A Quantitative Approach to Security Monitor Deployment



Similar documents
An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Challenges in Cyber Security Experiments: Our Experience

Security Event Management. February 7, 2007 (Revision 5)

OCS Virtual image. User guide. Version: Viking Edition

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Software Pricing. Operating System

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Federated Threat Data Sharing with the Collective Intelligence Framework (CIF)

Network Security Monitoring

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

System Specification. Author: CMU Team

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

PHD Virtual Backup for Hyper-V

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Flexible Web Visualization for Alert-Based Network Security Analytics

Stratusphere Solutions

The Bomgar Appliance in the Network

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Hosting as a Service (HaaS) Playbook. Version 0.92

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

A Review on Network Intrusion Detection System Using Open Source Snort

Implementing a secure high visited web site by using of Open Source softwares. S.Dawood Sajjadi Maryam Tanha. University Putra Malaysia (UPM)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Network Security Monitoring

Parallels Plesk Automation

Tips for getting started! with! Virtual Data Center!

Cloud Panel Service Evaluation Scenarios

Barracuda Message Archiver Vx Deployment. Whitepaper

CTS2134 Introduction to Networking. Module Network Security

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center

Uptime Infrastructure Monitor. Installation Guide

Install Guide for JunosV Wireless LAN Controller

Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Uila Management and Analytics System Installation and Administration Guide

MSP End User. Version 3.0. Technical Solution Guide

INUVIKA OVD INSTALLING INUVIKA OVD ON UBUNTU (TRUSTY TAHR)

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]

Enterprise Network Deployment, 10,000 25,000 Users

COUNTERSNIPE

Product Version 1.0 Document Version 1.0-B

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support.

VX 9000E WiNG Express Manager INSTALLATION GUIDE

Building a Private Cloud Cloud Infrastructure Using Opensource

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

IDS / IPS. James E. Thiel S.W.A.T.

Network Security Management

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Scalability in Log Management

How to Backup and Restore a VM using Veeam

Hosted SharePoint: Questions every provider should answer

Beyond Web Application Log Analysis using Apache TM Hadoop. A Whitepaper by Orzota, Inc.

Intrusion Detection Systems (IDS)

Automating Big Data Benchmarking for Different Architectures with ALOJA

Deployment - post Xserve

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

FileCruiser Backup & Restoring Guide

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

VMware vsphere 5.1 Advanced Administration

Case Study 2 SPR500 Fall 2009

Installation Manual for Grid Monitoring Tool

Network Instruments white paper

Assignment # 1 (Cloud Computing Security)

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Network Monitoring Comparison

Uila SaaS Installation Guide

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop

McAfee Product Entitlement Definitions

CSC BizCloud VPE Service Offering Summary. CSC i

PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Analyzing Full-Duplex Networks

XenClient Enterprise Synchronizer Installation Guide

Network Security Demonstration - Snort based IDS Integration -

Architecture Overview

How To Protect A Network From Attack From A Hacker (Hbss)

FortiAnalyzer VM (VMware) Install Guide

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Transcription:

A Quantitative Approach to Security Monitor Deployment Uttam Thakore PI: William H. Sanders

Problem Intrusion detection requires adequate monitoring Monitors must collect sufficient information about intrusions Should support intrusion detection even when monitors are taken out Current approaches to monitor deployment do not allow for deployment based on intrusion detection goals Tough to compare different deployment approaches

Another problem Monitoring is expensive! Price of monitors NIKSUN NetDetector/NetVCR 2005 DPI, analytics, and alerting appliance Price: $10,000 to $100,000 1 Data storage costs Large enterprises can generate hundreds of GBs of logs per day Cost of data analysis and response Average salary of a network security administrator: $65,000 2 Salary of a computer forensic analyst: upwards of $80,000 3 1 Jerry Shenk, NetDetector/NetVCR 2005 Traffic Analyzer, SANS Institute, Whitepaper, Aug. 2007. 2 Salary: Network Security Administrator, Glassdoor. [Online]. Available: http://www.glassdoor.com/salaries/network-security-administrator-salary- SRCH_KO0,30.htm. 3 Salary: Computer Forensic Analyst, Glassdoor. [Online]. Available: http://www.glassdoor.com/salaries/computer-forensic-analyst-salary-srch_ko0,25.htm.

