From Muddle to Model: Modeling and Simulation of Cyber Phenomena

5 downloads 9177 Views 2MB Size Report
Schneider, F. B., “Blueprint for a Science of Cybersecurity,” The Next Wave, Vol. 19, No.2, 2012 .... Trust, Straightforwardness, Altruism, Compliance,. Modesty ...
UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

From Muddle to Model: Modeling and Simulation of Cyber Phenomena Alexander Kott US Army Research Laboratory February 2016 1 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Characteristic Problems in Cyber Science and Engineering

The science and engineering of (cyber)security is a study and optimization of relations between policy, attacker, and defender Policy P: a set of assertions about what event should and should not happen. To simplify, focus on incidents I: events that should not happen. Defender D: a model / description of defender’s defensive tools and techniques Td, and operational assets, networks and systems Nd Attacker A: a model / description of attacker’s tools and techniques Ta 2 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Characteristic Problems and Models of Cyber

Then, we seek models of relations between I, Td, Nd, Ta:

(I, Td, Nd, Ta) = 0 Note: The above does not mean I expect to see a fundamental equation of this form. It is merely a shorthand for models that relate I, Td, Nd, Ta Similar perspective in: • Schneider, F. B., “Blueprint for a Science of Cybersecurity,” The Next Wave, Vol. 19, No.2, 2012 • Bau, J., and Mitchell, J.C., “Security Modeling and Analysis ,” Security & Privacy, IEEE, MayJune 2011

3 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Intrusion Detection

Nd, Ta, I → Td Synthesis & characterization of tools & techniques for incident detection & prevention Including •

Synthesis of IDS & IPS



Techniques of intrusion analysis & defense

4 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Cyber Maneuver

• If Td = {STd, BTd(t)}, where BTd(t) is defender’s behavior & actions, •

Then Nd, Ta, I → BTd(t) is the problem of synthesis & control of defenders course of action

• Including • Network operations • Damage control • Cyber maneuver • Moving target defense 5 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Vulnerability & Risk Assessment



I, Td, Ta → Nd Synthesis, design & assessments of networks



Including • Design of “trusted” architectures & systems • Continuous monitoring, risk scoring, certification, etc.

6 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Attack Prediction



Td, Nd, Ta → I Anticipation of incidents (their nature, timing, etc.)



Including • Assessment of risks • Compromise probability • Propagation & extent of damage

7 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Threat Analysis



I, Td, Nd, → Ta Anticipation or reverse engineering of attacker’s tools & techniques



Including • Threat analysis • Malware analysis • Reverse engineering • Fuzzing, etc.

8 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Cyber Wargaming



Td(t), Nd → Ta(t) Adversarial analysis, wargaming, anticipation of threat actions



Including • Course of action development • Effect estimation • Threat analysis

9 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Summary of the Cyber Problems/Models Landscape

Td, Ta, I → Nd – synthesis & assessments of networks • Td, Ta, I → SNd(t) – synthesis & characterization of •

network’s structure Td, Ta, I → BNd(t) – synthesis or anticipation of network behavior

Td, Nd, Ta → I – anticipation of incidents Nd, Ta, I → Td – synthesis of detection & prevention tools • •

& techniques Nd, Ta, I → BTd(t) – synthesis & control of defender’s course of action Nd, Ta, I → STd(t) – synthesis of defensive tools, algorithms

Td, Nd, I → Ta – anticipation of attacker’s tools & techniques • Td, Nd, I → BTa(t) – adversarial analysis, wargaming, anticipation of threat actions 10 UNCLASSIFIED UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Laboratory for Land Forces \\ APPROVEDPremier FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Human User Vulnerability to Cyber Attacks: Effect of Psychological and Cognitive Aspects

J.H. Cho, H. Cam, and A. Oltramari, “Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis,” accepted to IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA’2016), 21-25 March 2016, San Diego, USA 11 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Personality Traits vs. Phishing Susceptibility

Motivation: Empirical experiments have shown that an individual’s personality traits affect phishing vulnerability Research Question: Can we predict an individual’s phishing susceptibility, given his/her personality traits?

