Network security (Part II):
 Can we do a better job? "

advertisement
Network security (Part II):
Can we do a better job? "
Rattikorn Hewett"
NSF SFS Workshop
August 12-16, 2013
Outline
•  State of the practices"
•  Drawbacks and Issues"
•  A proposed alternative"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
2
Computer Network
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 3
Computer Network
How can I secure
this network?
Network
Administrator
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 4
State of the practices
1) Admission Control
Authentication
Authentication
Authentication
Verifying the identification of authorized users
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 5
State of the practices
2) Data Control
Encryption
Encryption/Decryption of data to be transmitted
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 6
State of the practices
3) Infection Control
Anti-Virus
Anti-Virus
Anti-Virus
Virus protection, virus removal, and infection containment
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 7
State of the practices
4) Security Policy
ftp
http
SMTP
Firewall policy to protect unauthorized
requests from outside the network
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 8
State of the practices
Common IT Security Setup
Authentication
Where is the
weakness of this
network to hack into?
Anti-Virus
Encryption
Authentication
Anti-Virus
Authentication
Anti-Virus
Attacker
Secure enough?
Network
Administrator
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 9
State of the practices
Authentication
Where is the
weakness of this
network to hack into?
Anti-Virus
Encryption
Attacker
Authentication
Anti-Virus
Authentication
Anti-Virus
What about IDS to detect intrusion?
Network
Administrator
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 10
State of the practices
4) IDS (Intrusion Detection System)
I will outsmart IDS
with new tricks
Authentication
Anti-Virus
Encryption
Authentication
Anti-Virus
Authentication
Anti-Virus
Attacker
IDS monitors network activities and alerts when
attack patterns are detected
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 11
Outline
•  State of the practices"
•  Drawbacks and Issues"
•  A proposed alternative"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
12
Recaps current practices & drawbacks
•  Admission control, e.g., authentication"
•  Data control, e.g., encryption"
•  Infection control, e.g., anti-virus, virus removal/containment"
•  Security policy, e.g., firewalls, RBAC(role-based access control)"
" à Most defend attack at entering points or
prevent non-targeted spreading
à What about targeted attacks in the network?
"•  Intrusion detection system (IDS)
à Can’t prevent attacks
à Can’t detect unfamiliar attacks
à Requires resource for continuous monitoring
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
13
Other Issues …..
•  Computer networks are unavoidably vulnerable as long as
they have to provide services"
"
Network Vulnerabilities!
Exploitable
errors in !
Network
Configurations"
•  Ports & services enabled
Center for Science & Engineering of Cyber Security
Implementation of "
Software Services"
•  Apache Chunked-Code on
Apache web servers
•  Buffer overflow on Windows XP
SP2 operating environments
•  TNS- Listener on Oracle
software for database servers
Whitacre College of Engineering
14
Network Security Issues
•  Computer networks are vulnerable"
Apache Chunked-Code Buffer-Over flow!
Apache httpd version 1.3 through 1.3.24 allows remote attackers to cause
a denial of service and possibly execute arbitrary code via a chunkencoded HTTP request that causes Apache to use an incorrect size."
Oracle TNS Listener!
…!
Wu-ftpd SockPrintf!
CVE 2002-0392"
…!
Common Vulnerability & Exposure
Wu-ftpd restricted-gid!
…!
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
15
Network Security Issues
•  Computer networks are vulnerable"
•  Commercial scanners can only detect network
vulnerabilities at individual points "
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
16
Network Security: Issues
•  Computer networks are vulnerable"
•  Commercial scanners can only detect network
vulnerabilities at individual points "
"
•  Perfectly secure isolated services do not guarantee
secure network of combined services"
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
17
Outline
•  Current state of the practices"
•  Issues and drawbacks"
•  A proposed alternative"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
18
A preventative approach
Idea: !
!
•  Pre-determine all possible attacks from network vulnerabilities "
•  Use results to determine appropriate actions"
Network"
•  Vulnerabilities" Security Model
•  Configurations" Generation!
•  Security Policy "
•  Prioritize critical path"
Model
•  Select appropriate
Analysis!
counter measures"
Attack Model: all possible chains of exploits"
(or exploitable vulnerabilities)"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
19
Security Model Generation
Goal: !
To generate all possible attacks from network vulnerabilities
Exploit CVE-1
CVE-1
CVE-3
Exploit CVE-3
CVE-1
CVE-2
Exploit CVE-4
CVE-4
Scanner
….
Exploit CVE-2
Exploit CVE-1
….
