Cyber Situational Awareness

advertisement

Beyond Reactive Management of

Network Intrusions

Professor Sushil Jajodia

Center for Secure Information Systems jajodia@gmu.edu

http://csis.gmu.edu/jajodia

Outline

• Problem

• Approach

• Benefits

• Challenges

The Perfect Storm

• Network configurations are ever more sophisticated

• Vulnerabilities are becoming more complex

• Remediation resources are sparse

A total solution is a combination of technology and services

I will describe the technology component

Server

LAN

160

Vulns

W2K

Exchange

Server

158

Vulns

W2K

Web

Server

Vulnerability

Scanner

External

Attacker

WWW

DB

LAN

Oracle

DB

Server

Firewall

Frontend

Router

Backend

Router

Firewall

DMZ

Router

Legend

Symbol Count Description

5 Server

2 PC

2

3

Firewall

Router

DMZ

41 Vulns

W2K

Web

Server

Client

LAN

Linux

Mail

Server

15 Vulns

`

W2K Pro

Client

107 Vulns

WinXP

Client

` 60 Vulns

Vulnerability

Scanner

4

Limitations of Vulnerability

Scanners

• Generate overwhelming amount of data

• Example Nessus scan

– Elapsed time: 00:48:07

– Total security holes found: 255

– High severity: 40

– Low severity: 117

– Informational: 98

• No indication of how vulnerabilities can be combined

• Can an outside attacker obtain access to the Crown Jewels?

• Where does a security administrator start?

Limitations of IDSs

• Generate overwhelming number of alerts

• Many false alerts – normal traffic or failed attacks

• Alerts are isolated

• No indication of how alerts can be combined

• Incomplete alert information

• Where does a security administrator start?

• Is the attacker trying to obtain access to

Crown Jewels?

• Require extensive human intervention

Summary

• Current security measures largely independent

• Little synergy among tools

• Vulnerabilities considered in isolation may seem acceptable risks, but attackers can combine them to produce devastating results

What is lacking?

• “A distributed system is one in which the failure of computer you didn’t even know existed can render your own computer unusable” – Leslie Lamport

• Context for total network security

• How outsiders penetrate firewalls and launch attacks from compromised hosts

• Insider attacks

Simply Listing Problems

Misses the Big Picture!

The reality – security concerns are highly interdependent.

9

Penetration Testing

• Few experts available

• Red teams can be expensive

• Tedious

• Error-prone

• Impractical for large networks

• No formal claims

Attack Graphs

• An attacker breaks into a network through a chain of exploits where each exploit lays the groundwork for subsequent exploits

• Chain is called an attack path

• Set of all possible attack paths form an attack graph

• Generate attack graphs to mission critical resources

• Report only those vulnerabilities associated with the attack graphs

Related Work

• Phillips and Swiler NSPW 1998

• Templeton and Levitt NSPW 2000

• Ritchey and Ammann S&P 2000

• Wing, Jha et al. CSFW 2002

• Ammann et al CCS 2002

• Ou et al. CCS 2006

• Sawilla and Ou ESORICS 2008

Attacker

10.10.101.10

Linux attack tools

NT4.0

IIS

Web Server

10.10.100.20

Firewall

Hub

Mail Server

10.10.100.10

Linux wu_ftpd

Reference

• Sushil Jajodia, Steven Noel, Pramod

Kalapa, Massimiliano Albanese, John

Williams, "Cauldron: Mission-centric cyber situational awareness with defence in depth," Proc. MILCOM Conf.

, Baltimore,

MD, November 7-10, 2011.

 

 

     

1

  

 

 

Minimal-Cost

Network

Hardening g

  

 

   



  g

Solution 1 Solution 1 Solution 1

Solution 1

Solution 2

Solution 2

Solution 1 Solution 1

Solution 2

Solution 2

No impact No impact

Reference

• Massimiliano Albanese, Sushil Jajodia,

Steven Noel, "A time-efficient approch to cost-effective network hardening using attack graphs," Proc. 42nd Annual

IEEE/IFIP International Conference on

Dependable and Networks (DSN), Boston,

Mass, June 25-28, 2012.

Attack Graph Visualization Problem

Even small networks can yield complex attack graphs!

25

Server

LAN

W2K

Exchange

Server

W2K

Web

Server

Attack

DB

Target

LAN

Oracle

DB

Server

Firewall

Backend

Router

External

Attacker

WWW

Frontend

Router

Firewall

DMZ

Router

Legend

Symbol Count Description

5 Server

2 PC

2

3

Firewall

Router

2/21/2008

DMZ

W2K

Web

Server

Linux

Mail

Server

Client

LAN

`

W2K Pro

Client

`

WinXP

Client

26

27

2/21/2008 28

2/21/2008 29

Alert Correlation

• Correlate alerts to build attack scenarios

• For efficient response, this must be done in real time

Related Work

• Based on a priori knowledge, such as the preparefor relationship (Cuppens et al S&P’02, Ning et al

CCS’02 CCS’03, etc.)

• Based on statistical analysis, such as temporal similarity between alert sequences (Lee et al

RAID’03, Dacier et al KDD’02, Valdes et al

RAID’01, etc.)

• Hybrid approaches (Ning et al ACSAC’04, Lee et al ESORICS’04, Morin et al RAID’02, etc.)

Attack Graph Approach

• Provides context for alarms

• Can help with forensic analysis, attack response, attack prediction

Hypothesizing and Predicting Alerts

• Correlation based on the prepare-for relationship is vulnerable to alerts missed by IDSs - Reassembling a broken attack scenario is expensive and errorprone

• By reasoning about the inconsistency between the knowledge (encoded in attack graph) and the facts

(represented by received alerts), missing alerts can be hypothesized

• By extending the facts in a way that is consistent with the knowledge, possible consequences of current attacks can be predicted

Reference

• Lingyu Wang, Anyi Liu, Sushil Jajodia,

"An efficient and unified approach to correlating, hypothesizing, and predicting network intrusion alerts," Proc. 10th

European Symposium on Research in

Computer Security (ESORICS), Springer

Lecture Notes in Computer Science, Vol.