Goal: Develop a mathematical model to predict an individual’s phishing susceptibility in terms of perceived trust and risk and decision performance Contributions • Investigated the correlations between phishing susceptibility and personality traits • Developed a mathematical model using Stochastic Petri Nets to predict an individual’s vulnerability and resilience to phishing attacks • Demonstrated experimental results on the effect of an individual’s personality traits on perceived trust and risk and decision performance to phishing attacks 12 Cho, Oltramari (CMU), Cam (NSD/ARL) – accepted to CogSIMA16 The Nation’s Premier Laboratory for Land Forces UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Big Five Personality Traits

Are there any relationships between personality traits and phishing susceptibility? Openness

Fantasy, Aesthetics, Feelings, Actions, Ideas, Values

Conscientiousness

Competence, Order, Dutifulness, Achievement Striving, Self-Discipline, Deliberation

Extroversion

Warmth, Gregariousness, Assertiveness, Activity, Excitement Seeking, Positive Emotion

Agreeableness

Trust, Straightforwardness, Altruism, Compliance, Modesty, Tender-mindedness

Neuroticism

Anxiety, Hostility, Depression, Self-Consciousness, Impulsiveness, Vulnerability to Stress

Source: http://psytreasure.com/the-big-5-theory-of-personality-the-o-c-e-a-n-of-human-behavior/# 13 Cho, Oltramari (CMU), Cam (NSD/ARL) – accepted to CogSIMA16 The Nation’s Premier Laboratory for Land Forces UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Personality Traits vs. Phishing Susceptibility

Humans’ trust and risk assessments are subjective in nature as they depend on personality traits (Loewenstein et al., 2001; Chauvin et al., 2007; Ulleberg et al., 2003; Tupes et al., 1992) • Openness: lower perceived risk • Neuroticism: higher perceived risk • Agreeableness: lower perceived risk; more trust

Cho, Oltramari (CMU), Cam (NSD/ARL) – accepted to CogSIMA16

14 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Personality Traits vs. Phishing Susceptibility Trust, Risk, and Accuracy for C vs. N under Low O & C

• N increases perceived risk while decreasing perceived trust • However, high C can overcome the disadvantage of high N Cho, Oltramari (CMU), Cam (NSD/ARL) – accepted to CogSIMA16 15 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Detection of Malicious Activities: Simulation of Learning and Decisions by a Cyber Analyst

Ben-Asher, N., Oltramari, A, Erbacher, R.F., and Gonzalez, C. (2015). Ontology-based Adaptive Systems of Cyber Defense. The 10th International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS). Fairfax, VA, USA

16 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Cognitive Modeling and Simulation in Cyber Security

Goal : – Understand the decision making processes of cyber defenders and attackers and predict their decisions Benefits: – Improve training of cyber defenders, develop cognitive-driven decision support tools – Long-term, automate tasks performed by defenders (and attackers?) Methodology: – Cognitive models providing a computational framework for capturing core elements of humans’ decision making processes and learning from experience in dynamic environments

17 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Modeling Detection of Adversarial Reconnaissance

Understand and model the critical components for port scanning detection The defender model includes – Instance-Based Learning model that captures decision making and learning from experience in dynamic environments – Develop and use a Packet-Centric ontology to represent the defender’s information representation

Human holistic cycle

18 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Modeled decision making process

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Simulation Experiment

2 cognitive agents (defenders) with the same cognitive mechanisms that differed only in their situation awareness (i.e., availability of information) – Experience Only agent assess one event at a time – Information and Experience agent observes the temporal properties of a sequence of packets by querying the packetcentric ontology

An attacker executes a vertical port scanning using nmap in a network with 16 nodes (i.e., unique IP addresses) The agent’s rewards were based on a payoff matrix:

19 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Scan Detection Results Correct detection of scanning sequence - the proportion of conversations between two IPs that were correctly classified as scans. Answering the question “Does IP X scans IP Y?”

Information and Experience

• Hits – Both Experience Only and Information and Experience agents detected that the malicious IP (192.168.1.8) • False Alarms – The Experience Only agent detected additional 10% of the IPs as malicious

20 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Experience Only

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Extracted Decision Rules

What the agent learned? – By looking at the instances in the agent’s memory and their activation, we can deduce the classification rules each model formed Experience Only agent: – Any TCP SYN packet is a scan packet Information and Experience agent: – A TCP packet that is part of a sequence of packets in which: • The packets come from a source that uses a small number of ports • The packets are directed to a large number of destination ports • The ratio between SYN packets and other packets is close to 1 • The common response of the destination to packets coming from this source is an ACK-SYN packet (ratio between ACK-SYN packet and other packets ~ 1) 21 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Situational Awareness in Tactical Ground Battle: Simulation of Cyber Effects for Training

H. Marshall et al., Cyber Operations Battlefield Web Services (COBWebS); Concept for a Tactical Cyber Warfare Effect Training Prototype, Fall SIW 2015, Orlando, FL, 2015 Best Paper Award

22 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Prototype Design

COBWebS Cyber Operations Battlefield Web Service

Definition cob-web 1 a : the network spread by a spider b : tangles of the silken threads of a spiderweb usually covered with accumulated dirt and dust 2 : something that entangles, obscures, or confuses

"Cobweb." Merriam-Webster.com. Merriam-Webster, n.d. Web. 27 May 2014. .

