Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya Department of Computer Science and Engineering SUNY at Buffalo DIMACS Workshop February 6, 2014 Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 1 Outline • Introduction – Problem Identification and Investigations • The challenges of Insider threat – Procedural – Technical • A new threat assessment methodology and a tool – Research prototype • Detecting privilege abuse attacks • State of research down the road Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 2 Insider Attack in Financial Institutions • A major bank in New York incurred a loss of $2.5 million – Involved a home equity line of credit (HELOC) wire transfer fraud – by social engineering TBC staff • A trader based in the stock trading unit initiated thousands of transactions without customer permission in order to drive up his commissions – Resulted in $650 million losses – greed and privilege abuse • An insider ran HR database queries in an attempt to find out how much everyone in the IT department was making, all the way up to the CTO – Snooping – no need to know, data harvesting attack • 1st – abnormal activity, 2nd – abnormal volume of data movement, 3rd – abuse of privilege Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 3 Insider Attack in Intel. Communities • • • • NSA contractor Edward Snowden (June 2013) Leaked classified info on NSA’s PRISM project Privileged user, but no need to know this info. Detection failed due to lack of enforcement of monitoring tools Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 4 The Insider – Who are They? • • • • Who is an insider? – Those who work for the target organization or those having relationships with the firm with some level of access – Employees, contractors, business partners, customers, etc. Recent CSI/FBI Survey key findings (2010) – Insider attacks have now surpassed viruses as the most common cause of security incidents in the enterprise – 25% of respondents felt that over 40% of their financial losses were due to malicious actions by insiders Identity Theft Resource Center findings (2011) – Data breach due to insider theft – 13% (other causes – card-skimming, data lost on the move, etc.) U.S. Secret Service/CERT/Microsoft E-Crime report (2010) – 67% of the respondents reported that insider attacks are the most costly and damaging type of attacks Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 5 Major Facts Findings Studies • NSA/ARDA workshop in March 2004 (RAND Report, 2004) – Robert Hanssen, Aldrich Ames case studies – Developed some basic models based on these case studies • U.S. Secret Service, CMU CERT/Microsoft eCrime Watch Survey (2005) – Illicit Cyber Activity in the Banking and Finance Sector (Aug. 2004) – Computer System Sabotage in Critical Infrastructure Sectors (May 2005) • CMU CyLab Study (2012) – The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to IT Crimes (Theft, Sabotage, Fraud), Addison-Wesley, 2012 (http://www.informit.com/store/product.aspx?isbn=9780321812575) • DARPA SRS (2004) and CINDER (2010) programs • ACM CCS Workshop, 2010, MIST Workshops, 2009-13, SEI Training on demand Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 6 Outline • Introduction – Problem Identification and Investigations • The challenges of Insider threat – Procedural – Technical • A new threat assessment methodology and a tool – Research prototype • Detecting privilege abuse attacks • State of research down the road Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 7 Procedural Solutions Challenges • Examples of procedural solutions – Prevention by • Pre-hire screening of employees • Training and education – Establish good audit procedures – Disable access at appropriate times – Develop best practices for the prevention and detection • Separation of duties and least privilege • Strict password and account management policies • Policy-based solutions are hard to enforce – They involve the human factors – Human is the weakest link in security Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 8 Technical Solutions Challenges • A known problem since 1980s, still no good solution • Getting good data to arrive at some consensus on the definition • Existing tools such as firewall, IDS, anti-virus not effective • State space explosion, NP-Hard problems • Problem inherently complex – insiders are trusted – ethical, legal issues • Low and slow, stealthy attacks – stretched for long periods – hard to detect by anomaly detectors Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 9 Recent Progress on Technical Front • Insider threat detection tools exist in the market – Tools can help answer the following questions • • • • How secure is the