590.7 Network Security Lecture 2: Goals and Challenges of Security Engineering. Xiaowei Yang



Similar documents
Network Security and Privacy

COSC 472 Network Security

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

What is Web Security? Motivation

Common Cyber Threats. Common cyber threats include:

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

CS5008: Internet Computing

Security A to Z the most important terms

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Topics in Network Security

Threat Events: Software Attacks (cont.)

CS 203 / NetSys 240. Network Security & Privacy

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

CRYPTUS DIPLOMA IN IT SECURITY

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Networks and Security Lab. Network Forensics

CS 155 Spring Computer and. Dan Boneh and John Mitchell.

WEB ATTACKS AND COUNTERMEASURES

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security Awareness For Website Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Protecting Yourself from Identity Theft

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Course Content: Session 1. Ethics & Hacking

Operation Liberpy : Keyloggers and information theft in Latin America

A Network Administrator s Guide to Web App Security

CS 494/594 Computer and Network Security

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Codes of Connection for Devices Connected to Newcastle University ICT Network

Factoring Malware and Organized Crime in to Web Application Security

Tutorial on Smartphone Security

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

Sample Report. Security Test Plan. Prepared by Security Innovation

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Network attack and defense

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

SHORT MESSAGE SERVICE SECURITY

DDoS Attacks Can Take Down Your Online Services

Detailed Description about course module wise:

Identity Theft Problem and Solutions

Alert (TA14-212A) Backoff Point-of-Sale Malware

Reliance Bank Fraud Prevention Best Practices

Information Security. Be Aware, Secure, and Vigilant. Be vigilant about information security and enjoy using the internet

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Computer Security Literacy

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

How To Mitigate A Ddos Attack

GlobalSign Malware Monitoring

Certified Ethical Hacker Exam Version Comparison. Version Comparison

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Malware & Botnets. Botnets

Where every interaction matters.

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

TELE 301 Network Management. Lecture 18: Network Security

Seminar Computer Security

Corporate Account Takeover & Information Security Awareness

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Malicious Network Traffic Analysis

Internet Security. For Home Users

Preventing Corporate Account Takeover Fraud

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Presented by:!!dave Kennedy (RELIK)"!!!!!Ryan Macfarlane "

Firewalls, Tunnels, and Network Intrusion Detection

Cyber Security Awareness. Internet Safety Intro.

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Check list for web developers

Network and Incident monitoring

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Spam in Q Contents. Fake notifications from mobile applications. Darya Gudkova

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CA Nimsoft Monitor. Probe Guide for E2E Application Response Monitoring. e2e_appmon v2.2 series

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Storm Worm & Botnet Analysis

Description: Course Details:

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Cloud Services Prevent Zero-day and Targeted Attacks


ITEC441- IS Security. Chapter 15 Performing a Penetration Test

M2M Series Routers. Port Forwarding / DMZ Setup

Web Vulnerability Scanner by Using HTTP Method

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Corporate Account Takeover & Information Security Awareness

Current counter-measures and responses by CERTs

Backoff: New Point of Sale Malware. 31 July National Cybersecurity and Communications Integration Center

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

ICTN Enterprise Database Security Issues and Solutions

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

isheriff CLOUD SECURITY

Penetration Testing: Lessons from the Field

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Transcription:

590.7 Network Security Lecture 2: Goals and Challenges of Security Engineering Xiaowei Yang

Roadmap What is security? Examples of secure systems Security properties Challenges

What is security? System correctness If user supplies expected input, system generates desired output Security If attacker supplies unexpected input, system does not fail in certain ways

What is security? System correctness Good input Good output Security Bad input Bad output

How to analyze a security system 1. Policy What you are supposed to achieve 2. Mechanism The techniques to meet the policy requirements Ex: ciphers, access controls 3. Assurance (security guarantees) The amount of reliance one can place on each mechanism 4. Incentives Motive that good guys do their jobs right and bad guys defeat your policy

Policy Incentives Mechanism Assurance

Ex: analyzing the 911 attack A failure of policy not mechanism Policy changed later Assurance is poor

Examples of security systems Home Hospital Bank

Home Home banking Remote car keys Mobile phones Wireless routers

Hospital Keeping patient records private Anonymizing patient records Web-based access to patient records

Bank Bookkeeping a customer s transactions ATM Bank websites Messaging systems Bank offices

Security Properties Confidentiality Information about system or its users cannot be learned by an attacker Integrity Protected information not modified by attackers Availability Actions by an attacker do not prevent users from having access to use of the system

General picture System Alice Attacker Security is about Honest user (e.g., Alice, Bob, ) Dishonest Attacker How the Attacker Disrupts honest user s use of the system (Integrity, Availability) Learns information intended for Alice only (Confidentiality)