23 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

23 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Design Overview

FBCB2

AFATDS

DCGS-A

GAP CRITERIA CHECKLIST  Remote mission command of multiple cyber offensive and defensive platforms  Modeling and execution of offensive and defensive cyber activities providing force multiplier effects  Virtualization of offensive/threat and defensive networks Command Web cyber Testtools Driver Interface  Offensive and defensive developed as software services available in secure cloud environments

AMDWS

Tactical Network (JVMF, TADILJ, USMTF, FDL, etc.)

Mission Command Adapter Web Service Configs

Toolss

Messages

The Computer Network Attack Service provides the capability for “Spyders” to get into the Information Interception COBWebS and attack inbound and outbound data to and from the mission command devices. The Information Delay types of attack capabilities are: • Directed Denial of Service • Information Delay • Information Forgery • Information Interception Information Forgery Location:

Clientc

Latitude: 38.441212

Longitude: -78.088818

Radius (km): 8

Draw From Map

URN Code

Launch II Attack

COBWebS

Messagec

Originator: 1511089

Clients

Select From Map

Intercepted Information:

Recipient: 1511090

Select From Map

Duration(s): 15

Simple Object Access Protocol (SOAP)

CNAs

Launch ID Attack

URN Code

Messages

Clientc

Originator: 1511089

Select From Map

Select From Map of Service Distributed Denial

Recipient: 1511090 Free Text Message:

Configc

Toolsc

Messagec

Clients

Simulation Client

Location:

URN Code

Originator: 1511089

Select From Map

Recipient: 1511090

Select From Map

Offest:

Latitude: 38.441212

100m

Longitude: -78.088818

120m

Launch DDOS Attack

Launch IF Attack

Simulation Network (DIS, HLA, etc.)

LEGEND c s

24 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Note : URNs are Fictional Web service – client side Web service – server side

24 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

COBWebS Capabilities •

Provide the ability for trainer to incorporate cyber warfare elements into their exercises to meet training objectives • Train the trainees to recognize symptoms of cyber attacks • Develop contingencies, based on what has been compromised • Develop workarounds • Alternative Courses of Action (COAs) • Help develop cyber doctrine based on detecting, responding, and recovery to a cyber attack.



Provides an Information Assurance (IA) safe environment without corrupting the network infrastructure • Typical in cyber range exercises • Can be integrated with cyber test ranges



Software solution only – no special hardware required

25 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

25 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Potential Use Case Examples

Change all Opposing Force (OPFOR) (observation reports) to Blue Force (BLUFOR) (position reports) 1. Intercept all entity position reports and observation reports (via II) 2. Deny original position reports from sender (via DoS) 3. Use the location information to generate observation reports (via IF) 4. Deny original observation reports from sender (via DoS) 5. Use the observed location information to generate position reports (via IF) Postponement of critical information 1. Intercept to identify target units (via II) 2. Delay observation reports on receiving target (via ID)

26 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

26 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Potential Use Case Examples (cont’d)

Man-in-the-middle attack 1. Discovery, searching, probing for vulnerabilities (via II) 2. Denial of Service on sender (via DoS) 3. Send fake message to specified receiver on original sender’s behalf (via IF)

Use IF to send Nuclear/Biological/Chemical (NBC) report to move to Mission Oriented Protective Posture (MOPP) level 4 1. Discovery, searching, probing for vulnerabilities (via II) 2. Send fake NBC report (via IF)

27 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

27 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Potential Use Case Examples (cont’d) Using COBWebS’s II, DoS, ID, and IF capabilities to deceive and disrupt BLUFOR’s SA as reflected on their Mission Command (MC) systems

BLUFOR killed

Observation Reports (ObsRpts) sent by BLUFOR were denied thus not reflected

Forged BLUFOR locations

X X X X X

Ground Truth simulated by Constructive Simulation

Perceived Truth as seen on MC systems as a result of cyber attacks Note : Units and graphics are fictional

28 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

28 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Cyber Expertise

Development of a Distributed Cyber Operations Modeling and Simulation Framework

Development of a Cyber Warfare Training Prototype for Current Simulations

Won SIWzie Award at 2012 Fall SIW!