existing setup? Which points are most vulnerable? What are likely attack strategies? Where must security systems be placed? • Challenges – What you cannot model and detect • Non-cyber events – disclosures, memory dumps, etc. • What could help? – Audit, video recording may help – Example: ObserveIT (http://www.observeit-sys.com/) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 10 Examples of Insider Threat Mitigation Tools • Skybox View (generic tool) http://www.skyboxsecurity.com/ – Threat modeling and risk analysis tool – Uses dictionary-based vulnerability scanning • Sureview from Oakley Networks http://www.raytheon.com/ – Now it is Raytheon Oakley tool (since 2007) – Endpoint monitoring for transmission of sensitive data • iGuard from Reconnex http://www.mcafee.com/us/ – Now it is McAfee Reconnex iGuard Monitor (since 2008) – A rule-based system to monitor information leak • Content Alarm from Tablus http://www.rsa.com – Now it is RSA Tablus Content Alarm (since 2007) – Policy violation based system • Vontu from Vontu, Inc. http://www.symantec.com – Now it is Symantec Vontu Network Discover (since 2007) • All these have made market penetration ($20K – $100K) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 11 Outline • Introduction – Problem Identification and Investigations • The challenges of Insider threat – Procedural – Technical • A new threat assessment methodology and a tool – Research prototype • Detecting privilege abuse attacks • State of research down the road Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 12 ICMAP (Info-Centric Modeler and Auditor) • At University at Buffalo – Information-centric modeling concept – A Capability Acquisition Graph (CAG) generation for insider threat assessment – Part of a DARPA initiative – Ideas published in ACSAC 2004, IEEE DSN 2005, JCO 2005, IEEE ICC 2006, IFIP 11.9 Digital Forensics Conference 2007, Springer 2010, RAID 2010 – DOE SBIR (technology transfer in 2010-11) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 13 Types of Insider Threat • • • • • Privilege escalation by impersonation Privilege escalation by exploiting vulnerabilities Own privilege abuse Social engineering attacks Colluding attacks Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 14 Basic CAG Model Focus on an insider's view of an organization such as Hosts, Reachability, and Access Control Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 15 ICMAP Overview Network entity rules Network topology ICMAP Engine Cap. acquisition graph vulnerabilities Authentication mechanism Social Eng. Awareness Insider Threat – Analysis and Countermeasures Cost Rules Defense centric approach Perform sensitivity analysis feedback Shambhu Upadhyaya 16 A Financial Institution Example • Scenario – Every teller performs sundry personal accounting tasks – Manager endorses large transactions and also performs business transactions – The two databases are separated – All transactions to the DB are encrypted – Teller to personal accounts DB uses lower strength encryption – Business transactions require the manager to refer to a PKI server and get a session key – Both DBs are protected behind a firewall • Attack – Teller knows the manager doesn’t apply security patches regularly – Rogue teller exploits some vulnerability to compromise manager’s account Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 17 Modeling the Attack (Physical Graph) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 18 A Simple Example: Physical to Logical Conversion user root sshd x-user user firewall root ssh_allowed ftpd Physical Topology Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 19 Physical to Logical Conversion… exec_key sshd ssh_key 0 0 ssh-vuln ssh_key 0 root_pd user_pd 0 user root firewall 0 0 fw_key fw-root root_pd user_pd user root 0 0 0 ftp_key ftpd exec_key 0 host 0 x-user fw_pd root_pd && fw_key user_pd && fw_key ftp-vuln ftp_key Logical graph Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 20 Practical Considerations • How is a model instance generated? – Define the scope of the threat – A step-by-step bottom up approach starting with potential targets • Who constructs the model instance? – A knowledgeable security analyst • How are costs defined? – Cryptographic access control mechanisms have welldefined costs – Use attack templates, vulnerability reports, attacker’s privilege and the resources that need to be protected – Low, Medium and High – relative cost assignment Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 21 Threat Analysis Illustration • Interesting attack strategy – minimize attack cost • This problem is called Min-Hack Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 22 Illustration on Telcordia