulnerability is quantified with the total
severity ratings of all attack paths that are relevant to this vulnerability;
• Step 6: System total threat is quantified with the total severity ratings of
all attack paths;
[Note] Step 3 to 6 are tool automated by the Tiramisu Tool
©USC-CSSE
T-MAP 8
Framework
University of Southern California
Center for Systems and Software Engineering
Step 1-2: Evaluate Security against Criteria
based on Stakeholder/Values
• Evaluate the severity of security hazard scenarios
against stakeholder/value impacts
• Involves both qualitative and quantitative criteria
• Technical approach: Figure of Merits and Analytical
Hierarchy Process (AHP)
– A convenient tool to determine the priority of alternatives in terms
of weight through pair-wise comparison
– Invented by Dr. Saaty at Business School of Univ. of Pennsylvania
in 1970s [Saaty, 1980]
– Recommended by Dr. Bodin, Dr. Gordon et al for security
investment evaluation [Bodin et al, 2005]
©USC-CSSE
T-MAP 9
Framework
University of Southern California
Center for Systems and Software Engineering
Using AHP Determine the Weights
– An Example
Example (from USC ISD Server X Case Study)
Weights derived
through AHP
pair-wise comparisons
Possible
Breach
Scenarios
Value Centric
Criteria
©USC-CSSE
T-MAP 10
Framework
University of Southern California
Center for Systems and Software Engineering
Step 3-4: Enumerate Attack Scenarios
• Enumerate the scenarios how an attacker can compromise
stakeholder values through COTS system vulnerabilities
• Establish Structured Attack Graph based on a comprehensive
COTS vulnerability database involves 23,620 known vulnerabilities
reside in 31,713 COTS software
©USC-CSSE
T-MAP 11
Framework
University of Southern California
Center for Systems and Software Engineering
Step 5: Vulnerability Technical
Severity Evaluation
• Vulnerability Technical
Severity Attributes
– Impact on confidentiality,
integrity and/or availability
– Remotely exploitable
– Require valid user account
on victim host
– Needs user activities
Based on an emerging national
standard [CVSS] by NIST
©USC-CSSE
T-MAP 12
Framework
University of Southern California
Center for Systems and Software Engineering
Step 6 T-MAP Severity Rating System
• Severity Weight of Attack Path P:
• Overall Security Threat Score of COTS System G:
• ThreatKey of elements in Attack Graph:
• Effectiveness of Security Practice:
©USC-CSSE
T-MAP 13
Framework
University of Southern California
Center for Systems and Software Engineering
Security Investment Effectiveness
Estimation
• How much security threats can be avoided by implementing
Firewall, Software hardening (patching), user account control, or
file system encryption?
• Results as well depends on the total value of the protected system
* Case study results estimated by professional security manager at USC-ITS
T-MAP 14
©USC-CSSE
Framework
University of Southern California
Center for Systems and Software Engineering
Tool Implementation – Project Code:
Tiramisu
High-level software architecture
How it works?
NIST
FrSIRT
Microsoft
CERT
SANS
Symantec
BugTraq
Vulnerability Information
Scrawling Engine
T-MAP
Tiramisu
Front End
Vulnerability DB
Tiramisu Tool
©USC-CSSE
T-MAP 15
Implementation
University of Southern California
Center for Systems and Software Engineering
Security Manager’s Ranking vs.
Tiramisu Ranking
©USC-CSSE
T-MAP 16
Framework
University of Southern California
Center for Systems and Software Engineering
Security Economics in Patching
• Prioritize COTS Based System vulnerabilities under business
context
– “20% percent of vulnerabilities causes 80% of the security
risks”, T-MAP tells what are the 20%
• Rational: Prioritize vulnerabilities with its ThreatKey;
• Example screenshot:
©USC-CSSE
17
University of Southern California
Center for Systems and Software Engineering
COTS Security Economics –
Finding Sweet Spots
• Sweet spot to invest in
• Economic curve of security
security
patching
• Also driven by the total
(from USC Server X case study)
value of system
(from USC Server X case study)
Sweet spots to invest
©USC-CSSE
18
University of Southern California
Center for Systems and Software Engineering
Limitations
• Only sensitive to known COTS Vulnerabilities
– Empirical study by Arora shows that the average attacks per host
per day jumped from 0.31 to 5.45 after vulnerability get published
• Not sensitive to nuance in local system
configurations
– Disabled services
– Services running on different privileges, etc.
• Only cover “one-step-attacks” that exploiting COTS
vulnerabilities
• Depends on comprehensive vulnerability database
– Our database: 23,260 vulnerability published from 1999-2006 that
resides in 31,313 COTS software
• Cannot effectively address attacks such as Phishing
©USC-CSSE
T-MAP 19
Framework
University of Southern California
Center for Systems and Software Engineering
Hypothesis
Hypothesis #1 *: For given COTS based system whose confidentiality, integrity
and availability have different priorities to the stakeholder values, the
accuracy of T-MAP results, measured by the Inaccuracy, the ratio of the
number of clashes between vulnerability priorities and stakeholder value
priorities and the total number of comparisons, will not make any difference
comparing to the existing leading approaches (say, the average level of at
least three leading approaches, if rating data available).
Clash definition: for two technically identical vulnerabilities VA and VB, given
the stakeholder value impact severity of VA is higher than VB, if a
prioritizing system assign VA less or equal priorities as VB, it is counted as
a clash for this prioritizing system.
* Hypothesis #1 is a null hypothesis. We aim at disprove them through case
studies and tool demos.
Clash Counting Illustration
Vuln.
VA
©USC-CSSE
VB
- - - - - - X -
-
Research
20
Hypothesis
University of Southern California
Center for Systems and Software Engineering
Inaccuracy Comparison
• Inaccuracy *: the ratio of the number of clashes between
vulnerability priorities and stakeholder value priorities and
the total number of comparisons
* Inaccuracy is a numerical value between 0~1, the
larger value indicates the less accuracy
For the USC ISD case study, the security manager
prioritized 8 vulnerabilities, which translates to 28
comparisons,
where 28 = 1+2+… + 7
# of Clashes
Inaccuracy
T-MAP
2
0.071
CVSS
6
0.214
ISS
9
0.321
©USC-CSSE
Hypothesis
21
Validation
University of Southern California
Center for Systems and Software Engineering
Contributions
• A framework to model CBS security
– A COTS security evaluation framework that
captures stakeholder value propositions
– Distill the potential impacts of thousands of
vulnerabilities into management friendly
numbers at a high-level
– Tool automated
• Has the potential to pro-actively attack
security in early life-cycle, instead of taking
whatever as is reactively after system built
©USC-CSSE
Contribution
&
22
Next Steps
University of Southern California
Center for Systems and Software Engineering
Discussions and Future Work
©USC-CSSE
23
University of Southern California
Center for Systems and Software Engineering
Thanks!
©USC-CSSE
24
Download