A Framework for Secure and Verifiable Logging in Public Communication Networks



Similar documents
The Comprehensive Guide to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Securing Data on Microsoft SQL Server 2012

Content Teaching Academy at James Madison University

MS-55096: Securing Data on Microsoft SQL Server 2012

PCI DSS Requirements - Security Controls and Processes

Tim Bovles WILEY. Wiley Publishing, Inc.

ICANWK406A Install, configure and test network security

Cryptography and Network Security

Secure cloud access system using JAR ABSTRACT:

Implementing Cisco IOS Network Security v2.0 (IINS)

CISCO IOS NETWORK SECURITY (IINS)

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Complying with PCI Data Security

Cryptography and Network Security Chapter 1

That Point of Sale is a PoS

Passing PCI Compliance How to Address the Application Security Mandates

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Evaluate the Usability of Security Audits in Electronic Commerce

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Information System Security

Bit Chat: A Peer-to-Peer Instant Messenger

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

information security and its Describe what drives the need for information security.

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

74% 96 Action Items. Compliance

An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

PCI Data Security Standards (DSS)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Introduction to Security

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Did you know your security solution can help with PCI compliance too?

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

INFORMATION TECHNOLOGY SECURITY STANDARDS

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Chap. 1: Introduction

ISO Controls and Objectives

Cisco Advanced Services for Network Security

Central Agency for Information Technology

How To Secure An Rsa Authentication Agent

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

COSC 472 Network Security

Common Remote Service Platform (crsp) Security Concept

CSE/EE 461 Lecture 23

Compliance and Security Challenges with Remote Administration

CPSC 467b: Cryptography and Computer Security

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

State of Texas. TEX-AN Next Generation. NNI Plan

Building A Secure Microsoft Exchange Continuity Appliance

Knowledge Based Authentication (KBA) Metrics

United States Trustee Program s Wireless LAN Security Checklist

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Avaya TM G700 Media Gateway Security. White Paper

Single Sign-On Secure Authentication Password Mechanism

Newcastle University Information Security Procedures Version 3

Avaya G700 Media Gateway Security - Issue 1.0

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Data Protection: From PKI to Virtualization & Cloud

Basics of Internet Security

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

GFI White Paper PCI-DSS compliance and GFI Software products

Skoot Secure File Transfer

Brainloop Cloud Security

Introduction to Cyber Security / Information Security

SonicWALL PCI 1.1 Implementation Guide

IT Networking and Security

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Weighted Total Mark. Weighted Exam Mark

Information Technology Branch Access Control Technical Standard

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

TELECOMMUNICATION NETWORKS

Attestation and Authentication Protocols Using the TPM

Cisco Certified Security Professional (CCSP)

Taxonomic Modeling of Security Threats in Software Defined Networking

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Network Security Guidelines. e-governance

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Securing the Interconnect Signaling Network Security

Network Security Administrator

Transcription:

A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr emagos@ionio.gr Hellenic Authority for the Assurance of Communications Security and Privacy ADAE (www.adae.gr)

Presentation Structure Introduction and Problem Description Related Work Existing and Proposed Threat Models Our Solution Conclusions

1. Introduction Examined Problem: Secure and Verifiable Logging for Public Network Providers Telephony ISPs VoIP, etc Public Networks are part of the Critical Infrastructure Regulatory Authorities (RAs) are usually responsible to regulate, audit and verify the security level of the Providers

Security Threats Although Security Standards and measures exist, there are still security holes such as: Intrusion attacks Communication interception Unauthorized access to privileged data (e.g. CDRs) Abuse of privileges

Existing Threat Models Trusted Log Generators and Marginally Trusted Log Server The Logs are generated in a trusted environment The Log Server is marginally trusted and needs to be protected Mainly examines disclosure and modification attacks against the stored logs Distributed Log Generators and Marginally Trusted Log Server In addition to the previous model, attacks during the transmission of log data are considered, e.g. impersonation attacks against log generators, disclosure attacks against log messages during transmission

Our Motivation: The Greek Tapping Scandal Victims: VIP Subscribers of a Mobile Telecom Provider What happen: Part of the core network of the provider was compromised by some unknown trojan-like program It activated the LI (Lawfull Interception) component, already existing in inactive mode Turned off the logging of the LI sub-system It was discovered after several months period when the trojan affected the SMS subsystem of a roaming provider

The problem With or without the provider s being informed Log generators may intentionally be programmed to send modified log messages towards log servers Log Files may intentionally be modified after their storage to the Log servers.

