24
1 © Applied Communication Sciences 2013. A Business of the SI. Registered Trademark of TT Government Solutions, Inc. © Applied Communication Sciences 2013. A Business of the SI. Registered Trademark of TT Government Solutions, Inc. Increasing the Reliability and Productivity of Cyber Testing via Experiment Speedup November 14, 2013 Alex Poylisher, Constantin Serban {apoylisher,cserban}@appcomsci.com

Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

1

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Increasing the Reliability and

Productivity of Cyber Testing

via Experiment Speedup

November 14, 2013 Alex Poylisher, Constantin Serban

{apoylisher,cserban}@appcomsci.com

Page 2: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

2

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Cybersecurity testing requires a high fidelity representation of

both host and network resources

− Current cyber-security testbeds run full OS environments in physical or

virtual hosts

− Employ a large and diverse network, emulated, or simulated

− DETER, NCR, CyberExata, etc…

• Both hardware resources and evaluators’ time are limited

• The usual tradeoffs:

− Limit the size of the testing activity(i.e. fewer nodes, hosts, etc.) and keep

high fidelity

− Reduce fidelity by abstracting the representation of the least important

aspects of the cyber-system (if known in advance)

− Reduce the amount of testing activity (fewer runs, attacks, scenarios)

• Can we do better than that?

• Current testbed technologies are limited in several ways. First, in order to

ensure high

• fidelity for the entire duration of an experiment, both the hosts and the network

resources need to be over-provisioned to

• accomodate the periods of peak activity. Consequently, this limits the size and

complexity of the experiments that can be

• accomplished with finite testbed resources. Second, the number of

experiments that can be performed in given amount of time

• is very constrained, leading to a small sample size and low reliability results.

Our previous work addresses the first

• limitation using a slower-than-real-time execution of experiments (see our VAN

Testbed work in [MILCOM 2012, MSWIM 2012]).

Motivation

Page 3: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

3

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

A New dimension: Stretched Time

• Provision resources for peak load, unutilized most of the time

• Provision fewer resources, stretch execution time of peak loads

Page 4: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

4

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

A New dimension: Compressed Time

• Provision resources for peak load, unutilized most of the time

• Use resources fully, compress execution time for non peak loads

Page 5: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

5

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Stretched (slower than real time) execution of

testing scenarios to increase scalability with

fewer resources previously implemented in the

VAN Testbed

− See [MsWIM12], [MILCOM12]

• This work introduces the compressed time

testing in cybersecurity

TimeSync

Page 6: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

6

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Typical cyber activities:

− Reconnaissance (active/passive scanning, sniffing, etc)

− Penetration attacks

− Botnet setup and maintenance

− Information exfiltration

− Denial of Service/Disruption

• Most of the above activity are either:

− Short and resource intensive

− Long and low-key (i.e. low resource usage)

− Long periods of time where no activity occurs

• Testbed resources are significantly underutilized

• Can benefit greatly from compressed execution

− Can get more work done

− More evaluations, more runs, diverse scenarios, etc.

− Better confidence in results

Compressed Execution in Cybersecurity

Page 7: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

7

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Preserving high fidelity requires no change to

applications and their ecosystem (i.e. libraries, OS,

network, etc.)

• Change the source of time at the lowest level practically

available

• Virtual hardware amenable to such manipulation

• Hence alter the time perception of entire virtual

machines from the hypervisor.

• Implemented in Xen hypervisor without any VM

modifications

Compressed Time Execution in Practice

Page 8: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

8

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

VAN Testbed: Our Cyber Testbed

Page 9: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

9

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

The Concept of Testing Speedup

Real Time Compressed Time

• Software under test will perceive the time passing faster

than it actually does in real time.