Testbed Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 23 Telcordia Network – Physical Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 24 Telcordia Network – Logical Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 25 Scenario: Exploiting a Vulnerability (CAG) • • • Source is the “red-team” account on Ooty Target is the “taos-jewel” on Taos Access control – only root on Taos has access to the jewel • The attack sequence is: (i) rd_ooty logs into Taos (ii) rd_taos exploits the ssh vulnerability in Taos to become root_taos (iii) Using root_taos the insider can access the jewel Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 26 Scenario: Exploiting a Vulnerability (CAG) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 27 Sensor Placement Recommendation • Recommend sensor placement for multiple target nodes: – The heuristic algorithm outputs k-best (in this example k=3) walks for each target – From these walks the m most frequently occurring nodes are selected as the likely locations for sensor placement • The next figure shows 3-walks for the target Taos_jewel and 1 walk for the target Beijing jewel • The most frequently occurring nodes are underlined and then also printed in the sensor placement nodes section Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 28 Sensor Placement Recommendation Source: rd_ooty, rd_shimla Target: taos_jewel, beijing_jewel Target: Taos_jewel Walk: 1 : rd_ooty => Ooty => Civil Affairs Network => MS Router => Logistics Network => rd_crete => Crete => SSHV.1 => Crete => rd_crete => Logistics Network => MS Router => Security Network => rd_taos => Taos => root_taos => Taos => Taos_jewel Cost: 0.0 Walk: 2 : rd_shimla => Shimla => Civil Affairs Network => MS Router => Security Network => rd_taos => Taos => SSHV.1 => Taos => root_taos => Taos => Taos_jewel Cost: 0.0 Walk: 3 : rd_ooty => Ooty => Civil Affairs Network => MS Router => Security Network => rd_taos => Taos => SSHV.1 => Taos => root_taos => Taos => Taos_jewel Cost: 0.0 Target: Beijing_jewel Walk: 1 : rd_ooty => Ooty => Civil Affairs Network => MS Router => Procurement Network => rd_hk => HongKong => ApacheV.1 => HongKong => root_hk => HongKong => ApacheV.1 => HongKong => rd_hk => Procurement Network => root_beijing => stan_beijing => root_beijing => Beijing => Beijing_jewel Cost: 0.0 …. (other walks) Sensor Placement Nodes: HongKong, Procurement Network, Taos, MS Router, rd_hk, root_beijing, ApacheV.1, Civil Affairs Network, rd_ooty, Ooty Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 29 Outline • Introduction – Problem Identification and Investigations • The challenges of Insider threat – Procedural – Technical • A new threat assessment methodology and a tool – Research prototype • Detecting privilege abuse attacks • State of research down the road Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 30 Detecting Privilege Abuse Attacks • Main Idea – Evaluate user intent by temporal CAG analysis • Procedure – Monitor workflow activity that results in high value assets being accessible to unauthorized users – Event sensors – Snort, Dragon, etc. can be used – Periodic construction and analysis of CAGs at CAG checkpoints – Identify paths of low-cost to “jewels” – indicative of insider attack Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 31 Privilege Abuse Detection By CAG Checkpoints Network Configuration IDS /Other Sensor Events ICMAP Event Log Event 1 Feedback/Model Refinement Initial CAG Event 2 Event 3 -Analysis, Attack Detection and Attribution -Event k Event k+1 Insider Threat – Analysis and Countermeasures CAG at Time Tm Shambhu Upadhyaya 32 Outline • Introduction – Problem Identification and Investigations • The challenges of Insider threat – Procedural – Technical • A new threat assessment methodology and a tool – Research prototype • Detecting privilege abuse attacks • State of research down the road Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 33 Insider Threat Vision – Down the Road • Security audit in organizations critical – U.S. Sarbanes-Oxley of 2002 • Companies must pledge that their security mechanisms are adequate – Notice of Security Breach State Laws • Majority of states (46) enacted the legislation • Requires companies and other entities (often, state agencies) that have lost data to notify affected consumers • Could provide as a central clearinghouse – a wealth of data • Situation awareness – prediction of attack progress • Recovery techniques from breaches, Forensics • Building secure systems from insecure components (NSF CT Vision) • Layered security, Usable security – Good threat models, access control and audit procedures • Address the insider threat problem in a domain-specific