System Aware Cyber Security Architecture



Similar documents
System Aware Cyber Security

How To Design A Cyber Security Architecture

IOmark Suite. Benchmarking Storage with Applica4on Workloads August, Evaluator Group, Inc.

How to Develop a Funding Model

BBM467 Data Intensive ApplicaAons

TL 9000 Measurements Handbook, Release 5.0

SERC Security. By Jennifer Bayuk

Scality RING High performance Storage So7ware for pla:orms, StaaS and Cloud ApplicaAons

BBM467 Data Intensive ApplicaAons

Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham

BBM467 Data Intensive ApplicaAons

IBM's Strategic Approach to System- Centric MFT with Sterling Connect:Direct and WebSphere MQ Advanced

Business Case Development for Credit and Debit Card Fraud Re- Scoring Models

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Informa4on Security Management at Cer4ficate Authori4es

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

How To Manage Security On A Networked Computer System

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Recruitment Process Outsourcing

evm Virtualization Platform for Windows

Agile Contracts The Foundation of Successful Partnering

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015

Network Mission Assurance

Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World

Wireless Sensor Networks Chapter 14: Security in WSNs

On Reliability of COTS Hardware

Innova&ve IT Solu&ons. Oracle ACFS / Cloud File System. Unleash your Business- criacal ApplicaAons. Ma#hias Pölzinger Senior Consultant

Network Management and Monitoring Software

A distributed data processing architecture for real time intelligent transport systems

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

SECURITY. Risk & Compliance Services

Execu&ve Coaching Program Design Checklist

SAN Conceptual and Design Basics

University of Greenwich Graduate Internship Programme. Welcome Jerry Allen

Identity & Access Management: Strategic Roadmap. April 2013

Cyber Security Metrics Dashboards & Analytics

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper

CSC 774 Advanced Network Security. Outline. Related Work

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

4.1 CD BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Marble & MobileIron Mobile App Risk Mitigation

A Primer on Cyber Threat Intelligence

Audit Logging. Overall Goals

Combating Cyber Risk in the Supply Chain

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Software Development around a Millisecond

SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS

Windows Embedded Security and Surveillance Solutions

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

Scaling 10Gb/s Clustering at Wire-Speed

Strategic Plan FY

Proactive Network Performance Monitoring

Smart Manufacturing as a Real-Time Networked Enterprise and a Market-Driven Innovation Platform

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Secure Networks for Process Control

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Introduction to Wireless Sensor Network Security

A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

POLIWALL: AHEAD OF THE FIREWALL

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Open Source Software for Cyber Operations:

Adaptive Sampling and the Autonomous Ocean Sampling Network: Bringing Data Together With Skill

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

INTERMEDIATE QUALIFICATION

Transcription:

System Aware Cyber Security Architecture Rick A. Jones October, 2011

Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system to be protected Includes physical systems as well as informaaon systems Requires system engineering support tools for evaluaang architectures factors To facilitate reusability requires establishment of candidate Design PaMern Templates and iniaaaon of a design library Security Design System Impact Analyses ASRR 10/11 October 2011 2

IncorporaAng Recognized Security FuncAons into an Integrated System Aware Security SoluAon Fault Tolerance Diverse ImplementaAons of Common FuncAons Data ConAnuity Checking via VoAng Cyber Security Moving Target with Diversity Physical ConfiguraAon Hopping Virtual ConfiguraAon Hopping Adversary SensiAve System ReconstrucAon AutomaAc Control Systems Data ConAnuity Checking via State EsAmaAon System IdenAficaAon TacAcal Forensics ASRR 10/11 October 2011 3

System Aware Security Architecture Internal Controls Inputs System to be Protected Outputs Internal Measurements System-Aware Security Sub-System ASRR 10/11 October 2011 4

System Aware Cyber Security Subsystem System-Aware Security Sub- System Measurements Measurement Analysis System to be Protected Hopping & Restoral Control System Control Signaling Security Control Decisions ASRR 10/11 October 2011 5

System Aware Security Analysis Selected set for hopping Mission-Risk Ranked System Functions (1) (2) (3) (4) Number of hopped functions (N) System Latency Delay in compromise detection Rate of hopping Mission Risk System Latency ASRR 10/11 October 2011 6

