Let SDN Be Your Eyes: Secure Forensics in Data Center Networks



Similar documents
Secure Network Provenance

How To Write A Transport Layer Protocol For Wireless Networks

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu

A very short history of networking

Network Security through Software Defined Networking: a Survey

Cloud security architecture

DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Fail-Safe IPS Integration with Bypass Technology

Security Toolsets for ISP Defense

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

A Framework for Secure and Verifiable Logging in Public Communication Networks

Chapter 7 Information System Security and Control

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Software-Defined Networking. Starla Wachsmann. University Of North Texas

Security in Software Defined Networking. Professor : Admela Jukan Supervisor : Marcel Caria Student : Siqian Zhao

Notes on Network Security - Introduction

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Breach Found. Did It Hurt?

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

CTS2134 Introduction to Networking. Module Network Security

Chap. 1: Introduction

Protecting Your Organisation from Targeted Cyber Intrusion

Relationship between SMP, ASON, GMPLS and SDN

SDN Security Design Challenges

Bootstrapping "softwarised" infrastructure trust: from SDN towards NFV

Acceptable Use Policy Revision date: 26/08/2013

Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework)

Denial of Service in Sensor Networks

Service Design Best Practices

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Wireless Sensor Networks Chapter 14: Security in WSNs

Analyzing HTTP/HTTPS Traffic Logs

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

Ohio Supercomputer Center

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

A Mock RFI for a SD-WAN

SIMPLE NETWORKING QUESTIONS?

The Comprehensive Guide to PCI Security Standards Compliance

SURE 5 Zone DDoS PROTECTION SERVICE

Concierge SIEM Reporting Overview

COSC 472 Network Security

CorreLog Alignment to PCI Security Standards Compliance

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Security Challenges & Opportunities in Software Defined Networks (SDN)

Diagnosing the cause of poor application performance

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Flow processing and the rise of the middle.

Cryptography and Network Security

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Ten Things to Look for in an SDN Controller

Tema 5.- Seguridad. Problemas Soluciones

Evaluate the Usability of Security Audits in Electronic Commerce

DDoS Overview and Incident Response Guide. July 2014

BlackRidge Technology Transport Access Control: Overview

Validating the System Behavior of Large-Scale Networked Computers

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Intrusion Detection System

Embrace SDN the Future of Networking is Here

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

Network Monitoring for Cyber Security

On the effect of forwarding table size on SDN network utilization

Trusting SDN. Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

software networking Jithesh TJ, Santhosh Karipur QuEST Global

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Effective disaster recovery using Software defined networking

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

HANDBOOK 8 NETWORK SECURITY Version 1.0

Building Blocks Towards a Trustworthy NFV Infrastructure

Towards Autonomic DDoS Mitigation using Software Defined Networking

How To Ensure Correctness Of Data In The Cloud

DDoS Protection on the Security Gateway

Automated Formal Analysis of Internet Routing Systems

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

Securing Local Area Network with OpenFlow

Stateful Inspection Technology

Complete Protection against Evolving DDoS Threats

8. 網路流量管理 Network Traffic Management

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

1. Introduction. Securing the SDN

Guideline on Auditing and Log Management

Software Defined Networks

SDN/Virtualization and Cloud Computing

Cryptography and Network Security Chapter 1

Vidder PrecisionAccess

Understanding Latency in Software Defined Networks

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

SDN and Data Center Networks

How OpenFlow-based SDN can increase network security

Key Management Interoperability Protocol (KMIP)

Restorable Logical Topology using Cross-Layer Optimization

Software Defined Networking Security

Transcription:

Let SDN Be Your Eyes: Secure Forensics in Data Center Networks Adam Bates University of Oregon Kevin Butler University of Oregon Andreas Haeberlen University of Pennsylvania Micah Sherr Georgetown University Wenchao Zhou Georgetown University SENT 14, San Diego, CA, USA 23 February, 2014 Computer and Information Science

Secure Forensics Investigating the possibility of a security breach is extremely difficult. When suspicious events may be malicious or benign, finding an explanation for the event can be a tedious, manual task. Due to the possibility of advanced persistent threats, fast detection and investigation of anomalies is essential. 2

Secure Forensics When parts of your network have been compromised, who can you trust to provide answers about the attack?? 3

Let SDN Be Your Eyes We propose that Software Defined Networking (SDN) can be used to bootstrap trust in network forensics for data centers. We present an SDN-based network provenance system that extends into the network itself, creating a secure monitoring layer for all network activity. Our system possesses the ability to: Detect Covert Communication Detect Equivocation Detect Missing Forensic Records 4

Unexpected Behavior? Question: Who can Alice trust for answers about the network? How&was&the&& informa3on& &&exfiltrated?& Internet& Alice& 5

