No Free Lunch in Cyber Security



Similar documents
US Federal Cyber Security Research Program. NITRD Program

Cybersecurity Strategies: The QuERIES Methodology

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Network Mission Assurance

Measuring Software Security

How To Secure Cloud Computing

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Locked Shields Kaur Kasak 24 Sept 2013

Zak Khan Director, Advanced Cyber Defence

Addressing Human Behavior in Cyber Security

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

BM482E Introduction to Computer Security

Cyber Adversary Characterization. Know thy enemy!

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Intelligent Worms: Searching for Preys

Building and deploying effective data science teams. Nikita Lytkin, Ph.D.

Cyber R &D Research Roundtable

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

RETHINKING CYBER SECURITY

Vulnerability Management

Trend Micro. Advanced Security Built for the Cloud

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Critical Security Controls

Turn the Page: Why now is the time to migrate off Windows Server 2003

Cyber Watch. Written by Peter Buxbaum

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

The 5 Cybersecurity Concerns You Can t Overlook

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Is your SIEM ready.???

Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology

Improving Business Intelligence: The Power of Metrics

Metrics Suite for Enterprise-Level Attack Graph Analysis

Microsoft Technologies

Virtual Patching: a Proven Cost Savings Strategy

Update On Smart Grid Cyber Security

Lumension Guide to Patch Management Best Practices

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14)

Cyber Security Research and Development: A Homeland Security Perspective

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Everything you need to know about flash storage performance

DoD Strategy for Defending Networks, Systems, and Data

Beyond the Hype: Advanced Persistent Threats

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Obtaining Enterprise Cybersituational

A Biologically Inspired Approach to Network Vulnerability Identification

SECURITY. Risk & Compliance Services

Best Practices for Vulnerability Management

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Cyber attack on Twitter, 250,000 accounts hacked

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

2011 Forrester Research, Inc. Reproduction Prohibited

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

A Primer on Cyber Threat Intelligence

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Transcription:

No Free Lunch in Cyber Security George Cybenko gvc@dartmouth.edu Jeff Hughes jeff.hughes@tenet3.com MTD Workshop Scottsdale AZ November 3, 2014

Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr. Gabriel Stocco*, Microsoft Dr. Patrick Sweeney*, US Air Force, AFRL ARO, AFRL, DOD funding * former Ph.D. students 2

Goals of this talk Identify tradeoffs among MTD s Encourage discussion Stimulate the work at the workshop

Basic Message There are tradeoffs when using MTD s in real systems What are the tradeoffs? How can they be modeled and measured? How can MTD s be deployed with respect to those tradeoffs to be most useful? Don t believe a weather report made by someone selling umbrellas. - This is where we are now. 4

Context MTD is a hot security technology NITRD security focus area DARPA programs (eg, CFAR) MURI topics (eg 2013 ARO) etc, etc Making MTD operationally useful/attractive Many good security concepts never get used

Ongoing Effort 2013 ARO MURI Adversarial and Uncertainty Reasoning for Adaptive Cyber Defense Thrust 3 Adaptation Mechanisms Thrust 2 Game Theoretic Modeling and Analysis Attack Strategy Seeds Control Theoretic Modeling and Analysis Thrust 4 Tradeoff and Stability Models Optimized Defensive Actions Integrated Analysis and Decision Making Adaptive Defense OODA Loop Adversarial Modeling Adversary Types and Objectives External Intelligence Optimized Adaptations Thrust 1 Observations and Measurements Adversarial and Uncertainty Reasoning for Adaptive Cyber Defense Networked Information System and Environment Thrust 1 Lead: Cybenko Thrust 2 Lead: Wellman Thrust 3 Lead: Jajodia Thrust 4 Lead: Liu George Mason, Dartmouth, Michigan, Penn State, (UMD)

Adaptive Cyber Defense = Moving Target Defense Techniques + Control and Game Theoretic Reasoning 7