Network security Network Attacker System Intercepts and controls network communication Alice

Web security System Web Attacker Sets up malicious site visited by victim; no control of network Alice

Operating system security OS Attacker Controls malicious files and applications Alice

System Alice Attacker Confidentiality: Attacker does not learn Alice s secrets Integrity: Attacker does not undetectably corrupt system s function for Alice Availability: Attacker does not keep system from being useful to Alice

Challenges Buggy code Inexperienced users Poorly designed protocols Insider attacks What can you trust?

occasionally throughout the paper. Figure 2: The absolute number of projected errors in Buggy code Number of Bugs 250 200 150 100 Total Number of Projected Bugs Through Time Code Base Growth Block-projected Null-projected Var-projected Float-projected Real-projected 2.1.0 2.1.60 2.3.99-pre6 2.3.40 2.3.0 2.4.1 1.8 1.6 1.4 1.2 1 0.8 0.6 MLOC 50 1.0 1.2.0 0.4 0.2 0 0 01/94 01/95 01/96 01/97 01/98 01/99 01/00 01/01

Market place for vulnerabilities Option 1: bug bounty programs Google Vulnerability Reward Program: 3K $ Mozilla Bug Bounty program: 500$ Pwn2Own competition: 15K $ Option 2: Zero Day Initiatives, idefense: 2K 25K $

Market place for vulnerabilities Option 3: black market

Marketplace for owned machines clients spam bot keylogger Pay-per-install (PPI) services Own victim s machine Download and install client s code Charge client Cost: US 100-180$ / 1000 machines Asia 7-8$ / 1000 machines PPI service Victims Source: Cabalerro et al. (www.icir.org/vern/papers/ppi-usesec11.pdf)

Why own machines? Steal IP addresses Use the infected machine s IP address for: Spam (e.g. the storm botnet) Spamalytics: infection Denial of Service: 1:12M pharma spams leads to purchase 1:260K greeting card spams leads to Services: 1 hour (20$), 24 hours (100$) Click fraud (e.g. Clickbot.a)

Why own machines: Steal user credentials keylog for banking passwords, web passwords, gaming pwds Example: SilentBanker (2007) User requests login page When user submits information, also sent to attacker Malware injects Javascript Bank sends login page needed to log in Bank Similar mechanism used by Zeus botnet

Challenges Buggy code Gullible users Poorly designed protocols Insider attacks What can you trust?

Inexperienced users Phishing attacks I am stuck in London lost my wallet Poor choice of Passwords Unchanged default username/password

Poorly designed protocols telnet Send plain passwords over the network TCP Fixed initial syn numbers BGP Unauthenticated messages

Insider attacks Hidden trap door in Linux (nov 2003) Allows attacker to take over a computer Practically undetectable change (uncovered via CVS logs)

What can you trust? What code can we trust? Consider "login" or "su" in Unix Is RedHat binary reliable? Does it send your passwd to someone? Can't trust binary so check source, recompile Read source code or write your own Does this solve problem?

Compiler backdoor This is the basis of Thompson's attack Compiler looks for source code that looks like login program If found, insert login backdoor (allow special user to log in) How do we solve this? Inspect the compiler source

C compiler is written in C Change compiler source S } compiler(s) { if (match(s, "login-pattern")) { compile (login-backdoor) return } if (match(s, "compiler-pattern")) { compile (compiler-backdoor) return }... /* compile as usual */

Avoid detection Compile this compiler and delete backdoor tests from source Someone can compile standard compiler source to get new compiler, then compile login, and get login with backdoor Simplest approach will only work once Compiling the compiler twice might lose the backdoor But can making code for compiler backdoor output itself (Can you write a program that prints itself? Recursion thm) Read Thompson's article Short, but requires thought

Self-reproducing code example Code that prints itself public class Quine { public static void main( String[] args ) { char q = 34; // Quotation mark character String[] l = { // Array of source code "public class Quine", "{", " public static void main( String[] args )", " {", " char q = 34; // Quotation mark character", " String[] l = { // Array of source code", " ", " };", " for( int i = 0; i < 6; i++ ) // Print opening code", " System.out.println( l[i] );", " for( int i = 0; i < l.length; i++ ) // Print string array", " System.out.println( l[6] + q + l[i] + q + ',' );", " for( int i = 7; i < l.length; i++ ) // Print this code", " System.out.println( l[i] );", " }", "}", }; for( int i = 0; i < 6; i++ ) // Print opening code System.out.println( l[i] ); for( int i = 0; i < l.length; i++ ) // Print string array System.out.println( l[6] + q + l[i] + q + ',' ); for( int i = 7; i < l.length; i++ ) // Print this code System.out.println( l[i] ); } }