160 likes | 272 Views
Applied Cryptography in CyberTA. Brent Waters Work with Dan Boneh and Amit Sahai. Role of Applied Crypto. Introduce new capabilities Address needs of Data + Traffic Privacy. Crypto Tools. Data Privacy. Crypto. CyberTA problems. An Alert Detection System. Alert Analysis.
E N D
Applied Cryptography in CyberTA Brent Waters Work with Dan Boneh and Amit Sahai
Role of Applied Crypto • Introduce new capabilities • Address needs of Data + Traffic Privacy Crypto Tools Data Privacy Crypto CyberTA problems
An Alert Detection System Alert Analysis Data Generation
Record TCP Flows Search for exfiltration,… Ignore non-alert entries NetFlow Logs SRC IP SPORT DST IP DPORT PACKETS BYTES SECS --------------------------------------------------------------------------------- 131.252.120.0 33587 130.14.24.0 80 2 1002 1 130.39.136.0 4038 137.104.72.0 49662 479 127993 54 157.182.144.0 1138 65.54.128.0 80 3 88 1
NetFlow Logs SRC IP SPORT DST IP DPORT PACKETS BYTES SECS --------------------------------------------------------------------------------- 131.252.120.0 33587 130.14.24.0 80 2 1002 1 130.39.136.0 4038 137.104.72.0 49662 479 127993 54 157.182.144.0 1138 65.54.128.0 80 3 88 1 Classified system Chinese IP Large Data
System Goals • Analyze Abnormal Events • Minimal Disclosure • Simple Data Generation • Flexible Searching Rules
Available Options • Completely Trust Data Collector • Violates Minimal Disclosure • Push Policy to Data Generators • Simplicity • Flexibility, Policy Changes • Conclusion => Need new Mechanism
I am“bob@stanford.edu” email encrypted using public key: “bob@stanford.edu” Private key Identity-Based Encryption (IBE) IBE: [BF’01] Public key encryption scheme where public key is an arbitrary string (ID). • Examples: user’s e-mail address, current-date, … CA/PKG master-key
Limitations of IBE • Lack of Expressivity • Just a string • Require Encrypting with Structure • Reflects Application • Build Policy
Priority= Urgent AND Subj = CyberTA Private key Attribute-Based Encryption (ABE) • Attributes Describe Data • Keys Identified with Policies email encrypted using public key: Attributes To: Bob Subj: CyberTA Priority: Urgent CA/PKG master-key
ABE Features • Encryption labels data w/ attributes • Simple • Application Aware • Authority gives policy keys • Expressive • Late-Binding
Each category is simply an attribute Make keys for exfiltration, etc. (SRC_IP=Top Secret) OR (bytes >100KB AND DestIP = Foreign) ABE on NetFlow Logs SRC IP SPORT DST IP DPORT PACKETS BYTES SECS --------------------------------------------------------------------------------- 131.252.120.0 33587 130.14.24.0 80 2 1002 1 130.39.136.0 4038 137.104.72.0 49662 479 127993 54 157.182.144.0 1138 65.54.128.0 80 3 88 1
An Alert Detection System Authority ABE Keys Alert Analysis ABE enc. data Data Generation
Progress • Developed ABE Crypto System • Delegation • Efficiency Improvements
Challenges Ahead • Build a “Blinded IDS” • Make an Intermediate Language • E.g. How to Express numbers as attributes • Combine App. Domain Knowledge and Crypto