All possible attacks
•  Identify vulnerabilities of each computer in the network using a"
vulnerability scanner (e.g., Nessus, SAINT, OpenVAS)
•  Apply all exploitable vulnerabilities for each attack state
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 20
Example of Simple Network
Scan the vulnerabilities
ap
t1
Center for Science & Engineering of Cyber Security
tns
t2
Whitacre College of Engineering 21
Example of Simple Network
Host A, access = 2
Exploit ap? Preconditions:
ap
t1
Goal: root access
tns
t2
Center for Science & Engineering of Cyber Security
•  Access on A≥1
•  A & W are
connected
Whitacre College of Engineering 22
Example of Simple Network
Host A, access = 2
exploit ap
ap
t1
Center for Science & Engineering of Cyber Security
tns
t2
Host W access = 2
Whitacre College of Engineering 23
Example of Simple Network
Host A, access = 2
Exploit tns? Preconditions:
ap
t1
Center for Science & Engineering of Cyber Security
tns
t2
•  Access on A≥1
•  A & D are
connected
Whitacre College of Engineering 24
Example of a simple network
Can you finish the rest?
Host A, access = 2
Exploit tns?
ap
t1
tns
t2
Not exploitable
t1
Host W, access = 1
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 25
Complete Attack Model
Goal: root access
of a database server
Attack Model shows all possible attack paths
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 26
A preventative approach
Idea: !
!
•  Pre-determine all possible attacks from network vulnerabilities "
•  Use results to determine appropriate actions"
Network"
•  Vulnerabilities" Security Model
•  Configurations" Generation!
•  Security Policy "
•  Prioritize critical path"
Model
•  Select appropriate
Analysis!
counter measures"
Attack Model: all possible chains of exploits"
(or exploitable vulnerabilities)"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
27
Why model analysis? - Example
How can we prevent attack to gain root access at IP2?"
v3 = CVE-2004-0148"
“wu-ftpd 2.6.2 and earlier, with the
restricted-gid option enabled, allows
local users to bypass access
restrictions by changing the
permissions to prevent access to their
home directory, which causes wu-ftpd
to use the root directory instead.”"
"
Counter-measure "
1.  Upgrade wu-ftpd to version > 2.6.2, OR!
2.  Replace wu-ftpd with other ftpd-service, OR!
3.  Stop providing ftpd-service at IP2
Center for Science & Engineering of Cyber Security
Root access to IP2
Whitacre College of Engineering 28
Why model analysis? - Example
How can we prevent attack to gain root access at IP2?"
Block v3 into IP2
More …."
Block v1 into IP2 •  How do we identify these blocks?"
•  How do we pick an appropriate
block/counter measure?"
•  Which state to focus first, e.g.,
(IP1, 2) vs. (IP2, 1)"
Which is more likely to be attacked?"
Center for Science & Engineering of Cyber Security
Root access to IP2
Whitacre College of Engineering 29
Issues
•  The resulting attack models are huge even for a
Root access at the
small network "
attacker’s machine
Goal: Root access to IP2
How do we effectively analyze the huge attack model? !
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering 30
Attack Model Analysis
To extract useful information from security model to
protect the network
Visualization!
•  Group similar nodes for
display [Noel & Jajodia, 05]"
•  Manual, time-consuming"
•  Non-systematic"
Markov model-based!
•  Estimate likelihood of attack"
[Sheyner et al., 02; "
Mehta et al.,06; PageRank]"
•  Handle cyclic models"
Center for Science & Engineering of Cyber Security
Graph-based !
•  Minimisation analysis to block
attack paths [Jha et al, 02] "
•  Automatic "
•  Limited to specific models"
Our approach!
•  Exploit-based analysis"
•  Use knowledge about exploitability"
Whitacre College of Engineering
31
Exploit-based Analysis
Prioritizes attack points in an attack model based on the
ease in exploiting their vulnerabilities"
"
"Easy to exploit à High exploitability "
à High priority (for fixing) "
Approach!
Estimate a probability distribution of intrusion for each
attack state "
•  To obtain its relative chance of being attacked using the
knowledge about exploitability"
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
32
Exploitability
•  Atomic level!
•  Exploitability of each vulnerability
""
Access Vector × Access Complexity × Authentication"
"
" E.g., remote, "
local"
E.g., low efforts
to exploit"
Center for Science & Engineering of Cyber Security
E.g., no or single
authentication
Whitacre College of Engineering
33
Exploitability
•  Atomic level!
