31
Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 1

Applications that Participate in their Own Defense (APOD)

QuOQuO

Franklin Webber

BBN Technologies

Page 2: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 2

Project

• Sponsor: DARPA/ATO• Program: Fault-Tolerant Networks• Program manager: Doug Maughan• Project monitor: Pat Hurley (AFRL)• Period of performance: July 1999 - July 2002

Page 3: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 3

Technical Objective

Give any critical distributed software application an increased resistance to malicious attack:

• even though the environment in which it runs is untrustworthy;• without major modifications to its code.

Any such application is “defense-enabled”.

Page 4: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 4

Existing Practice/Technical Approach

• Infrastructure (operating systems, networks) on which many military applications are run is less than trustworthy– applications are vulnerable to attacks that exploit security flaws in

infrastructure

• An application that can adapt to work around the effect of attacks will offer more dependable service– a defense-enabled application is aware of its quality-of-service (QoS)

requirements and monitors its environment for QoS changes

• Metric: length of correct computation while under attack– measured in Red Team experiments and other validation

Page 5: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 5

A Distributed Military Application

Page 6: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 6

A Cyber-Attack

Page 7: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 7

An Abstract View

Attacker

Data Processing(Fusion,Analysis,Storage,

Forwarding,etc.)

DataUser

DataSource

Page 8: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 8

Traditional Security

AttackerApplication

PrivateResources

PrivateResources

LimitedSharing

Trusted OSs and Network

Page 9: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 9

Most OSs and Networks In Common Use Are Untrustworthy

AttackerApplication

PrivateResources

PrivateResources

LimitedSharing

OSs and Network

Page 10: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 10

Cryptographic Techniques Can Block (Most) Direct Access to Application

AttackerApplication

PrivateResources

PrivateResources

LimitedSharing

OSs and Network

Crypto

OSs and Network

Page 11: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 11

Attacker

Raw ResourcesCPU, bandwidth, files...

OSs and Network IDSs Firewalls

Firewalls Block Some Attacks;Intrusion Detectors Notice Others

Application

Crypto

Page 12: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 12

ApplicationAttacker

Raw ResourcesCPU, bandwidth, files...

QoS Management

Crypto

OSs and Network IDSs Firewalls

Defense-Enabled Application CompetesWith Attacker for Control of Resources

Page 13: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 13

QuO Adaptive Middleware Technology

QuO is DARPA Quorum developed middleware that provides:•interfaces to property managers, each of which monitors

and controls an aspect of the Quality of Service (QoS)offered by an application;

•specifications of the application’s normal and alternateoperating conditions and how QoS should dependon these conditions.

QuO has integrated managers for several properties:•dependability (DARPA’s Quorum AQuA project)•communication bandwidth

(DARPA’s Quorum DIRM project)•real-time processing

(using TAO from UC Irvine/WUStL)•security (using OODTE access control from NAI)

QuOQuO

Page 14: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 14

QuO adds specification, measurement, and adaptation into the distributed object model

ApplicationDeveloper

MechanismDeveloper

CLIENT

Network

operation()

in args

out args + return value

IDLSTUBS

IDLSKELETON

OBJECTADAPTER

ORB IIOP ORBIIOP

CLIENT OBJECT(SERVANT)OBJECT(SERVANT)

OBJREF

CLIENT

DelegateContract

SysCond

Contract

Network

MECHANISM/PROPERTYMANAGER

operation()

in args

out args + return value

IDLSTUBS

Delegate

SysCond

SysCond

SysCond

IDLSKELETON

OBJECTADAPTER

ORB IIOP ORBIIOP

CLIENT OBJECT(SERVANT)OBJECT(SERVANT)

OBJREF

ApplicationDeveloper

QuODeveloper

MechanismDeveloper

CO

RB

A D

OC

MO

DE

LQ

UO

/CO

RB

A D

OC

MO

DE

L

Page 15: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 15

The QuO Toolkit Supports Building Adaptive Apps or Adding Adaptation to Existing Apps

QuO Code Generator

QoS AdaptivitySpecification

QoS Management

CORBAIDL

Page 16: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 16

Implementing Defenses in Middleware

•for simplicity:•QoS concerns separated from functionality of application.•Better software engineering.

•for practicality:•Requiring secure, reliable OS and network support is not currently cost-effective. •Middleware defenses will augment, not replace, defense mechanisms available in lower system layers.

•for uniformity:•Advanced middleware such as QuO provides a systematic way to integrate defense mechanisms.•Middleware can hide peculiarities of different platforms.

•for reuseability•Middleware can support a wide variety of applications.

