Security A Big Question for Big Data



Similar documents
A University Education Cyber Security Paradigm Shift

BlackRidge Technology Transport Access Control: Overview

Meeting Cyber Security Challenges

Practical Steps To Securing Process Control Networks

Endpoint Security Management

Where every interaction matters.

What is Really Needed to Secure the Internet of Things?

Top virtualization security risks and how to prevent them

External Supplier Control Requirements

Security Considerations for DirectAccess Deployments. Whitepaper

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Network and Host-based Vulnerability Assessment

Security Security by Separation

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Spyware Analysis. Security Event - April 28, 2004 Page 1

Patterns for Secure Boot and Secure Storage in Computer Systems

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Zak Khan Director, Advanced Cyber Defence

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Practical Threat Intelligence. with Bromium LAVA

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

NATIONAL CYBER SECURITY AWARENESS MONTH

Seven Strategies to Defend ICSs

EECS 588: Computer and Network Security. Introduction

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Enterprise Cybersecurity: Building an Effective Defense

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

SERENA SOFTWARE Serena Service Manager Security

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Penetration Testing Report Client: Business Solutions June 15 th 2015

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

GlobalSign Malware Monitoring

Penetration Testing Service. By Comsec Information Security Consulting

Unknown threats in Sweden. Study publication August 27, 2014

Deep Security Vulnerability Protection Summary

Mobile Device Management:

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Defending Against Cyber Attacks with SessionLevel Network Security

By:XÇzA A TÅÅtÜ ]A `t{åééw

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Infinity Acute Care System monitoring system

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Windows Phone 8 Security Overview

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Zone Labs Integrity. New Threats, New Solutions: Enterprise Endpoint. Security. Security. A White Paper Presented by Zone Labs. // Trusted Zone //

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Breaking the Cyber Attack Lifecycle

CyberArk Privileged Threat Analytics. Solution Brief

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Hands on, field experiences with BYOD. BYOD Seminar

Anti-exploit tools: The next wave of enterprise security

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Digital Evidence and Threat Intelligence

Windows 7. Qing Liu Michael Stevens

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1

McAfee Server Security

INTRUSION DETECTION SYSTEMS and Network Security

External Supplier Control Requirements

Bypassing Firewalls: Tools and Techniques

Big Data, Big Risk, Big Rewards. Hussein Syed

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Windows Server 2003 End of Support. What does it mean? What are my options?

Microsoft Technologies

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum

RETHINKING CYBER SECURITY

Virtualization Technology

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Intro to Firewalls. Summary

Advanced Endpoint Protection Overview

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

EECS 588: Computer and Network Security. Introduction January 14, 2014

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Tutorial on Smartphone Security

Virtualization System Security

Transcription:

Security A Big Question for Big Data Prof Roger R. Schell University of Southern California Keynote Lecture IEEE BIgData 2013 Santa Clara, CA October 9, 2013

Implications of Current State of IT Security Current security implications intensified by big data Significance of witted adversary Subversion uncommonly impactful and intractable Existential national threat pre 9/11 moment Reactive arms race that cannot work ever!! Decades of surveillance and patch failure indicate In contrast, proven power of principled response Verifiable protection dramatically mitigates subversion A real paradigm shift: no security patches in years of use 1

Implications of Big Data Key Aspects Security impact of big data defining emphases (5 Vs) Volume Velocity Variety Value Veracity The key aspects increase challenge for security Science and foundations Infrastructure Management Searching and mining Applications. 2

Outline of Big Data Security Speech Hard problem: software subversion Ineffective response: band aid solutions Opportunity: leverage verifiable protection 3

Vulnerable to Trojan Horse Attack Hidden functionality in big data apps & solutions Adversary usually outsider (stranger to victim) Can be surreptitiously distributed Big data application user is unwitting agent Requires victim (user) to execute application Constrained by system security controls on victim Exploitation undetected & controlled by remote design Big data cloud paradigm opens vast opportunity Testing & review to detect is futile and delusional Stegonography and such defy perimeter detection Little mitigation in apps & most security solutions 4

Trap Door Platform Subversion Malicious code in platform running big data apps Software, e.g., operating system, drivers, tools Hardware/firmware, e.g., BIOS in PROM Artifice can be embedded any time during lifecycle Adversary chooses time of activation Can be remotely activated/deactivated Unique key or trigger known only to attacker Needs no (even unwitting) victim use or cooperation Efficacy and Effectiveness Demonstrated Exploitable by malicious applications, e.g., Trojans Long term, high potential future benefit to adversary Testing not at all a practical way to detect Even open source cannot be counted on 5

Big Data Security Network Reality Determined competent adversary understands Reality of current CDS: Trojan horse planted: Substantial high data leakage to low domain Malicious software gives low attacker access to data Trap door planted: Low has repeated undetectable access to high information for years or decades High Network Domain Cross Domain Solution (CDS) Operating System Low Network Domain 6

NPS Linux Trap Door Demo Navel Postgraduate School thesis* Major Linux distribution Network File Server (NFS) subversion Trap door activated with trigger known to attacker Unrestricted access to all NFS files Attacker need not be legitimate user of the system Less than a dozen lines injected into source Triggered by attacker over the Internet Representative of platforms in big data context Only defense: don t connect to big data network *March 2002 Thesis by Emory A. Anderson, III 7