•  Exploitability of each vulnerability (degrees 1à 10)"
"
"
High exploitability "
à High vulnerability"
à Easy to exploit"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
34
Exploitability
•  Atomic level!
•  Exploitability of each vulnerability (degrees 1à 10)"
•  Global level!
•  Exploitability of attack states in the network topology"
"
à Based on Markov Model (Applied to PageRank)"
"
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
35
Markov Model
•  Approximates a probability distribution of dynamic
behaviors randomly evolving to a stationary state
à Define the probability of intrusion of each attack
point recursively
Markov Property:
The probability distribution for the future network
intrusion only depends on the current states
à Repeat the computation until no change in the
probability distribution approximation
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
36
Recurrence Equation
h(u, v) = exploitability of exploits from state u to v
rt(u) = probability of state u being attacked at time t
d
= probability that attackers continue attacking on a current path
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
37
Recurrence Equation
h(u, v) = exploitability of exploits from state u to v
rt(u) = probability of state u being attacked at time t
d
= probability that attackers continue attacking on a current path
If v is not an initial state
Chance of
continuing attack
Chances of
entering v
Chances of
exploitability of u to v
u
v
…
If v is an initial state
+
Chance of entering v
from all other states
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
38
ExploitRank Algorithm
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
39
cess permissions of a home directory via the ftp, which causes
its service program, wu-ftpd to, instead, allow access of the
root directory. We annotate each configuration of the network
in Figure 4 with its corresponding vulnerabilities and their
associated labels. For example, IP2 has two vulnerabilities,
namely CVE-2006-5794 (or v1) and CVE-2004-0148 (or v3).
More details of these common standard vulnerabilities are
described in [14, 17].
Although our approach can be applied to any form of a security model, in this study we use a host-centric attack graph
model [5]. Suppose the goal of an attacker is to violate a security requirement. Based on the network configurations and the
vulnerabilities shown in Figure 4, we can automatically generate a host-centric attack model as shown in Figure 5 a) by employing a model-checking tool such as NuSMV [4] as illustrated in [5]. !
!
!
Rank 5!
!
9.9
9.9
Node Intrusion
4.9
!
9.9
Likelihood
Rank 3!
!
4.9
S0
0.1500
!
S1
0.1287
Rank 2!
9.9 9.9
Rank
4!
!
S
0.1658
A simple Illustration
2
S3
S4
0.2548
0.3007
host-centric
attack
graph
Center for Science &a)
Engineering
of Cyber
Security
no
rith
sta
of
on
to
ity
ris
4.9
ent
in
fin
!
!
3.9
4.9
Rank 1!
b) exploit-based
analysis
graph
Whitacre College
of Engineering
Fig. 5. Attack model analysis of the network in Figure 4.
40
tRa
ho
ble
corresponding vulnerabilities and their
associated labels. For example, IP2 has two vulnerabilities,
The model obtained in Figure 5 b
example, IP2 has two vulnerabilities,
no
namely CVE-2006-5794 (or v1normalized
) and CVE-2004-0148
(or
v3).
exploitability
w(i,
j)
used
94 (or v1) and CVE-2004-0148 (or v3).
More details of these common
standard
vulnerabilities
are ofrita
rithm
to
estimate
a
probability
e common standard vulnerabilities are
st
described in [14, 17].
state i to state j. The normalization i
of
Although our approach can be
applied
to any form
of possible
a seof
the
probabilities
of
all
at
ach can be applied to any form of a seon
curity model, in this study we one.
use aFor
host-centric
graph
example, attack
there are
three po
tudy we use a host-centric attack graph
to
model [5]. Suppose the goal of to
anadvance
attacker from
is to violate
a
secustate
s
,
to
states
s
0
1,
e goal of In
anMehta
attacker
isal.ʼs
to violate
a secuity
et
approach"
rity requirement. Based on the ity
network
and respectiv
the
valuesconfigurations
4.9, 9.9, and 9.9,
d on the network configurations and the
ris
vulnerabilities
shown
in chance
Figure ristic
4,towe
can
automatically
genervalue
for exploiting
vof
• 
Each
node
has
equal
be
attacked
–
no
use
2 from s0
4.
n Figure 4, we can automatically generate a host-centric attack model 4.9/(4.9
as shown+in
Figure
5=
a) 0.2.
by em9.9
+ 9.9)
A compl
the degree
of vulnerability
"" shown in Figureen
k model as shown
in Figure
5 a) by em- exploitability
w(i, j) is [4]
ploying a model-checking toolentry
suchwas
as illusij =NuSMV
in
king tool" such as NuSMV [4] as illusin the algorithm is the second factor
trated in [5]. !
fin
fined
in
Equation
(3).!