Our contribution A cost-effective methodology for monitor deployment that meets intrusion detection goals

Our approach Domain expert knowledge Detect intrusions & change model parameters Model System Optimally Deploy Monitors Calculate Monitoring Metrics

Guiding principles Monitors and computing assets can be compromised Monitor compromise can affect ability to detect intrusions Monitors should be deployed with redundancy such that the effect of compromise is mitigated

Simplifying assumptions Monitors are independent Monitors and assets are not currently compromised, but could be compromised in the future Monitor costs are independent and additive I.e., cost of deploying n monitors = Σ cost of deploying each monitor Intrusion detection is ideal

Outline Domain expert knowledge Model System Optimally Deploy Monitors Calculate Monitoring Metrics

Model: System model Assets: computing components in the system to protect E.g., host machines, servers, virtual machines, applications, network hardware Monitors: sensors that can be deployed in the system to provide information about intrusions E.g., Snort, Bro, sshd log, Apache request log, MySQL query log Asset-asset dependence: directed physical dependency between assets, such that correct operation of the second asset relies on correct operation of the first E.g,. hypervisor tenant VMs Monitor-asset dependence: dependence relationship between monitors and assets, where compromise of the asset would result in compromise of the monitor E.g., Apache server process Apache request log

Model: System model illustration Assets Asset-asset dependence Monitors Monitor-asset dependence Ingress Switch Firewall Ingress Switch Internal Switch Firewall Snort Snort iptables SSH Log Web Server Internal Switch Database Server Web Server Database Server sshd Apache PHP MySQL Apache Log Media Wiki MySQL Query Log sshd SSH Log

Model: System model (cont d) Truthfulness of monitors: what proportion of a monitor s output can be trusted Measure of compromisability of monitors or the assets on which they depend Resource costs of assets: monetary cost of dedicating computing resources on an asset to monitoring Resource types: CPU utilization Memory utilization Disk storage Network communication

Model: Data model Indicators: primitives representing semantic information provided by monitors about events in the system Generated by monitors Events: occurrences in the system that are symptomatic of an attack or intrusion or are attacks themselves Events can be detected by observing sets of indicators (similar to an IDS signature) Detectability: an event is detectable if at least one of its indicator sets is observable given the set of deployed monitors

Model: Data model illustration Events Monitors sshd lsof httpd high volume of SSH attempts unexpected connection to outside IP access to admin page suspicious requestor IP Indicators Events can map to multiple sets of indicators Model accounts for coordinated intrusion detection and digital forensics

Model: Terminology V = set of assets M = set of deployable monitors E S = set of asset-asset dependence relationships E M = set of monitor-asset dependence relationships

Model: Terminology = set of events Á i that we wish to detect I = set of observable indicators (m) = set of indicators that monitor m can generate (Á) = set of indicator sets that can be used to detect event Á ±(Á, M d ) = 1 iff an event is detectable given the monitors in M d

Outline Domain expert knowledge Model System Optimally Deploy Monitors Calculate Monitoring Metrics

Monitor deployment metrics Goal of metrics: quantify utility and cost of monitors in supporting intrusion detection Three monitor utility metrics: Coverage Redundancy Confidence One cost metric: Monitor cost Developing other metrics for specific analyses

Metrics: Coverage Definition: overall fraction of events of importance that can be detected given a set of monitors Indicators Events Monitors ι ι ι ι ι ι ϕ 2 ϕ 1 Coverage({ϕ₁, ϕ₂, ϕ₃}, {m₂, m₃}) = 67% ι ι ι ϕ 3 Coverage(, M d ) = j{á : ±(Á, M d ) = 1}j j j

Metrics: Redundancy Definition: the number of ways an event can be detected given a set of monitors Indicators ι ι ι Events ϕ 1 Redundancy(ϕ₁, {m₁, m₂}) = 2 Monitors ι ι ι ι ι ι ϕ 2 ϕ 3 Redundancy(ϕ₂, {m₁, m₂}) = 1 Redundancy(ϕ₃, {m₁, m₂}) = 0 Redundancy(Á, M d ) = ¾: ¾2 (Á), ±(¾, M _d) = 1 min 2 ¾ j{m : m 2 M d, 2 (m)}j