Summary of Subversion Process Step #1 infrastructure subversion Integral to installed software, e.g. trap door Added to software suite during lifecycle, e.g., viruses Big attraction: easy to avoid being apprehended Perpetrator not present at time of attack Step #2 execution of artifice software Can activate by unique key or trigger NPS demo, 12 lines of code (LOC) subverts Linux NFS Step #3 (optional) two card loader Bootstrap small toehold for diverse customized attacks NPS demo with 6 LOC to subvert XP and then IPSEC Step #4 access unauthorized domain data Information flow between big data sources 8

Outline of Big Data Security Speech Hard problem: software subversion Low cost, low risk to attacker, virtually undetectable Highly effective, extensible, e.g., two card loader Ineffective response: band aid solutions Opportunity: leverage verifiable protection 9

Common Practice Misaligned with Threat Internet is notorious for abysmal security Failures of firewalls, intrusion detection, web servers Strong crypto, VPN and PKI on foundations of sand Operating systems are soft underbelly Demonstrated by Argus Pit Bull lost challenge Open to planned attack trap doors & Trojan horses Pervasive source of liability in Internet components No business recourse for platform failures Exposed data, crypto keys and forged certificates Security not objectively measured for insurance Billions in opportunity costs need web efficiencies Insecurity has doomed numerous solutions Big data environment intensifies these challenges 10

Impact Indications and Warning Vendor downloadable product subverted Cracker gained user level access to modify the download file.... you pray never happens, but it did. WordPress, reported on wordpress.org, March 2, 2007 SW subversion steals credit/debit card data an illicit and unauthorized computer program was secretly installed at every one of its 300 plus stores. Hannaford Bros. Co., reported on eweek.com, March 28, 2008 IC recognition that subversion is likely shocked if tools and capabilities and techniques have not been left in U.S. computer systems," Admiral Mike McConnell, Recent DNI, CBS 60 Minutes, Jun 10, 2010 Russian spies use stenography in espionage more than 100 text files embedded in steganographic images exchanged between the [spies] and Moscow Washington Post, June 30, 2010 11

Flaws in System Solutions Missed False security from isolated components Customers cannot responsibly judge flaws Lack approved system security evaluation criteria Unskilled in assessing methods to address subversion Only a verifiably secure CDS is evaluatable On verifiable trusted computing base (TCB) platform Last coherent codification in TCSEC Class A1 System security must be designed in, not bolted on Includes composition of partitions and subsets 12

Future of Security Band aids 13

Outline of Big Data Security Speech Hard problem: software subversion Low cost, low risk to attacker, virtually undetectable Highly effective, extensible, e.g., two card loader Ineffective response: band aid solutions Current practice invites catastrophic big data impacts Pixie dust of secure components gives false security Opportunity: leverage verifiable protection 14

Verifiable Protection Mitigates Subversion Mature, proven trusted systems technology TCSEC/TNI need not be used as organizational utterance for policy 15

Can Substantially Addresses Subversion Common Criteria EAL7 (Selected PP) EAL6 EAL5 EAL4 EAL3 EAL2 TCSEC A1 B3 B1 B2 C2 C1 NO VULNERABILITIES UNKNOWN VULNERABILITIES Beware of No Man s Land Only Class A1/EAL7 excludes malicious software 16

Proven Solution: Security Kernel The only way we know... to build highly secure software systems of any practical interest is the kernel approach. ARPA Review Group, 1970s (Butler Lampson, Draper Prize recipient) Appliances Applications Verifiably Secure Platform Security Services Verifiable Security Kernel Intel x.86 Hardware Platform Network Monitor/ Keyboard Disk Operating System 17

Class A1 enables secure system Plant trap door or Trojan horse High Domain Impossible to find or fix Computer Science general case Application security noncomputable Arms race we can t win IBM Protects data despite apps Computer Science special case Security kernel is computable Completeness Isolation Verifiability Class A1 doesn t assume secure applications Applications, Sandboxes, Chrome OS, others Class A1 TCB (e.g., GEMSOS) Low Domain 18 18

Secure Big Data Cloud Storage Operates like standard file storage BUT, verifiable security for big data High Assurance Secure Network File Storage Highly Sensitive Data Low Sensitivity e.g., Open Internet Storage Media Highly Sensitive Data Low Sensitivit y Data 19

Secure Big Data Cloud Storage Commercial Untrusted servers Highly Sensitive Data Verifiably Secure Platform (e.g., GEMSOS Class A1 TCB) Intel ia32 H/W Removable storage Persistent Storage æsec Low Sensitivity e.g., Open Internet Standard protocols (e.g., NAS, FTP), with: Strong separation High integrity n to n controlled sharing Trusted Distribution Multiprocessor scalability Storage Segments 20

Outline of Big Data Security Speech Hard problem: software subversion Low cost, low risk to attacker, virtually undetectable Highly effective, extensible, e.g., two card loader Ineffective response: band aid solutions Current practice invites catastrophic mission impacts Pixie dust of secure components gives false security Opportunity: leverage verifiable protection Innovative application designs to exploit TCB Preserve much of existing software Apply supportive hardware, e.g., segmentation, rings, TPM Demo starting with sound security, adding functionality Help users validate product hypothesis to vendors 21

Impact Summary for Big Data Computation for massive amounts of data Complex analytics and database operations Remotely from the data owner s enterprise Access to data from multiple and diverse domains Limitations of security best practices well known Big data increases opportunity for attackers Insert malicious software in apps and operating systems Pivotal choice for big data Use rich set of proven concepts for verifiable protection Risk massive disasters that discredit big data approach Need good education and reference implementation 22

Security A Big Question for Big Data Prof Roger R. Schell University of Southern California Keynote Lecture IEEE BIgData 2013 Santa Clara, CA October 9, 2013