Mehta
et
al.ʼs
Approach!
Our
Approach!
!
!
!
!
Ranking
results on the
From s0 (9.9)" Table 3.
!
Rank
5!
From
s0-s3
(9.9,
9.9)"
!
Rank
5!
!
" 4.9
9.9
9.9
!
9.9
9.9
4.9
!
9.9
Rank 3!
!
9.9
Rank 4!
4.9
4.9
From s0"
!
Rank 2!
9.9 9.9
From s0-s3"
9.9
Rank 2!Rank 4!
9.9
!
Some Comparisons
Rank 3!
From s0"
From s0-s2"
From s0-s3"
3.9
4.9
Rank 1!
From s (4.9)"
From s0-s2 (9.9, 4.9)"4.9
From s0-s3 (9.9, 9.9)"
Rank 1!
3.9
Applying the heuristics obtained i
a) host-centric attack graph
b) exploit-based analysis graph
tR
graph
b) exploit-based analysis graph
tRank
algorithm,
the
results
of
ran
More exposures + !
ho
Fig.
5.
Attack
model
analysis
of
the
network
in
Figure
4.
host-centric
attack
model
are
shown
More exposures!
odel analysis of the network
in Figure 4.
Easier exploit vulnerability!
bl
ble 3. We then apply Mehta et al.’s r
no
Each state is labeled by a tuple
representing
aexploitability
host name and
not
employ
the
heuristi
by a Center
tupleforrepresenting
a host
name
41
Science
& Engineering
of Cyber
Securityand
Whitacre
College
of Engineering
sh
its access
level
obtained
by an shown
attacker.
Thus,
(Attacker,
root)
in
the
second
column
of
Table
ed by an attacker. Thus, (Attacker, root)
is an initial state since an attacker
has
a root
As
shown
inaccess
Table privilege
3, the ranking
e an attacker has a root access privilege
More complex attack model
Rank 3!
Rank 2!
Center for Science & Engineering of Cyber Security
Rank 1!
Whitacre College of Engineering
42
Conclusions
•  Current state of security practices help guard against"
•  illegitimate network entry access "
•  network intrusion and network infection"
BUT attackers can still attack the network by exploiting
network vulnerabilities (due to configuration or software
errors)"
•  One remedy is to aim to prevent all possible attacks from
these vulnerabilities (not just entry points)"
•  We give an example of how"
•  Attack model can be automatically constructed and
used for security management"
•  Scalability is a concern that requires further work"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
43
References
•  Hewett, R.; Kijsanayothin, P., "Host-Centric Model Checking for Network Vulnerability
Analysis," Computer Security Applications Conference, 2008. ACSAC 2008. Annual ,
vol., no., pp.225,234, 8-12 Dec, 2008, doi: 10.1109/ACSAC.2008.15 "
•  Kijsanayothin, P.; Hewett, R., "Analytical Approach to Attack Graph Analysis for
Network Security," Availability, Reliability, and Security, 2010. ARES '10 International
Conference on , vol., no., pp.25,32, 15-18 Feb, 2010, doi: 10.1109/ARES.2010.21"
•  Noel, S.; Jajodia, S., "Understanding complex network attack graphs through
clustered adjacency matrices," Computer Security Applications Conference, 21st
Annual , vol., no., pp.10 pp.,169, 5-9 Dec, 2005, doi: 10.1109/CSAC.2005.58"
•  Jha, S., O. Sheyner, and J. Wing, "Two formal analysis of attack graphs," in CSFW
'02: Proceedings of the 15th IEEE workshop on Computer Security Foundations.
Washington, DC, USA: IEEE Computer Society, p. 49, 2002."
•  Mehta, V., C. Bartzis, H. Zhu, E. M. Clarke, and J. M. Wing, "Ranking attack graphs,"
in Recent Advances in Intrusion Detection, pp. 127-144, 2006. "
•  Schiffman, Cisco CIAG, A Complete Guide to the Common Vulnerability Scoring
System (CVSS), Forum Incident Response and Security Teams (http://www.first.org/)"
•  Sheyner, O., J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated generation
and analysis of attack graphs," Proc. of the IEEE Symposium on Security and
Privacy, pp. 273-284, 2002. "
"
Center for Science & Engineering of Cyber Security
Whitacre College of Engineering
44
Download