Metrics: Confidence Definition: belief in the ability of the monitors to detect events accurately, even when monitors are compromised Indicators Events γ 1 = 0.5 ι ι ι 0.5 0.3 ϕ 1 Confidence(ϕ₁, {m₁, m₂, m₃}) = 0.5 Monitors γ 2 = 0.3 γ 3 = 0.7 ι ι ι ι ι ι 0.3 0.3 ϕ 2 ϕ 3 Confidence(ϕ₂, {m₁, m₂, m₃}) = 0.3 Confidence(ϕ₃, {m₁, m₂, m₃}) = 0.3 Confidence(Á, M d ) = max ¾2 (Á) min 2 ¾ I (, M d )

Metrics: Cost model Each asset has resource costs per unit of use per unit time for each resource type: CPU utilization (e.g., per CPU core per hour) Memory utilization (e.g, per GB per hour) Disk storage (e.g., per TB per hour) Network communication (e.g., per GB) Each monitor has: A long-term average resource consumption rate for each resource type An amortized purchase price and recurring maintenance cost per unit time A monitor-asset relationship that describes where monitor data is stored E.g., remote logging

Metrics: Cost Definition: overall value of the computing resources consumed by monitors that are deployed in the system Purchase: $1 : 20% Monitors : 2 GB :.5 GB :.5 GB/hr data stored remotely Purchase: $0.25 : 50% :.5 GB : 1 GB : 0 data stored locally Purchase: $0 : 40% : 1 GB :.5 GB : 0 Cost(m₁) = $1.86/hr Cost(m₂) = $1.53/hr Cost(m 3 ) = $0.72/hr Asset 1 Asset 2 : $0.15/CPU/hr : $0.05/CPU/hr Cost({m₁, m₂, m₃}) = $4.11/hr : $0.10/GB/hr : $0.15/GB/hr : $0.10/GB : $0.10/GB/hr : $0.05/GB/hr : $0.10/GB Cost(M d ) = m 2 M _d (product sum of resource utilization costs + purchase/maintenance costs)

Outline Domain expert knowledge Model System Optimally Deploy Monitors Calculate Monitoring Metrics

Optimal deployment methodology Goal: to be able to use methodology to answer a variety of monitor deployment questions What is the minimum set of monitors that can detect a given attack/set of attacks? Under cost constraints, what is the best set of monitors to deploy to maximize detection of a set of attacks? Under cost constraints, what set of monitors will maximize my ability to detect a high-priority attack?

Optimal deployment methodology 0-1 integer nonlinear programming problem Monitors are input variables Utility metrics objective functions to maximize Parameterized by userspecified weight parameters w Cost metric cost function to minimize Given: System model, data model 8 Á 2, w RedundancyÁ, w ConfidenceÁ 2 R w Coverage 2 R maxcost 2 R Maximize: Á 2 (w RedundancyÁ Redundancy(Á, M d + w ConfidenceÁ Confidence(Á, M d )) + w Coverage Coverage(, M d ) Subject to: Cost(M d ) maxcost Monitor deployment vector M d 2 {0,1} n

Evaluation Using CAPEC attack taxonomy to define representative attack set on web service architecture Indicators defined per monitor E.g., SSH logs: Invalid username used Authentication failures > threshold Access from unexpected geo-region Defining event-indicator mapping by running attacks individually and observing indicators generated by monitors Demonstrating utility of model for various intrusion detection scenarios

Conclusions We define a monitor deployment model that allows us to: Model monitors and intrusion detection requirements Compute utility and cost metrics for monitors We define a methodology for deploying monitors that allows us to compute optimal monitor deployment under constraints Our optimization problem is very expressive

Ongoing and Future Work Evaluation Metrics that establish the effect of monitor compromise on detection ability on a per-monitor basis Accounting for probabilistic fusion algorithms Dealing with unknown attacks Quantification of dependence of monitors Effect on intrusion detection Completion of the deployment loop Accounting for uncertainty in system state

Backup Slides

Evaluation: Experiment Attacker VM Web service architecture Ingress Switch Internet Firewall Running: Ubuntu 12.04 LTS Server iptables as firewall sshd Monitors: iptables (firewall) logs sshd logs Network tap Snort Monitors: Span port Snort Running: Kali Linux Launching attacks Monitors: Span port Snort Internal Switch Intranet Running: Ubuntu 12.04 LTS Server apache2 sshd Monitors: apache logs Includes php logs sshd logs Network tap Snort Webserver Database Server Running: Ubuntu 14.04 LTS Server mysqld sshd Monitors: mysql logs sshd logs Network tap Snort