Cyber Operations Battlefield Web Services (COBWebS); Concept for a Tactical Cyber Warfare Training Prototype

Won Outstanding paper Award at 2014 & 2015 Fall SIW!

SIW = Simulation Interoperability Workshop 29 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

29 The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Tactical Communication Network: Effects of Cyber Maneuvers, Mission and Environment on the Survival of Network

Marvel, L. M., Brown, S., Neamtiu, I., Harang, R., Harman, D., & Henz, B. (2015, October). A framework to evaluate cyber agility. In Military Communications Conference, MILCOM 2015-2015 IEEE (pp. 31-36). IEEE.

30 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Goal

Develop a framework to help evaluate the cost and utility of cyber agility maneuvers within networks that have constrained resources such as bandwidth and energy (e.g., MANETs). – Introduce notional measures of health, security and capability and their interrelationship – Consider mission goals (e.g., maximizing capability while securing a critical path), operating conditions, cost and maneuver selection to construct evaluation metrics

31 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Framework Preliminaries Node States and Notional Measures for Potential Agility Maneuvers

Patched

32 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Consider the Mission … Primary Mission Goal Secure a critical communication path through a network for some time duration to transfer vital information.

Secondary Mission Goal The secondary goal is to secure the entire network in minimal time while maximizing capability of network nodes and minimizing energy consumption. While we are securing this critical path/network, we have the option of selecting agility maneuvers that will maximize the capability of nodes on critical path while minimizing energy consumption expended to perform the maneuvers in a resource constrained environment.

33 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Applying Framework We consider two operating scenarios: Scenario 1: In the presence of a known vulnerability for which a patch is present within the network

Scenario 2: In the presence of a detected infection that propagates through the network exploiting a known vulnerability for which a patch exists and is present within the network

34 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Scenario 2: Health There are 505 possible maneuver sequence selection in the set; P(infection) = 0.8 for each communication exchange with the infected node.

Best Health Heatmap (Scenario 2: Infection)

Comparison of all maneuver sequences: Satisfying first primary then secondary mission goals 35 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Scenario 2: Capability

Best Capability Heatmap (Scenario 2: Infection)

Comparison of all maneuver sequences: Satisfying first primary then secondary mission goals and prioritizing capability

36 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Scenario 2: Security

Best Security Heatmap (Scenario 2: Infection)

Comparison of all maneuver sequences: Satisfying first primary then secondary mission goals and prioritizing security

37 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Conclusions/Future Work

Evaluation framework that can provide metric comparisons for future agility maneuver and operating scenarios Simulations can help to calculate costs in a dynamic network environment where terrain, communication links, communication volume, energy constraints and routing protocols can be varied Future: Consider multiple vulnerability and infections of varying the severity Vary propagation rates Competing mission goals Add node mobility scenarios Replacement of the notional measure of health, security and capability with quantifiable metrics

38 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Simulated Network and Real Applications: Simulation of Stealthy Software Migration and its Detection

http://www.appcomsci.com/research/tools/cybervan

39 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

CyberVAN Concept: Run Real Applications over a Simulated Network The network is represented in a Discrete Event Simulator (DES) such as ns3, OPNET, QualNet, or ns-2 • • •

Applications run on virtual machines (VMs) in their native environments Each VM is mapped to a node in the simulated network Applications on VMs communicate with each other over the simulated network VIRTUAL MACHINE

VIRTUAL MACHINE

APPLICATIONS

VIRTUAL MACHINE

APPLICATIONS

APPLICATIONS

Simulated node

SIMULATED Simulated node NETWORK

Simulated node

Simulated node

Simulated node

VIRTUAL MACHINE APPLICATIONS

Simulated node Simulated node

VIRTUAL MACHINE APPLICATIONS

VIRTUAL MACHINE VIRTUAL MACHINE APPLICATIONS

CYBERVAN TESTBED

APPLICATIONS

40 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Why use a simulated network?

