Title: ITUA Presentation
1Intrusion Tolerance by Unpredictability and
Adaptation Presented by Partha Pal
William H. Sanders Michel Cukier James
Lyons Prashant Pandey Hari Ramasamy
Partha Pal Ron Watro Franklin Webber Chris Jones
David Corman Jeanna Gossett
2ITUA Intrusion Tolerance byUnpredictability and
Adaptation
- Goal
- Develop middleware based mechanisms that
significantly increase the likelihood a
distributed object-oriented application survives
the attacks we consider - Approach
- Use a variety of techniques to keep the
application going despite intrusion - Adaptation to cope with changes in environment
- Redundancy to tolerate different kinds of
component failures - Unpredictability to thwart attack planning and
inflict delays to the attacker - Research Agenda
- Explore the complementary concepts of
unpredictable adaptation and adaptive use of
hybrid-mode (crash and Byzantine) fault-tolerance
in the context of IT - Build prototype to illustrate the developed
concepts and to provide a basis for further
design investigation - Evaluate effectiveness of concepts and
implementation by modeling and/or experimental
techniques
3Unpredictable Adaptation for Intrusion Tolerance
- Introduce uncertainty in adaptations resulting
from intrusion response - Applications adaptive behavior (e.g. change from
one server type to another) - Response of middleware services that manage QoS
(e.g. change the type and/or level of replication
/ communication) - Reconfiguration of system infrastructure itself
(e.g. killing processes, changing configuration
of a firewall) - Expected Benefit
- Attacks that exploit static behavior will be
delayed, providing time for other mechanisms to
take effect. - Ankle-biters will be deterred (anecdotal
evidence), but attack prevention is not a goal - Dimensions of unpredictable adaptation
- How they are triggered (e.g. reactive or
pro-active) - Whether they are a part of the application
(in-band) or the system (out of band) - Whether they are aimed at tolerating a specific
attack or used to create diversity and stealth in
general
4 Adaptive Hybrid-Fault Tolerant Replication for
Intrusion Tolerance
- Approach
- Develop dynamic replication algorithms supporting
multiple failure assumptions and dynamic
switching among them - Dynamically changeable crash/Byzantine
replication and communication algorithms can aid
in providing practical IT - Malicious attacks may vary in number and type of
failures they cause - Exclusive use of Byzantine fault-tolerance
schemes is expensive - Function 1 Management
- Receive information from replication/communicatio
n mechanisms themselves, IDSs, resource managers - Make (possibly unpredictable) configuration
decisions type and level of replication,
placement of replicas - Function 2 Mechanisms
- Provide replication and group communication
algorithms that can dynamically change between
tolerance to crash and Byzantine failures - Allow dynamic entry/exit of replicas
5Example Application Insertion of Embedded
Infosphere Support Technologies (IEIST)
Potential GA Components
Potential GA Domains
Resource Assignment
Tactical
Data Link
Tactical
Data Link
Tactical
C2 Node 1
Data Link
C2 Node 2
C2 Node 3
F15 1 Guardian
LAN
LAN
UCAV 1
UCAV 1
Guardian
Guardian
6Technical Details
- 3 views of the ITUA technology
- Context, scope and assumptions
- Structure of application and system objects, and
organization of groups in the ITUA system - Features
- Hybrid-fault replication
- Support and example
- Unpredictable adaptation
- Support and example
7ITUA Intrusion Model
- The ITUA intrusion model consists of
- Items terms and objects, usually abstract, that
the model describes - Actions what can happen to the items
- Assumptions constraints on the actions,
expressing limits on the attackers capability
and properties of the environment - Specifications desired properties to follow from
the assumptions, given a system design - Items
- Security domains
- Non-overlapping boundaries are hard for attacker
to cross - Are either okay or infiltrated
- Processes
- Two types
- Application processes
- System processes
- Are either okay or corrupt
8Application Objects and ITUA System Objects in
Security Domains
Host A
Host F
Host D
Security Domain III
ITUA Manager ITUA Subordinate Replicated object
o1 Replicated object o2 Replicated object
o3 Non-replicated object o4 Non-replicated object
o5
Host B
Host E
Security Domain II
Host C
Security Domain I
9Intrusion Model (Cont.)