System Aware Security for Facility Defense ASRR 10/11 October 2011 7

Facility Defense System to be Secured We consider a facility defense system consisang of: Streaming sensors conanuously monitoring discrete areas Streaming Servers distribuang sensor data, received over a wired network, to mobile users over a wireless broadcast network Mobile users receiving alerts and streaming data regarding potenaal problems ASRR 10/11 October 2011 8

IllustraAve Architectural Diagram for Candidate Facility Defense System for System Aware Security 9

PotenAal Cyber AMacks Replay amacks masking malicious acavity iniaated through Sensor system Streaming servers User devices DoS amacks addressed through redundancy Sensor system Streaming servers OperaAonal procedures and redundancy regarding user devices ASRR 10/11 October 2011 10

System Aware SoluAon for Securing the Facility Defense System Replay amack defense Diversely Redundant Streaming Sensors, with VoAng (Data ConAnuity Checking) Diversely Redundant, Virtually Hopped Streaming Servers Diverse User Devices, with RotaAng User Surveillance Assignments and Device Use Mobile User based Data ConAnuity Checking DoS defense Redundancy at the Sensor and Streaming server levels Streaming servers / User feed back loops to enable redistribuaon of data and job responsibiliaes ASRR 10/11 October 2011 11

IllustraAve System Aware SoluAon Architecture 12

Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng 100 90 80 Max Possible # of Observable Regions 70 60 50 40 30 No VoAng/Single Stream ConAnuous 3 Stream VoAng 20 10 0 100 150 200 250 500 Stream Fidelity (Kbps) 13

Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng 100 90 80 Max Possible # of Observable Regions 70 60 50 40 30 Loss in User PresentaAon Fidelity No VoAng/Single Stream ConAnuous 3 Stream VoAng 20 10 0 100 150 200 250 500 Stream Fidelity (Kbps) 14

Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng 100 90 80 Max Possible # of Observable Regions 70 60 50 40 30 ReducAon in Maximum Observable Regions No VoAng/Single Stream ConAnuous 3 Stream VoAng 20 10 0 100 150 200 250 500 Stream Fidelity (Kbps) 15

Duty Cycle VoAng for Increasing the Possible Number of Observable Regions Concept Use of Ame division for voang permits an increase in the number of possible surveillance points User compares streams concurrently received from mulaple diversely redundant servers to discover disconanuiaes 3 parameters can be ualized to govern voang Number of Observed Regions Deemed acceptable VoAng Interval for data conanuity checking across all regions Streaming period Ame allomed for conanuity checking (VoAng Time), which can be less than the VoAng Interval Given the VoAng Time can be a subset of the VoAng Interval, the use of Ame division can be ualized to manage informaaon distribuaon over the broadcast network, interleaving mulaple streams for voang users with single streams for other users who are not voang ASRR 10/11 October 2011 16

IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 17

IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 18

IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 19

Duty Cycle VoAng for Increasing the Possible Number of Observable Regions User 1 User 2 Time Time User 3 Time Wireless Network Time Column Heights = Data / Time Interval 20

Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng 100 90 80 Max Possible # of Observable Regions 70 60 50 40 30 No VoAng/Single Stream ConAnuous 3 Stream VoAng Duty Cycle VoAng 20 10 0 100 150 200 250 500 Stream Fidelity (Kbps) 21

AddiAonal Collateral System Impacts Common Cause Failures are reduced MTBF increases in relaaonship to the individual diverse component reliabiliaes Development cost increases based on the cost to develop voang and duty cycle management components, as well as to resolve lower level technical issues that may arise SynchronizaAon needs Sohware integraaon Performance impact measurements and enhancement needs (e.g. CPU ualizaaon, memory, and energy usage) One Ame and life cycle cost increase in relaaonship to the increased complexity 22

Scoring Framework 23

Need: Methodology for EvaluaAng AlternaAve Security SoluAons for a ParAcular System A methodology is required in order to clarify reasoning and prioriazaaons regarding unavoidable cyber security vagaries: RelaAonships between soluaons and adversarial responses MulAdimensional contribuaons of individual security services to complex amributes, such as deterrence Scores can be derived in many different forms Single scalar value where bigger is bemer 2 scalar values: (1) security value added, (2) system level disvalues MulA objecave component scores providing more transparency ASRR 10/11 October 2011 24