Several existing testbeds provide large-scale, real-time, wired network emulation for cyber experimentation, e.g., DETER – These testbeds make use of wired networks emulating large-scale cyber environments

Drawback: No ability to model wireless networking environments with any level of fidelity In contrast, a simulated network provides: – Very high fidelity reproduction of network effects like propagation, interference, loss – Node mobility – High fidelity simulation of MAC layer and network layer protocols – Ability to leverage existing simulation models of wireless networks, e.g., JTN models of JTRS waveforms

The use of a simulated network in a cyber testbed enables high fidelity representation of tactical networks – a critical need for the Army 41 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

CyberVAN Key Innovations

Transparent Packet Forwarding – Send network traffic generated by real applications over a simulated network in a manner transparent to the applications • Currently, simulators like OPNET and QualNet provide custom solutions for this, requiring use of OPNET/QualNet-specific APIs to enable such a capability; CyberVAN capability is generic and independent of simulator type

TimeSync: Network Scalability – Developed capability to synchronize time across the simulated network and applications running outside of the simulation to enable very large scale experiments • Can run experiments slower or faster than real time

42 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Problem Statement

Motivation: – Migrating VMs from one physical machine to another is a frequently performed operation in data centers, for many reasons such as moving target defense, load balancing, hardware upgrades, performance optimization, etc. – Virtually all attacks on live VM migration over a network require that the attacker be able to detect that a VM migration is in progress

Problem addressed: Secure VM migration against traffic analysis attacks – High-level approach: Develop several camouflaging techniques to make a VM migration flow indistinguishable from normal traffic, by changing its distinct traffic pattern and statistical characteristics

43 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

VM migration is typically easily detectable

Traffic analysis can: – – – –

Detect >90% of VM migrations on the network Determine migration duration Determine migration endpoints Calculate migration transmission rate and migrated memory

• Encryption and tunneling do not prevent traffic analysis from detecting VM migrations with high accuracy

44 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Solution: Stealthy Migration System

Shape network traffic using dynamic hierarchy token bucket Introduce chaffing traffic that balances migration and chaffing traffic Dynamically vary migration rate in a pseudo-random way within normal statistical traffic bounds to camouflage migration traffic

45 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Experimentation Approach

Use CyberVAN scenario to run high fidelity experiments: – – – –

Run baseline scenario without evasive maneuvers Run scenario with evasive maneuver and traffic conditioning Experiment with libvirt-based migration and native migration Experiment with different network speeds & latencies, different background traffic – Collect and analyze data at attacker and migration destination – Determine whether attacker can detect VM migration

Use of TimeSync: – Needed to simulate large volumes of traffic with very high fidelity, resulting in DES running slower than real time RESULTS: Stealth System makes VM migration undetectable

46 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Enterprise-Wide Model Effect of Cyber Attacks on Enterprise Control

S. Noel, J. Ludwig, P. Jain, D. Johnson, R. Thomas, J. McFarland, B. King, S. Webster and B. Tello, "Analyzing Mission Impacts of Cyber Actions," in Proceedings of the NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact, Istanbul, 2015. 47 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Example 1: Model-Driven Mission Impact Assessment

Analyzing Mission Impacts of Cyber Actions (AMICA) Mission is Joint Targeting Process MITRE, MIT-LL, IDA, CMU SEI Questions it can answer: • How long of an attack can the mission withstand without impact? • How long does it take the mission to recover from an attack? • What is more damaging to the mission; loss reach back availability or degradation of Air & Space Operations Center (AOC) system assets? • How many targets can be impacted by confidentiality/integrity before impacting mission?

48 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

AMICA Connects Kinetic Mission to Cyber Actions

Outputs Inputs

Mission Scenario

Mission Metrics

Visualization

Cyber Scenario Attacker Cap’s

Defender Cap’s

49 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Events Logs Adapted by permission from the paper by S. Noel et. al., “Analyzing Mission Impacts of Cyber Actions,” presented at the NATO IST-128 Workshop on Assessment of Mission Impact, Istanbul, Turkey, June 15-17 2015

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Extensible M&S Libraries to Quickly Create the Needed Analysis Environment

Library of Mission Models Library of Infrastructure Models (Covering multiple missions) (Targeting, BMD, etc)

Developing parameterized libraries of models Each piece of AMICA is designed to be modular and extensible to support future mission areas, cyber dependencies, attack patterns, defenses Well defined interfaces 50 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Library of Defender Models (workflows)

Malicious Malicious Malicious Malicious

Library of Attacker Models (attack graphs)

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Mission Model

Process model capturing workflow, timing, and resources for the DoD kinetic targeting process (from CJCSI 3370.01) Originally developed for EUCOM as part of Austere Challenge 10 & selected due to pedigree and maturity – 200+ steps with timing & resources (dependent on target complexity) – Covers targeting process from basic targeting development through MAAP/ATO & BDA Modified for AMICA by breaking into modules and connecting to CyCS nodes

51 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Attacker Model

Modeled as process simulation that captures the steps the attacker follows

getTargets()

No

Between(15,45)m

getTargets() Gate By Time:AttackTime Hours

– Assumes attacker has some knowledge of mission and access on secure network – Responsive to defense actions – Adjust sophistication through probability of success/detection on attack steps

Between(1,3)d Get Spear Phishing Targets

No

getNextTarget()

Targets Available ?