Unexpected Behavior? Question: Who can Alice trust for answers about the network? How&was&the&& informa3on& &&exfiltrated?& Internet& Alice& Answer: Trust the available correct nodes in the network. (Secure Network Provenance [ZFN+2011]) 6

Secure Network Provenance [ZFN+2011] Secure Network Provenance (SNP) constructs a provenance graph based on system execution. Each node manages its own tamper evident log and follows an inter-node message commitment protocol. An administrator queries nodes logs to reconstruct a provenance graph, detecting faulty nodes through finding inconsistencies and omissions. Limitation: SNP anchors trust in a critical mass of correct nodes; its view of the network shrinks as more nodes fail or are compromised. 7

Secure Network Provenance [ZFN+2011] Secure Network Provenance (SNP) constructs a provenance graph based on system execution. How&was&the&& informa3on& &&exfiltrated?& Each node manages its own tamper evident log and follows an inter-node message commitment Internet& protocol. An administrator queries nodes logs to reconstruct a provenance graph, detecting faulty nodes through finding Alice& inconsistencies and omissions. Limitation: SNP anchors trust in a critical mass of correct nodes; its view of the network shrinks as more nodes fail or are compromised. 8

Secure Network Provenance [ZFN+11] Secure Network Provenance (SNP) constructs a provenance graph based on system execution. Our Key Insight: Instead of anchoring trust at Each node manages its own tamper evident log and the follows host, an we inter-node can use message SDN commitment to bootstrap protocol. trust in provenance-based network forensics. An administrator queries nodes logs to reconstruct a provenance graph, detecting faulty nodes through finding inconsistencies and omissions. Limitation: SNP anchors trust in a critical mass of correct nodes; its view of the network shrinks as more nodes fail or are compromised. 9

Software-Defined Networking Programmable switches that facilitate decoupling of network s data plane from an abstract control plane. A Network Controller can instruct switches to handle flows in different ways. This is accomplished by pattern matching on network packet headers. SDN switches offer modest on-board functionality for packet processing, such as forwarding, dropping, flooding, header modification, etc. Higher-level network functionality is achieved by forwarding packets to Middleboxes", which can actually now be placed anywhere in the network. 10

Security Goals Our system sets the following security goals: Prevent Covert Communication: eliminate all unmonitored paths for explicit communication between nodes within the network. Detect Equivocation: catch nodes that attempt to make inconsistent claims about their activities. Response Availability: In the event that message transcripts are missing, this should always be detectable by the system and the administrator. 11

Threat Model & Assumptions Nodes are subject to Byzantine Faults due to compromise or system failure. Faulty nodes may take actions collectively or individually to hide their presence from administrators. ALL communication in the network takes place over a network of SDN switches. SDN switch security, while important, is also not considered here. Switches are trusted. 12

SDN Building Blocks What do we need from SDN? We are looking for a trustworthy global observer of network events. Since SDN switches offer constrained functionality, we introduce Provenance Verification Points (PVP), a middlebox for forensic analysis of network packets. Switches force all flows through a PVP. Switches perform access control of network resources through communication with the PVP/Controller. 13

Provenance Verification Points Provide a verification layer to a host-level message commitment protocol [HKD07]. All network traffic is duplicated at the switch and forwarded to both the recipient and a PVP. During forensic investigation, the administrator queries both the nodes and the PVP in order to get an accurate explanation for network activity. Network(Controller(/(Administrator( PVP( PVP( PVP( PVP( PVPs are a distributed set of middleboxes that observe and record node-to-node communications. 14

Design Consideration #1 Should! the PVPs interpose on traffic, or receive mirrored traffic? Interposition imposes additional latency. Mirroring means that PVPs cannot actively detect or prevent exfiltration, but If a protocol violation is detected, the PVP notifies the Network Controller to isolate the culprit. m m (1)# (2)# PVP# m m (3)# (1)# PVP# (2)# m Option 1: PVPs intercept all messages. m m Option 2: PVPs receive copies of all messages. (4)# (2)# 15

Design Consideration #2 Should! nodes participate in the network provenance protocol? IF PVPs are more trustworthy, cutting out nodes would be more secure But if PVPs do ALL of the work, it will be difficult to keep up with the network in real time Instead, the PVP performs the minimum work needed to assure security goals. m m Option 1: PVP is solely responsible for message tracking. m PVP# m PVP# m Option 2: Nodes track messages sent and received, PVP maintains minimal proof of transmissions. m m m m m 16

Message Commitment Protocol Node A wishes to send a message m to Node B PVP# PVP s Append-Only Log Node A s Append-Only Log Node B s Append-Only Log Node A Node B 17

