Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda 2005 Summary Web Portal slide 1 Cyber-Threat Analytics Introduction Phillip Porras - porras@csl.sri.com Computer Science Laboratory, SRI International www.cyber-ta.org 28 September 2006 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda 2005 Summary Web Portal slide 2 Cyber-TA Overview Collaborative Wide-Area (National-scale) Threat Detection and Mitigation Problem Space: • develop efficient "RICH" security content sharing infrastructures • advance the state of the art on collaborative large-scale detection and mitigation schemes • new threat dissemination/mitigation schemes to characterize emerging attack patterns actionable results AND • Protect the security postures (user privacy, policies, topologies, defenses, vulnerabilities) of the data contributor • Minimize (remove) the reliance on trust among contributors and repositories Research (Large-scale) MALWARE Researchers (Large-scale) DATA PRIVACY Researchers Operations 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda 2005 Summary Web Portal slide 3 Grand Challenges • How to achieve an IA Common Operating Picture with mutually suspicious organizations, e.g., IC members, coalition partners, other law enforcement • How to construct national-scale realtime correlation / alert forensic systems that scale to millions of events per day • How to achieve privacy preserving IA data sharing (protocols, repositories, registration, analyses) with “minimal-trust” • How to quantify the impact of our proposed privacy preserving countermeasures to the adversary workfactor 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Today’s Agenda 2005 Summary Consortium Members Web Portal Project Overview Challenges slide 4 2006 Consortium Members Data Privacy Group Prof. Vitaly Shmatikov, Roger Dingledine, Prof. Joan Feigenbaum, University of Texas at Austin Moria Laboratory Yale University Encrypted Computation Group Brent Waters, Prof. Dan Boneh, Prof. Amit Sahai, SRI Stanford University University of California at Los Angeles Active and Passive Malware Analysis and Mitigation Prof. Paul Barford, University of Wisconsin Prof. Karl Levitt, University of California at Davis Prof. Wenke Lee, Georgia-Tech Institute of Technology Prof. Peng Ning, North Carolina State University Prof. Dawn Song, Carnegie Mellon University Phil Porras / Al Valdes / Vinod Yagneswaren / Jian Zhang / Steven Cheung / Linda Briesemeister, SRI Threat Ops Center and Commercial Transition Marcus Sachs, Ray Granvold, Livio Ricciulli, Johannes Ulrich 28 September 2006 ARO Kickoff Meeting Phillip Porras SRI International Promia Incorporated Force-10 Networks Inc. SANS Institute Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 5 2005 Summary Web Portal Today’s Agenda 9:00 - 9:40am Cliff Wang (ARO) / Phil Porras (SRI International) Opening Remarks, Introductions, Project Overview 9:40 - 10:05am Apps Products Vitaly Shmatikov (University of Texas) Data and Traffic Privacy 10:05 - 10:30am Brent Waters (SRI International) Privacy-Preserving Encryption-data analysis 10:30 - 10:45am Break 10:45 - 11:10am Vinod Yegneswaran (SRI International) Threat Ops Center Cyber-TA Active monitoring systems Data Privacy Plans for 2006 11:10 - 11:35am Phil Porras (SRI International) Massive and distributed data correlation 11:35 - 12:00pm Wenke Lee (Georgia Tech) Collaborative mitigation techniques NOON - 1:00pm Lunch 1:00 - 1:25pm Marc Sachs (SRI International) Threat Mitigation Threat Detection Threat operations center and demonstration capabilities 1:25 - 1:50pm Livio Ricciulli (Force-10 Networks) Ultra-High-Volume Infrastructure protection 1:50 - 2:15pm Ray Granvold (Promia Inc.) Experiences in DoD NOC security management 2:15 - 2:30pm 28 September 2006 Closing Remarks ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 6 2005 Summary Web Portal 2005 Prototype Release Design and field a security log repository and data collection infrastructure that – allows mutually suspicious coalition partners to securely participate in alert sharing communities – prevents leakage of contributor vulnerabilities and security posture while reporting detailed security log content – provides extensive contributor control over anonymity services • resistant to “insider” repository browsing • resistant to traffic-based fingerprinting (to a degree!) • resistant to active data fingerprinting threats – is scalable data analysis for 1000’s of contributors and in the presence of anonymized content Examine collaborative malware defense strategies 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 7 2005 Summary Web Portal CTA Infrastructure - Release Notes 1st reference implementation and deployment of a PrivacyPreserving Threat Recon Infrastructure w/ data analysis services – User-controllable anonymization IDS/Firewall logs, aggregator, TLS over onion routing daemon, large-scale data repository center, web-based data portal/query/analysis of anoynmized logs – Primary objectives of release: • • • • Red team data production and adversary models Provide datasets for web portal and data analysis purposes Examine network link, including TOR, reliability and bandwidth issues Rapid-prototype platform to build distributed correlation systems – Initial release targets: SRI Menlo Campus, Rosslyn Corporate Office, UC Davis Computer Science Lab, SANS Institute Bethesda, MD 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 8 2005 Summary Web Portal CTA System Diagram Sensor Z Web Portal Query, Data Analyzer INFOSEC Log CTA_Anonymizer v0.9 XML SPEC GP ASCII Log Parser Log Parsing Rules Field Anonymization Policy Aggregation Policy User meta-data Plugin policies Anonymizer Service 1-30-day Summary Table Generator Alert Aggregator Meta-data Extractor Plugin MIXNET Deliver Daemon www.cyber-ta.org (cyberta.dshield.org) Delivery Ack Delivery Ack TLS Session TLS Session TOR Circuit TOR Circuit TCP/IP 28 September 2006 Internet Cyber-TA RDBMS Manager ARO Kickoff Meeting Encrypted Anonymous Log Delivery Protocol Phillip Porras TCP/IP Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 9 2005 Summary Web Portal Adversary Models – What’s in and out of scope? IN SCOPE • Direct Contributor Linkage From Repository • Network Traffic Analysis Agents Org N Active Fingerprinter OUT OF SCOPE Active fingerprinting threats • PPFIX Dictionary Attacks • Multi-event pattern analysis • Rare-rule stimulation Two-sided traffic analysis • Traffic-based timing attacks • Long lived connection statistical analyses Repository Insider Org 2 Timing Attacks Traffic Eavesdropper 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 10 2005 Summary Web Portal Internet Portal and Analysis CTA_Repository - Inventory View – provides a concise summary of entire REP content – provides quick assessment of recent REP dataflow volume/stats/trends (e.g., 1 day, 7 day, 30 day...) – size of DB, # of Author_IDs (unique contributors), sensor types, event types, IP/port trends, data insertion rates, unique addrs (src/dst), (raw event count vs aggregated count) http://www.cyber-ta.org Web portal password – available upon request 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda slide 11 2005 Summary Web Portal Internet Portal and Analysis Rates/Trends Graphs – User controlled graph construction: Event_ID, Signature Category, PPFix SRC, Contributor, Ports, etc. Statistical Summaries: Table-based, capturing EventIDs, Port-policy, PPFix Addrs 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance Cyber-TA Kickoff Meeting Introduction Project Overview Challenges Consortium Members Today’s Agenda 2005 Summary slide 12 Web Portal Web Portal – Where to get info / access ? www.cyber-ta.org • Today’s slides • General project info • Publications • Software releases • Live Internet monitoring • Data set / resources • Project news • Consortium partner info • Contributor registration 28 September 2006 ARO Kickoff Meeting Phillip Porras Cyber-TA: Secure Collaborative Threat Reconnaissance