• The rate of compressed time advancement (i.e. the

speedup factor) can be constant or variable

Page 10: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

10

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

TimeSync Architecture

Page 11: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

11

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

VM time tracking external time source

Page 12: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

12

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Purpose:

− Assess the fidelity of cybertesting under speedup

• Metrics:

− Functional correctness

− Total execution time of typical cyber activity

• Representative activities:

− nmap reconnaissance

− metasploit attack

Experiments

Page 13: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

13

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Why NMAP :

• Widely used tool in penetration testing and vulnerability

discovery

• It employs a variety of methods to profile a network, or

set of hosts, and discover information an attacker may

later exploit

• Complex tool that performs a variety of tasks both

computational and network related

• Can be viewed as a macro benchmark for our cyber-

security testing

NMAP Experiments

Page 14: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

14

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Executed the folowing nmap commands over a set of FC18_64 hosts in the VAN

Testbed:

nmap -sS -PN -A -T2 -vv 10.2.34.2

• TCP SYN Stealth scanning disabling PING probing, with OS and version

detection, with polite timing template mode (somewhat lower traffic rate),

verbose output, with a single host target located across a WAN ~100ms away.

nmap -sS -PN -A -T3 -vv 10.2.34.2

• Same as above, except the timing of the request is normal (i.e higher

frequency than above)

nmap -O --osscan-limit 10.2.32-48.2

• Perform an OS detection scan, but abandon host if not at least one TCP open

port and one TCP closed port are found. This operation is performed on a

subnet of 17 hosts.

Nmap Experiment Details

Page 15: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

15

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

NMAP 1 Fidelity Results

Page 16: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

16

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

NMAP 2 Fidelity Results

Page 17: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

17

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

NMAP 3 Fidelity Results

Page 18: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

18

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Why Metasploit:

• Widely used framework with a large database of

vulnerabilities and exploits for the most common

operating systems and userland services.

• Used for prototyping and developing attacks / testing

defenses

• Exploits are complex pieces of software consisting of

sequences of execution involving bot computation and

network activity

• Appropriate as a macro-benchmark for cyber-security

testbeds.

Metasploit Experiments

Page 19: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

19

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Metasploit Experiment Details

tcpscan: use auxiliary/scanner/portscan/tcp set PORTS 1-200 set RHOSTS 10.2.34.2 set THREADS 1 set INTERFACE eth0 set TIMEOUT 4000 set CONCURRENCY 1 run

• Performs a discovery of services bound to

TCP ports between 1 and 200 on a fc8_64

target host

• Once a samba service had been

discovered on the given target host,

determine its precise version (3.0.21)

• If the samba service had been discovered

to be vulnerable, deploy a samba symlink

traversal exploit which allows escalation of

privileges and takeover of the root file

system on the target host

smbversion: use auxiliary/scanner/smb/

smb_version set THREADS 1 set RHOSTS 10.2.34.2 run

smblink: use auxiliary/admin/smb/

samba_symlink_traversal set RHOST 10.2.34.2 set SMBSHARE tmp set SMBTARGET rootfs run

Page 20: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

20

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Metasploit 1 Fidelity Results

Page 21: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

21

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Metasploit 2 Fidelity Results

Page 22: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

22

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

Metasploit 3 Fidelity Results

Page 23: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

23

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Using diverse cyber-security tools, functional results are identical

• Timing fidelity acceptable under many circumstances

• Distortion is small for speedup factors up to 4x

• Even for 8x speedup factor, distortion under 13%

• Several sources of distortion:

− Sampling interval

− Speedup factor itself

− Incorrect prediction of speedup for scenarios using variable speedup

− Latency of speedup signal propagation in distributed testbed (i.e. non local

source of virtual time)

Result Interpretation

Page 24: Increasing the Reliability and Productivity of Cyber Testing via Experiment … · 2013. 11. 19. · • fidelity for the entire duration of an experiment, both the hosts and the

24

© Applied Communication Sciences 2013.

A Business of the SI.

Registered Trademark of TT Government Solutions, Inc.

• Cyber security testing under speedup is practical

• It can be a great benefit to testing by significantly reducing the duration of

testing in real time

• Contact us at [email protected], [email protected]

Thank You !

Conclusions