Our Threat Model An extension of the previous models: It assumes Marginally Trusted Log Generators, Log Servers and Communication Channel We consider both external and internal attacks We also consider attacks such as: Modification attacks on the stored logs from compromised log servers Modification attacks from compromised log generators Modification attacks from cooperating log generators and log servers

Our Solution: A Framework for Secure and Verifiable Logging It assumes the partially trusted threat model Both external and internal attacks A trusted RA is responsible to audit the network and verify the validity of the log files. It consists of 6 phases

Administrative approach Phase 1: Define a Log Reference Model It links Functions to the corresponding Log Files that monitor these Functions. Services implement the Functions.

Functional Plane. It models the network and operational events within a network, without taking into consideration implementation details, architectural or topology constraints. (1) Security Functions (e.g. system access control, password management, user management, Lawful Interception, Data Retention). (2) Service Management Functions (e.g. monitoring, troubleshooting, management services) and (3) Network Management Functions (e.g. network configuration, network connectivity, routing).

Service and Application Plane. It describes all specific services which are executed within the network or IT nodes. It discriminates system from application services, while it takes into consideration the OS platform, communication protocols and interconnections and hardware. Examples of services of this plane are the snmp service, the dsl service, the password management service, the AAA service, the radius service etc.

Logging Plane It describes specific commands and events of each used service, which can be grouped into separated log files. For example, the command show user (captured for displaying user names) will be logged in a log file named password management. This log file will correspond to the password management service, which implements part of the security management functions.

Phase 2: Define the requirements of log files It defines the requirements of each log file regarding: The Structure of each log file Generation frequency of each log file Storage requirements (time, place, format, )

Technical approach: Phase 3: Security Measures against External Attacks Use the Schneier Kelsey model Uses symmetric cryptography and hash chains Update a symmetric key to protect each log entry Provides forward security

Schneier Kelsey model Each log server is supplied with an initial symmetric key A0. The key A0 is updated for each new log entry, through a cryptographic one-way hash function hash, i.e. Ai = hash(ai 1). The encryption is EKi(Di) where Ki = hash(wi,ai) and Wi is the permission mask of the data entry Di. Each log entry Li contains the hash value Yi = hash(yi 1, EKi(Di), Wi), (for Y0 a padding value is used), as well as the Message Authentication Code Zi = MACAi (Yi).

Schneier Kelsey model Weakness Even in this case, it is possible for a compromised log server to modify the log file. Example: If an adversary knows key Ai, and has access to the log files, he reconstructs keys Ai+1, Aj and the original log entries are replaced by the manipulated log entries.

Phase 4: Security Measures against Internal Attacks Extension of Schneier Kesley s model. Limited interaction of the provider with the RA. Manually generated digital signatures of Log files in predefined periods Automatically generated digital signatures of log entries in random time intervals Remote storage of digital signatures in the RA.

Phase 4: Security Measures against Internal Attacks Manual signatures: Use a signature key SK 1 in an isolated device. Only by authorized personnel The signature period depends on the security and operational needs. The period is jointly defined by the Provider and the RA. The signature is used to prove the validity of the Log file in a given time period.

Phase 4: Security Measures against Internal Attacks Automated signatures: Use an independent signature key SK 2 installed in the Mediation Device of the Provider. It is automatically generated when a critical event takes place. The list of critical events is pre-defined by the Provider and the RA. It may also be triggered by the RA in random times. It refers only to a single or a small group of log events, not an entire time period.

Phase 5: Implementation Design

Phase 6: Log Verification Procedure 1. Verify the manually generated signatures (using PK 1 ) to verify the validity of the Log file. 2. If the signature is invalid, then the Log file has been tampered by the Provider. 3. Verify the automated signatures (using PK 2 ) to verify the validity of critical and random log events. 4. If one or more signatures are invalid, then the RA has evidence that at some point the logs have been tampered. 5. If all signatures are verified well, the Provider has evidence that the Log files are secure.

Conclusions 1. Existing Secure Log systems mainly protect from external attacks 2. In Public Communication Networks however, internal or combined attacks must be considered. 3. We extend the Schneier Kelsey model with: Off-line manual signatures Automated signatures Limited interaction of the RA and periodic remote storage of log file signatures. 4. Operational costs must be considered and minimized.