- Actions
- Start or stop a process, infiltrate a domain,
corrupt a process - Processes compute, communicate
- Assumptions
- A minimum time to infiltrate each domain and to
find a domain containing a given kind of process - A limit on number of concurrent attacks (i.e.,
only staged attacks are possible) - Infiltration and corruption may cause arbitrary
failures and may be detected by corrupt process
behavior or by IDSs - Communication is timed asynchronous
- Example Specifications
- Replication improves an applications time to
failure - Unpredictable adaptation improves time to failure
under certain conditions - Further details http//www.dist-systems.bbn.com/p
rojects/ITUA
10Summary Short Answers to the 3 Questions
- Which attacks?
- Attacks that (in multiple stages)
- Infiltrate hosts and security domains
- Kill or corrupt processes
- Observe and adapt to defensive responses
- Attacks implemented at compile time and manifest
at run time are not considered - What assumptions?
- See previous slide, assumptions involve security
domains,attack stages, detection and
communication - What policies?
- High level try to maintain integrity and service
availability as long as possible - Subject to our assumptions and in the context of
the attacks we consider - Auxiliary policies use QoS specification,
constraints on adaptation based on data unlikely
to be available to the attacker - QoS managers have their own policies e.g.
governing type and number of replication, access
control policy etc.
11Structure of an ITUA Application Object
- Middleware intercepts all object requests and
responses to introduce application-level adaptive
behavior - If such adaptation is in response to
intrusion, unpredictability can make attackers
task harder
CORBA Object
Application-level Control of Adaptive Middleware
- Handlers for tolerating crash failuresand
value failures - Handler choice based on comparisonbetween
computation and communication cost - For passive handlers, tunable parameter of
frequency of state multicast/storage
Interface on Standard Network Transport
- Protocols for tolerating crash
and/orarbitrary failures - Tunable parameter of number of crashand
arbitrary failures to tolerate - Dynamic switching between protocols
12Structure of ITUA Manager and Subordinate
ITUA Manager
ITUA Subordinate
SecAdv
RepMan
SecAdv
RepMan
Gateway
Gateway
Handler for ITUA Subordinate
Handler for ITUA Manager
Interface to standard network transport
Group Communication System
Group Communication System
- Managers and subordinates are collectively
responsible for - Gathering security related information
- Controlling local resources and configurations
for security - Replication management
- Security Advising (SecAdv) and Replication
Management (RepMan) are two major functional
aspects - Responsibilities are different for Managers and
Subordinates
13Organization of Managers and subordinats within a
Security Domain
14 Groups in the ITUA System
Security Domain II
Security Domain IV
a replication group
Host G
ITUAsubordinategroup
Host D
Host J
Host A
ITUA subordinate group
ITUA subordinate group
ITUA subordinate group
Host E
Host K
Host B
ITUAsubordinategroup
ITUA subordinate group
Host H
ITUA manager group
Host C
Host L
Security Domain I
Security Domain VI
Host F
Host I
Security Domain III
Security Domain V
15Supporting Adaptive Hybrid-Fault Replication
- Part of the job of the Security Advisor and
Replication Manger components of the ITUA
Managers and Subordinates - Using the hybrid-fault tolerant plumbing
- Important Replication Manager functions
- In a subordinate
- Start application objects securely when commanded
by manager - In a manager
- Decide which replica of replication group to
start, kill, migrate - Decide when to switch between different failure
modes - Important Security Advisor functions
- In a subordinate
- Collect information from local IDS, monitors
- Report to manager
- In a manager
- Collect domain wide security info, decide
security posture - Decide whether host/domain infiltration has
occurred
16Example Use of Hybrid-Fault Replication/Communicat
ion
Manager of h1s domain
r1
Subordinate on h1
r2
Replicated object r tolerates 1 crash
h2
h1
Senses network anomaly
Informs manager
Depending on domain-wide information, change
security posture, increase replication level or
switch to Byzantine mode
Ready for a potential loss, attacker will first
need to find where a new replica is placed
r1
r3
r2
h2
hx
h1
Three replicas, r3 placed hx picked unpredictably
Even though the attacker corrupts r1 in an
arbitrary way on the infiltrated host, the
replicated object r continues r1 is evicted from
the group
Anomaly persists, reports potential infiltration
on H1 to manager
Under the new posture, decides to switch r (and
other replicated object with replicas on H1) to
Byzantine tolerance
r1
r2
r2
r2
r5
h2
h2
h1
h2
hn
More replicas, Byzantine-tolerance mode
On demand, adaptive use of expensive Byzantine
tolerance gt Practical intrusion tolerance!