Control and Game Theoretic Reasoning Strategic Level: Which MTD s to develop Operational Level: Which MTD s to use in a specific configuration/mission Tactical Level: How to deploy an MTD dynamically Requires orderings of MTD costs/utilities for both attackers and defenders Cybenko & Wellman, 2009 DARPA ISAT Study 8

There are many MTD ideas At least 39 documented in this 2013 MIT Lincoln Labs Report >50 today? How can we compare them? 9

Possible MTD Evaluation Techniques Analytics (Math or Data) Testbed Network Simulations Red Teaming Expert Surveys or Elicitations Operational Network Effectiveness M o o o o Implementation Costs Performance Costs M + D o o o o Usability o Security Priority D Good Sometimes Bad M Math based D Data based 10

MTD Properties (rows) Effectiveness: The increase in adversary workload Implementation Costs: Cost to deploy in an enterprise Performance Costs: Host and network overhead Usability: Administrator and end-user effort to administer and use Security Priority: Importance of the attack surface addressed 11

Evaluation Techniques (columns) Analytics (Math or Data): A mathematical (M) or data analysis (D) approach to quantifying an MTD approach Simulations: High-level models of systems, workloads and traffic used to estimate metrics through simulation Testbed Network: Systems, workloads and traffic realized in an isolated network and instrumented to estimate metrics during actual runs Red-Teaming: Experts test cyber defenses on a operational or testbed network to find and exploit vulnerabilities Expert Surveys: Soliciting technical experts opinions and insights using descriptions, not simulations or testbeds Operational Network: Actual network used in an operational setting 12

Possible MTD Evaluation Techniques Analytics (Math or Data) Testbed Network Simulations Red Teaming Expert Surveys or Elicitations Operational Network Effectiveness M o o o o Implementation Costs Performance Costs M + D o o o o Usability o Security Priority D Good Sometimes Bad M Math based D Data based 13

The Competitive Exclusion Principle No stable equilibrium can be attained in an ecological community in which some r components are limited by less than r limiting factors. In particular, no stable equilibrium is possible if some r species are limited by less than r factors. S. A. Levin. Community equilibria and stability, and an extension of the competitive exclusion principle. American Naturalist, 104:413 423, 1970. 14

Computing Example (OS s) Three limiting factors Implementation Costs Performance Costs Usability Three species Windows (Implementation Costs) Linux (Performance Costs) Mac OS (Usability) 15

MTD Implications What are the limiting factors? Implementation Costs Performance Costs Usability Vulnerabilities mitigated (multiple) How many and which species of MTD s? ASLR?? 16

Workshop Questions - 1 How we compare MTD s against each other? What do we compare? Will it be objective? Will only a handful survive? (= number of limiting factors) 17

Types of Diversity in MTD s Harder Natural Diversity (Macroscale) EG: Different communication technologies Pseudo Diversity (Mesoscale) EG: Different implementations of one protocol Artificial Diversity (Microscale) EG: Randomization of one implementation 18

The Time-to-Compromise Metric See QuERIES, Carin, Cybenko and Hughes, IEEE Computer, August 2008. Cybenko, Hughes http://timreview.ca/arti cle/712, 2013.

Implications for the Different CIA Security Goals As the number of replicated Artificial Diversity components or services increases, the time to defeat the different CIA goals fills out the support of f(t) α Median m β Time Time to defeat confidentiality by n attackers approaches α Time to defeat integrity by n attackers approaches m Time to defeat availability by n attackers approaches β See workshop paper, No Free Lunch in Cyber Security

Workshop Question - 2 Which MTD s offer real advantages against Confidentiality attacks (a single system compromise) when there are many determined attackers? How fast does an MTD have to move? Do we need different types of MTD s to protect against each one of Confidentiality, Integrity and Availability attacks? 21

Discussion 22

Workshop Questions - 1 How we compare MTD s against each other? What do we compare? Will it be objective? 23

Workshop Question - 2 Which MTD s offer real advantages against Confidentiality attacks (a single system compromise) when there are many determined attackers? How fast does an MTD have to move? Do we need different types of MTD s to protect against each one of Confidentiality, Integrity and Availability attacks? 24