Page 17: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 17

Security Domains Limit the Damage From A Single Intrusion

hackeddomain

host

router

domain

host

router

domain

host

host

host

host

Page 18: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 18

Replication Management Can Replace Killed Processes

hackeddomain

host

router

domain

host

router

domain

host

host

host

host

application component replicas

QuO replica management

Page 19: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 19

Bandwidth Management Can Counter Flooding Between Routers

hackeddomain

host

router

domain

host

router

domain

host

host

host

host

QuO bandwidth management

RSVP reservation or packet-filtered link

Page 20: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 20

Other Defense Mechanisms

• Dynamically change communication ports• Dynamically change communication protocols

Page 21: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 21

Defense Strategy

• Use QuO middleware to coordinate all available defense mechanisms in a coherent strategy.

• Best current strategy has two parts:– “outrun”: move application component replicas off bad

hosts and on to good ones

– “contain”: quarantine bad hosts by limiting or blocking network traffic from them and, within limits, shutting them down

Page 22: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 22

Validation

• Experimentation: a defense-enabled application is attacked by professional hackers, i.e., a “Red Team”, and its performance is measured

• Modeling: properties of a defense-enabled application are measured in the lab and plugged into an abstract model of attack and defense

Page 23: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 23

Experimentation

• Blue Team: the technology developers– Franklin Webber, et al., BBN/Distributed Systems

• Red Team: the attackers– Steve Kaufman, et al., Sandia

• White Team: the moderators– Ken Theriault, et al., BBN/Security

– testbed preparation; experiment planning and analysis

Page 24: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 24

Experimentation Milestones

• October: begin weekly planning meetings• November: experiment plan outlined• December: ‘whiteboard’ experiment analysis

– all teams met at BBN

– plan for first experiment complete

• January: testbed preparation• February: conducted first experiment

– approximately one week long

Page 25: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 25

Multiple APOD Experiments

• ‘whiteboard’ experiment: discuss likely approaches to attack and defense without actually carrying them out

• first experiment (February)– use replication management, dynamic packet filtering,

and intrusion detection for defense; flooding is off-limits

• second experiment (TBD)– add bandwidth management; allow flooding

Page 26: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 26

C

BC BB

BBBB

B

SS

S

VPN/Interne

t

Experiment Control,external waypoint

router

router

router

router

LegendC: clientS: serverB: broker factory

Experiment Testbed and Test Application

Page 27: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 27

Whiteboard Analysis of APOD

• Red Team starts with ‘root’ privilege on one host• Intended Red Team attacks:

– ARP cache poisoning to partition network– spoofing to trigger APOD ‘containment’ strategy, leading to

self-denial-of-service– reverse engineering application components to cause

malicious application behavior

• Lessons learned for Blue Team:– network partitioning a bigger problem than expected– some changes to mechanisms and strategy

• Formulating an experiment to test the limits of the APOD ‘outrun’ strategy is difficult

Page 28: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 28

Results from First Experiment

• A defense-enabled application forced a highly-skilled and prepared attacker to work very hard and with no stealth against a purely automated defense to deny service

• Red Team eventually defeated APOD defenses with a combination of spoofing, ARP cache poisoning, and TCP connection flood– roughly a week of trial-and-error

– final scripted attack takes 5 minutes and sets off numerous alarms (the undefended app, in comparison, could be killed immediately in the same situation)

Page 29: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 29

More Results

• APOD defenses add roughly 5% to application request latency on average

• Unpredictable adaptation is good– nondeterministic placement of replicas helped

– dynamic choice of communication ports would be better

• Corrupting running application processes to cause malicious behavior was not attempted, but may be harder than it seemed at first

Page 30: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 30

Plans for Second Experiment

• Improve APOD strategy– TCP connection flood can be detected and responded to

– other

• Add bandwidth management mechanism– detect and respond to (data) flooding

– may use security-enhanced RSVP from NCSU to reserve bandwidth; will use dynamic packet-filtering to block floods

– use strategically-placed Linux routers

• Consider augmenting purely automatic defense with tools for operator intervention

Page 31: OPX PI Meeting 2002 February 21 -- page 1 Applications that Participate in their Own Defense (APOD) QuO Franklin Webber BBN Technologies

OPX PI Meeting 2002 February 21 -- page 31

Technology Transition/Summary

• APOD defenses measurably “raise the bar” against cyber-attack, even against well-prepared attackers.

• APOD middleware encapsulates adaptive defense strategies for reuse in many applications.

• A distributed military application is sought– for testing the APOD technology against a real-world set of

requirements

– for testing how easily an existing application can be defense-enabled

– for further research to improve APOD defenses