manner, e.g., Relational Databases Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 34 Q&A Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 35 Backup Slides Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 36 Insider Attack in Intel. Communities - 1 • Aldrich Ames (Notorious Insider), a former CIA counterintelligence officer and analyst, soldout his colleagues to the Russians for more than $4.6 million, was convicted of spying for the Soviet Union and Russia in 1994 • Robert Hanssen (Notorious Insider), Caught selling American secrets to Moscow for $1.4 million in cash and diamonds over a 15-year period, Sentenced for life in prison without the ability for parole in 2002, Photo Courtesy: USA Today Have you watched the movie – Breach? Try this link: http://www.rottentomatoes.com/m/breach/trailers.php • • Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 37 ICMAP Framework Details • • • • Network entity rules and Cost rules are predefined, whereas the other two inputs are taken from the organization Vulnerabilities tell us the currently known vulnerabilities in services, authentication mechanism is the type of authentication used (e.g., password vs. smartcards) Sensitivity analysis is then performed to come up with the best cost function Can also do defense-centric analysis to identify the most likely locations for sensor placement Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 38 Cost Inference Cost Tree Remote Vulnerability Social System Resource Services knowledge Engineering Patch-up Rate cleartext hashed Authn. Mech. ignorant empl. public IA aware source code strict policies keys, records Resource Backup encrypted published never patched paswd in disk to be discovered usr responsible hash is saved auto patching paswd checker create one biometric Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 39 Min-Hack (Decision Version) is NP-Complete • Decision version: Is there an attack whose cost is at most some given C? • A reduction from 3-SAT to Min-Hack by constructing an instance of Min-Hack corresponding to formula consisting of clauses of size 3 • Exists an attack of cost 2n iff is satisfiable • It follows Min-Hack is NP-Hard Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 40 Threat Analysis Algorithms • Optimal solution - Brute-force • Showed that Min-Hack is NP-hard to approximate within for any c < ½, where = 1 – 1 / log logc n • Heuristic solution – Greedy solution – Polynomial-time heuristic based on Dijkstra's shortest path Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 41 How Does the Heuristic Work? Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 42 Insider Threat Modeling • Privilege escalation by impersonation √ • Priv. escalation by exploiting vulnerabilities √ • Own privilege abuse (we will come back to this later) • Social engineering attacks √ • Colluding attacks √ Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 43 Features and Limitations • Features – Implemented in Java – Can be used by admins to check open vulnerabilities – Red teams can use the tool to determine attack paths for testing security properties – Sensor placement and network hardening – The tool has inherent forensic properties • Limitations – Scalability? – Many unresolved theoretical issues, including attack attribution – Abstraction techniques to cope with large scenarios Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 44 Collusion Detected by CAG Evaluation–1 ATTACK STAGE 1 ATTACK STAGE 2 Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 47 Collusion Detected by CAG Evaluation–2 ATTACK STAGE 3 • Evaluation of attack path costs takes place at periodic CAG checkpoints • Useful both for attack mitigation (based on threshold) or forensics (based on post-facto CAG reconstruction) Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 48 UB’s CAE – CEISARE • CSE Dept. – 30 faculty members, world class researchers – Ranked 21st in the nation in research funding – 350 UGs and 300 Grad students • We are designated as a National Center of Excellence in 2002 – Based on a competitive process Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 49 Research & Other Synergistic Activities • Funding – Over $7M from NSF, DARPA, NSA/ARDA, AFRL, DoD (since 2002) – Research, education, infrastructure • Curriculum – Cyber security at PhD level – Advanced Certificate in IA – IASP scholarships (DoD and NSF) • Workshops – SKM 2004, SKM 2006, SKM 2008, SKM 2010, SKM2012 – Local Joint IA Awareness Workshops with FBI, Local colleges, industries, 2006, 2008, 2010 • Outreach Activities – High school workshops, since 2008 – Minority training • http://www.cse.buffalo.edu/caeiae/ Insider Threat – Analysis and Countermeasures Shambhu Upadhyaya 50