190 likes | 351 Views
System Health and Intrusion Monitoring: A New Approach to Triggering Intrusion Tolerant Mechanisms (SHIM). Calvin Ko, NAI Labs , Network Associates Karl Levitt, UC Davis July 17, 2000. Technical Objectives. Continuous monitoring of the health of a system
E N D
System Health and Intrusion Monitoring:A New Approach to Triggering Intrusion Tolerant Mechanisms (SHIM) Calvin Ko, NAI Labs, Network Associates Karl Levitt, UC Davis July 17, 2000
Technical Objectives • Continuous monitoring of the health of a system • Detect previously unseen intrusions with a low false alarm rate • Provide intrusion tolerant (IT) mechanisms with accurate and strategic information on the detected anomalies • Demonstrate via a prototype • First step towards total health monitoring of a large system NAI Labs-7/6/00-2
Technical Approach - Overview • Employ a set of dynamic constraints to detect security failures • define healthy operations of a system • at different levels of abstraction (a hierarchy) • capture static behavior, dynamic behavior, time-critical behavior • A systematic methodology for development of constraints and placement of sensors • able to reason about and project between layers NAI Labs-7/6/00-3
Technical Approach: Rationale • Checking is (in general) easier than doing (implementation) • Error/failures can be uncovered by simple checks • Recovery block acceptance test • Run-time result-checking (Blum) • sorting, graph-isomorphism, group-theoretic computation • Specification-based Intrusion Detection (Ko/Levitt, Sekar) • Access checking of security-critical programs NAI Labs-7/6/00-4
Example Constraints • Privileged programs • e.g., finger daemon (fingerd) • read publicly readable files • execute finger program • write to the output socket • Router • conservation-of-flow in WATCHERS (out = in - dest) • route a packet only to a router “closer” to the destination • Database • DEMIDS: monitor users’ accesses to database • ARP - Address Resolution Protocol NAI Labs-7/6/00-5
Address Resolution Protocol (ARP) • ARP • For mapping between the Ethernet layer and the IP layer • Hosts on the network query all machines for their Ethernet-to-IP assignments before sending to a new IP address. Hosts typically keep a local list of mappings ( the ARP cache ) to avoid repetitive queries • ARP Cache Poisoning • Unsolicited Response • Bogus Request • Bogus Response • Both a spurious Request and a spurious Response NAI Labs-7/6/00-6
Unsolicited ARP Response • ARP reply will be accepted by a victim machine, even though it hasn’t sent a request. • Sending a arbitrary IP to Ethernet mapping will poison the victim’s ARP cache. • Sending an unsolicited response to the broadcast Ethernet address poisons the cache of all machines (Solaris, Windows, Linux). ARPREPLY to victim blanc.cs.ucdavis.eduIS-AT08:00:20:23:71:52 NAI Labs-7/6/00-7
Bogus ARP Request • ARP implementations cache entries based upon broadcast requests. • Even if the host isn’t involved in any resolution their cache will update with the information contained in third-party requests. • Sending out an request with bogus sender information poisons everyone’s cache. ARPREQUESTWHO-HAS olympus.cs.ucdavis.edu TELL blanc.cs.ucdavis.edu at 08:00:20:23:71:52 NAI Labs-7/6/00-8
alarm ARP Response ARP Response Bogus Request ARP Specification ARP Request ARP Response Initial reply_wait cached ARP Request ARP cache timeout NAI Labs-7/6/00-9
Criteria of Constraints • Simple • Can be efficiently checked for violations (Checkable and Efficient) • Should not contradict with existing behavior • Able to adapt to different platforms/configurations and changes • Consistency/Correctness/Completeness NAI Labs-7/6/00-10
A hierarchy of constraints at different levels of abstraction Data-integrity constraints Program-integrity constraints Interaction constraints Temporal constraints Resource-usage constraints System-level System Services Host-based Application Types of Constraints NAI Labs-7/6/00-11
Security Policies Design Principles Attack or Vulnerability Models Normal runs Formal Analysis Intended Usage Configuration & System policy System Semantics Constraints Development Methodology Constraint Model NAI Labs-7/6/00-12
Intrusion-Tolerance Triggers • Provide • information about rogue/faulty processes • objects being damaged or service disrupted • capability of the rogue processes • information to identify related constraint violations • Consequences if a constraint being violated • Associate capability of the rogue processes with constraints • Jigsaw language NAI Labs-7/6/00-13
Challenges • Detect new attacks with a low false alarm rate • Hierarchical constraint development and refinement methodology • Efficient checking of constraints • Adapt to changing environment • Unified existing specifications • Model consequence of constraint violations NAI Labs-7/6/00-14
Implementation • Constraint Specification • Use existing languages and extend when necessary • ESTELLE • Statechart (Harel) • Constraint Implementation • Translation to rules in • SNORT, NFR • NAI Generic Software Wrappers NAI Labs-7/6/00-15
Expected Results • A systematic methodology for specifying constraints • A generic constraint model (for UNIX) that can be customized to different environments • Detect new attacks that cannot be detected by existing signature-based ID systems. • Intelligent placement of IT sensors • Provide accurate and strategic information to IT mechanisms NAI Labs-7/6/00-16
Major Risks and Mitigation • Constraints not checkable • refine to lower level • extend the wrapper prototype • application auditing • Behavior of big systems very complicated • focus on critical components • focus on important security aspects • Constraints may not be able to detect intrusions • use existing attack/vulnerability models to test • revise the constraint model based on the experience NAI Labs-7/6/00-17
Task Schedule Final Prototype & Demonstration Initial Prototype Task 2 Constraints for Unix Task 1 Months 12 24 NAI Labs-7/6/00-18
Technology Transfer • Provide a public release of the software prototype • Work with NAI Labs Internal Research and Development Group to transfer technology to NAI products • Present results at NAI Labs semi-annual technology review to provide visibility NAI Labs-7/6/00-19