17Supporting Out-of-Band Unpredictable Adaptation
- Out-of-Band Adaptation
- Intrusion response that involves reconfiguration
of system resources - Requires system privilege
- Carried out by the hierarchy of managers and
subordinates - Via the sensors and actuators
- Reconfiguration may take place proactively,
subject to cost and interference constraints - Inserting uncertainty use the inherent
non-determinism of distributed systems - Likely that different domains will have different
postures - Even within a domain different hosts may have
different postures - Recall interpretation of sensed data and reaction
to observed event can depend on the current
posture
18Example Out-of-Band Unpredictable Adaptation
- Attacker trying to corrupt an application object
(i.e. the replication group). Uses an attack
process in host H1. - Symptom(s) observed
- Anomalies in replication group of the targeted
application object or its consumers - Sensors on H1 may pick up CPU or network
anomalies - Depending on current posture, H1s subordinate
may - Use firewall to control what goes out and comes
into H1 - Use access control mechanism to change access
control policy of objects in H1 - Kill rogue process in H1
- Advantage
- Attackers experience in one domain may not work
in another - May proactively reorganize resource configuration
- Subject to performance and interference
constraints move files around, use different
ports, change scanning interval etc in an
unpredictable manner. - Limit attacker knowledge (see US Extra-net for
Security Professionals)
19Supporting Unpredictability in Application-Level
Adaptation
- Contracts QuOs adaptation control mechanism
- Region basis for structuring adaptation
- inter-object interaction is adapted in band
(intercepted and modified) depending on the
current region - Transition action on region change
- Inserting uncertainty
- Unpredictable selection of contract region
- Unpredictable selection of transition action
- Other possibilities to explore
- parameterization, switching the evaluation
engine, generating contracts on-the-fly etc.
20 Example Application-Level Unpredictable
Adaptation
C2
C1
Unpredictable selection of contract regions
Conceptual operating regions of an adaptive
application may overlap C1 (Host H
infiltrated), C2 (Network N infiltrated), C3
(Object O corrupt) Under certain condition any
one of the regions may be true.
Advantage If the attacker has partial knowledge
about the system and wants to push the
application into a desired operating region, he
may be surprised to find the application behave
in an unexpected way
C3
Corrupt replica is of O, on H and H is in N
Current stage
- Unpredictable selection of transition actions
- one_of
- T1 kill all non-application/ non-essential
objects on local host - T2 talk to a different object
- T3 start a security scan
- T4 use cached value (I.e.dont remote)
- T5 slow down (I.e. insert sleep before remote)
-
T5
T1
T3
T4
T2
Next stage?
Advantage If the attacker observed the reaction
(that muffled his stage 1) and attempts to
reattack aiming to counter or bypass that
reaction, he may see a different reaction this
time There may be cases where even with limited,
known alternatives, unpredictable selection is a
better strategy (game theory results).
21Current Status / Next Steps
- Unpredictable Adaptation
- Developed examples and a conceptual framework
- Working on extending the framework and a detailed
use case for evaluation - Adaptive, Hybrid-Fault Tolerant Replication /
Communication Algorithms - Developed a strategy of applying adaptive
fault-tolerance - Working on algorithms that implement the strategy
- ITUA Prototype Design
- Integrated security domain, replication control,
and uncertainty concepts in a unified
architecture - Created high-level architecture for evaluating
adaptive techniques and unpredictable policies - Detailed designs for adaptive control and
unpredictable policy mechanisms - Planning the stages in the implementation
- Modeling and Validation
- Formalized the project scope and assumptions
relating to attacks - Investigating ways to validate the effectiveness
(via modeling and/or experimental techniques) of
ITUA techniques
22Schedule/External Activities
2000
2001
2002
2003
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4
Q1
ID
Task Name
1
ITUA
3
Initial Concept Dev Proof of concept demo
4
Design Devlp of Prototype v1
5
Final Prototype Evaluation results
Proof of concept for some components expected at
the end of summer
- External activities
- 19th IEEE SRDS Panel on integrating FT and
Security in Distributed Information Systems
Franklin Webber - ISW 2000 Position paper Partha Pal
- EU-US Joint workshop on intrusion and attack
tolerance Bill Sanders
23Back upProposed Gateway Architecture
- Active handlers
- pass first
- leader only
- majority voting
- Passive handlers
- state cast
- stable storage
Handler Factory
Gateway
Application
CORBA ORB
CORBA ORB
Application Object
IIOP
create handlers
Handler for replicated obj -1
Handler for replicated obj -2
Handler for Replicated obj -n
Gateway handlers
Hybrid-Fault Group Communication
Local Area Network