3679, September 2005, pages 247-266.

Two Sides of Security

Monitoring/Management

Plus more than

60 other vendors

Predictive

3 vendors

• Just what is

“predictive?

• Common

Operating

Picture

• Situational

Awareness

• I have 700 vulnerabilities

– now what?!?

“Put my problems/my risks in context”

Our Approach

Vulnerability Database

Exploit

Conditions

Network Capture

NVD

Environment

Model

FoundScan

Vulnerability Scanning

Asset Inventory

Attack

Scenario

Firewall Rules

Graph

Engine

Visual

Analysis

Network Capture

– builds a model of the network

– represents data in terms of corresponding elements in

Vulnerability Reporting and

Exploit Specifications

Vulnerability Database

Optimal

Counter

Measures

Aggregate / Correlate / Visualize

– a comprehensive repository of reported vulnerabilities

Graph Engine

– simulates multi-step attacks through the network, for a given user-defined Attack

Scenario

– analyzes vulnerability dependencies, matching exploit preconditions and post-conditions

– generates all possible paths through the network (for a given attack scenario)

Benefit from Synergies

• Common

Operating Picture

• Situational

Awareness

• Patching servers vs changing firewalls

• Combined vulnerabilities are real

Where do I need to focus my resources?!

Firewalls

Other

Vulnerability

Scans

Patch Mgmt/

Asset Mgmt

38

Unconstrained

Start/Goal

39

Constrained Start

Attack

Start

40

Constrained

Start and Goal

Attack

Start

Attack

Goal

41

Attack

Start

Direct Paths

Attack

Start

Attack

Goal

42

First-Layer

Recommendation

Harden

43

Last-Layer

Recommendation

Harden

Harden

44

Minimum-Effort

Recommendation

Harden

Harden

45

Security Metrics

Network

Hardening

Sensor

Placement

2/21/2008

CAULDRON has

Numerous

Applications

Alarm

Correlation

And Attack

Response

46

Summary of CAULDRON

• Automated analysis of all possible attack paths through a network

– Resulting attack “roadmap” provides context for optimal defenses

– Transforms volumes of isolated facts into manageable, actionable results

• Integrates with existing tools for capturing network configuration

• Your network is provably secure, with minimum effort

• A useful tool for making informed decisions about network security

Zero-day Attacks

• Lingyu Wang, Sushil Jajodia, Anoop

Singhal, Steven Noel, "k-Zero day safety:

Measuring the security risk of networks against unknown attacks," Proc. 15th

European Symp. on Research in Computer

Security (ESORICS), Springer Lecture

Notes in Computer Science, Vol. 6345,

2010, pages 540-557.

Cyber Situation Awareness

• An ever increasing number of critical applications and services rely on Information Technology infrastructures

– Increased risk of cyber attacks

– Increased negative impact of cyber attacks

• Attackers can exploit network configurations and vulnerabilities (both known and unknown) to incrementally penetrate a network and compromise critical systems

– Manual analysis is labor-intensive and error-prone

– Vulnerabilities are often interdependent, making traditional pointwise vulnerability analysis ineffective

– Services and machines on a network are interdependent

• Need for tools that provide analysts with a “big picture”

49 of the cyber situation

CSA Capabilities: Enterprise

Network

Current situation . Is there any ongoing attack? If yes, where is the attacker?

Impact . How is the attack impacting the enterprise or mission?

Can we asses the damage?

Web Server (A)

Evolution . How is the situation evolving? Can we track all the steps of an attack?

Behavior . How are the attackers expected to behave? What are their strategies?

Forensics . How did the attacker create the current situation? What was he trying to achieve?

Catalog Server (E)

DB Server (G)

Internet

Local DB Server (B)

Information . What information sources can we rely upon? Can we assess their quality?

Mobile App Server (C)

Order Processing Server (F)

Prediction . Can we predict plausible futures of the current situation?

Local DB Server (D)

Scalability . How can we ensure that solutions

50 networks?

CSA Framework Architecture

Vulnerability Databases

Scenario Analysis & Visualization

Unexplained Activities

Heavy Iron

Model

Adversarial modeling Network Hardening NVD CVE OSVD

Analyst

Topological

Vulnerability Analysis

Cauldron Switchwall

Index & Data

Structures

Graph

Processing and Indexing

Stochastic

Attack Models

Situation Knowledge

Reference Model

Monitored Network

Dependency Analysis

NSDMine r

Generalized

Dependency Graphs

51

Alerts/Sensory Data

Reference

• Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., Cyber

Situational Awareness: Issues and Research, ISBN: 98-1-4419-0139-2,

Springer International Series on Advances in Information Security,

2009, 252 pages.

• Arun Natrajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E.

Hutchinson, "NSDMine: Automated discovery of network service dependencies," Proc. 31st Annual Int'l. Conf. on Computer

Communications (INFOCOM), Orlando, FL, March 25-30, 2012, pages 2507-2515.

• Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S.

Subrahmanian, "Scalable analysis of attack scenarios," Proc. 16th

European Symp. on Research in Computer Security (ESORICS),

Springer Lecture Notes in Computer Science, Vol. 6879, V. Atluri and

C. Diaz, eds., Leuven, Belgium, September 12-14, 2011, pages 416-

433.

Further Information:

Sushil Jajodia

jajodia@gmu.edu

(703) 993-1653 http://csis.gmu.edu/jajodia

Download