Metrics AMack phase based security value factors: Pre AMack (Deterrence) Trans AMack (Defense) Post AMack (RestoraAon) Would include collateral system impact metrics for the security architecture: Performance Reliability, Safety Complexity, Costs ASRR 10/11 October 2011 25

System Aware Security System Scoring Matrix RelaDve Value Weights k 1 k 2 k 3 k 4 k 5 k 6 k j Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost Life Cycle Cost s 11 s 12 s 1j s 21 s 22 s 2j s 31 s 32 s 3j s 41 s 42 s 4j Other (s i ) s i1 s i2 s ij Other ASRR 10/11 October 2011 26

System Aware Security System Scoring Matrix RelaDve Value Weights k 1 k 2 k 3 k 4 k 5 k 6 k j Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost Life Cycle Cost s 11 s 12 s 1j s 21 s 22 j= 1 s 2j s ij = Assurance Level of s 31 s 32 the ith service as s 3j related to the jth value factor s ij = QuanAzed Assurance Level = 0 M s 41 s p n 42 s 4j Security = k j s ij Score j= 1 i= 1 Other (s i ) s i1 s i2 Max Possible Score = n x M s ij p k j = 1 Other ASRR 10/11 October 2011 27

Example Facility Defense Scoring Matrix RelaDve Value Weights K 1 =0.30 K 2 = 0.20 k 3 =0.10 K 4 = 0.20 K 5 = 0.05 K 6 = 0.15 Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost 4 3 4 4 2 2 3 4 3 1 2 3 2 4 3 1 4 3 3 0 4 5 4 2 Max Possible Score = 20 Facility Defense Score = 11.5 Life Cycle Cost Strongest Area is RestoraAon Weakest Area is Life Cycle Cost 28

On Going ExploraAon A pracacal methodology for determining Assurance Level Values Methodology for addressing uncertainty in assigning Assurance Level Values Methodology for ualizing RelaAve Value Weights Tradeoffs between scoring simplicity and transparency of results ASRR 10/11 October 2011 29

Structured Arguments for System Scoring Builds upon the legacy of work developed for safety and informaaon assurance case evaluaaons UAlizes Goal Structuring NotaAon (GSN) for communicaang arguments to support assigned scores in a repeatable and clear manner System Aware security scoring arguments for a paracular system architecture include: Context supplied by the system owner and includes an available risk analysis for the system being protected and scoring guidelines System supplier provides the list of security services to be applied and characterizes the purposes expected of security services that are deemed as most peranent to reducing risk Specific claims about value factors and the anacipated effects of security services on these factors ExplanaAons of how each security service is anacipated to impact specific value factor claims, including explicitly dividing each service into policy, process, and technology components with corresponding explanaaons of value 30

Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (1) Architectural Deterrence Claim Assigned suitable scores for deterrence Service SelecDon Strategy Decompose the Architecture to isolate, for the purposes of scoring, security services that address deterrence Data ConDnuity Service Claim Improves deterrence Diversity Service Claim See later slide Context Risk analysis and scoring guidelines Scoring Assignment Strategy UAlize experts to score service claims with accompanying raaonale Forensics Service Claim Hopping Service Claim 31

Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (2) Data ConDnuity Service Claim (1) ExploitaAon design requires distributed exploit designers Data ConDnuity Service Claim Improves deterrence Data ConDnuity Service Claim (2) ExploitaAon design requires designers with deep systems knowledge.. Data ConDnuity Service Claim (n) 32

Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (3) Data ConDnuity Service Claim (1) ExploitaAon design requires distributed exploit designers Red Team Evidence Document Data ConDnuity Service Claim Improves deterrence System Design Team Evidence Document Intelligence Analysis Evidence Document 33

Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (4) Data ConDnuity Service Claim Improves deterrence Data ConDnuity Service Claim (2) ExploitaAon design requires designers with deep systems knowledge System Design Team Evidence Document 34