Message Commitment Protocol Node A wishes to send a message m to Node B PVP s Append-Only Log Node A records m, a signature of his log at the current time, and a signature of his log at the immediate previous time. PVP# Node A s Append-Only Log Node B s Append-Only Log Node A Node B 18

Message Commitment Protocol Node A wishes to send a message m to Node B PVP s Append-Only Log Node A then sends the message and log commitments to Node B. PVP# Node A s Append-Only Log Node B s Append-Only Log Node A Node B 19

Message Commitment Protocol Node A wishes to send a message m to Node B PVP s Append-Only Log When this message arrives at the switch, it is mirrored to Node B and the PVP. PVP# Node A s Append-Only Log m, A(LOGA,t), A(LOGA,t 1) Node B s Append-Only Log Node A Node B 20

Message Commitment Protocol Node A wishes to send a message m to Node B PVP s Append-Only Log After verifying the signatures, Node B logs the entire message from Node A. However, the PVP logs just the current signature (or authenticator ). PVP# A(LOG A,t ) Node A s Append-Only Log Node B s Append-Only Log Node A Node B 21

Message Commitment Protocol Node A wishes to send a message m to Node B PVP s Append-Only Log Node B ACK s message m by following the same procedure, logging the message and then sending an ACK of m and log signatures back to Node A. PVP# A(LOG A,t ) Node A s Append-Only Log Node B s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node A Node B 22

Message Commitment Protocol Node A wishes to send a message m to Node B This message is also mirrored at the switch. After verifying the signatures, Node A logs the message and the PVP logs the authenticator. Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) ACK m, B(LOG B,t+1 ), B(LOG B,t ) PVP# ACKm, B(LOGB,t+1), B(LOGB,t) PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) Node B s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node A Node B 23

Querying Administrator asks Why did m exist at time t? Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node A Why did m exist at time t? PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) PVP# Node B s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node B 24

Querying Administrator asks Why did m exist at time t? Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) I don t know: A(LOG A,t 1 ) Node A Why did m exist at time t? PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) PVP# Node B s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node B 25

Querying Administrator asks Why did m exist at time t? Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) I don t know: A(LOG A,t 1 ) Node A Node A is faulty!! PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) PVP# Node B s Append-Only Log A sent it: ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node B 26

Querying Administrator asks Why did m exist at time t? Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) I don t know: A(LOG A,t 1 ) Node A Why did m exist at time t? PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) PVP# Node B s Append-Only Log I don t know: B(LOG B,t 1 ) ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node B 27

Querying Administrator asks Why did m exist at time t? Node A s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node A Both nodes are faulty! PVP s Append-Only Log A(LOG A,t ) B(LOG B,t+1 ) PVP# Here is proof of A and B s activity at time t: A(LOG A,t ) B(LOG B,t+1 ) Node B s Append-Only Log ACK m, B(LOG B,t+1 ), B(LOG B,t ) Node B 28

Are PVPs Trustworthy? We do not have to explicitly trust the PVP. Because nodes keep a local log, they have proof to defend themselves with against a faulty PVP. If the PVP claims that a node sent an unauthenticated message, the node cannot defend itself. At this point, an administrator will need to resolve the conflict. We now know that either the PVP or the node is faulty! In the presence of faulty PVPs, our security guarantees gracefully degrade to those of [ZFN+11]. 29

Future Work Message Loss. PVPs can recover by identifying retransmissions and polling the switch for flow statistics (This is an OpenFlow feature). Timing Side Channels. Incorporating timing information into our commitment protocol may permit Alice to later test for side channels. Automated Forensics. We believe that a policy-driven approach to network provenance would obviate the need for instrumenting applications to follow the message commitment protocol. 30

Conclusion We have shown that SDN can be used as a trust anchor to overcome limitations on previous network forensic systems. Using SDN, we have shown for the first time that reliable detection of covert communication between compromised hosts is possible. There are a variety of exciting opportunities and challenges in this area. We look forward to exploring them in future work. 31

Thank you Any Questions?! Adam Bates amb@cs.uoregon.edu 32

Performance Cost is the same as [ZFN+2011] Network Overhead: Low as 0.2% (Hadoop MapReduce), high as 16.1% (Quagga BGP). Computation: Quagga trials used 0.9% of one core without SNP, and just 5.4% of one core with SNP. 365 Bytes Per Message. PVP Provisioning (Back-of-Napkin Estimates): Can maintain all state within memory by hash chaining individual message authenticators. 33

Why SDN? Many parts of our system could be implemented through alternate means, so why is SDN necessary? Quickly isolate faulty nodes and redirect them to honeypots, ensuring that the protocol is followed. In Future Work, recovering from PVP failure will introduce dynamic routing challenges. In Future Work, recovering from message loss will require accurate and fine-grained flow-level statistics. 34