Targets Available ?

No

Between(30,90)m

getNextTarget()

Yes

Yes Infect Target

Goal Node Reachable ?

Target Infected ?

launchAttack()

No

Yes

Choose & Infect Target

launchAttack()

Yes

Compromise Goal Node

No

launchAttack()

Goal Node Compromised ?

Yes

0m launchAttack() Gate By Time:2 Hours ConfidentialityAttack

isInfected()

Goal Node Still Compromised ?

Yes

Perform Attack 0m launchAttack()

Attack Type ?

IntegrityAttack Perform Attack 0m

0m

launchAttack()

AvailabilityAttack

Initial Foothold

Lateral Movement

- Initial access via spear phishing campaign

- Scan network for goal node (e.g. database) reachability

- Includes time for research to find targets

- Infect laterally until target node is reachable

52 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

No

isReachable()

Wait for desired time to affect Mission

– Cyber:14 study (ARCYBER, defense of Dept. of Defense Information Network (DODIN)) – Contains 1000s of nodes (mainly system-steps) of integrated attacker and defender/sensor actions for server-, host-, and email-based attacks

Target Infected ?

Between(30,90)m

No

Conceptually follows ‘Cyber:14’ threat models

Yes Between(30,90)m

Perform Network Scan

Perform Attack

Perform Attack

CyCS-createTicket() No 0m CyCS() - check status

Gate By Time:30 Minutes Mission Still affected ?

Affect Mission

Yes

Attack Successfull ?

Periodically check for detection Yes Create Alert

Achieve Goal - Realize an effect on confidentiality, integrity, or availability on goal node - Maintain presence and re-infect as necessary

The Nation’s Premier Laboratory for Land Forces

No

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Defender Model

Process simulation of reactive defender (not proactive) actions Multi-tiered incident response model – Defender can impact mission (by alerts, taking down machines) – Includes defender resource/personnel constraints Conceptually follows ‘Cyber:14’ defense models

restoreHost()

Create Alert

malwareDetected()

Between(1,3)h AvailabilityAlert

Restore Functionality

Malicious Activity Discovered ?

Yes Submit Alert

CyCS-deleteTicket() No getNextAlert()

Get Next Alert

Alert Type ?

takeHostOffline()

wipeHost()

5m

Between(1,3)h

5m

Take offline

Wipe and Restore

Put online

WipeAlert

CyCS-deleteTicket() CyCS-createTicket()

Submit Alert InfectedAlert IntegrityAlert ConfidentialityAlert getInfectionSource()

ForensicAlert

None

putHostOnline()

CyCS-deleteTicket()

Create Alert

submitAlert()

getAllInfected()

Between(1,3)h

0m

Between(2,6)h

Between(3,9)h

Trace Attack Source

Issue New Alert

Get Signature

Find other infections

No 0m Targets Available ?

Yes

Issue New Alerts

Release Resource

No alert present

Create Alert getWait()

submitAlert()

Wait to Issue Alert

Issue Alert

Start Defender

Reboot, Restore, Rebuild

Triage - Defender response triggered by IT alert - IT alerts prioritized by expected impact

- Mitigation based on alert type (crash, infection, corruption) - More aggressive responses may impose greater mission impact

53 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Forensics - For more serious threats - Trace attack to source, build signatures - Submit new alerts for all compromised machines

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Enterprise-level Simulation of Cyber-physical impacts: Automated Learning of Enterprise Model

M. Lange, R. Moeller, G. Lang and F. Kuhr, "Event Prioritization and Correlation based on Pattern Mining Techniques," in 14th International Conference on Machine Learning and Applications, Miami, 2015.

54 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

PANOPTESEC

PANOPTESEC project -- the Seventh Framework Programme for Research (FP7) of the European Commission, 2013-2016 PANOPTESEC integrates and normalizes heterogeneous events, correlates them with the infrastructure, evaluates their operational impact, and calculates the risk an event poses to the monitored infrastructure PANOPTESEC consortium set up a testbed - authentic replication of an Italian water and energy distribution company’s corporate enterprise systems and supervisory control and data acquisition (SCADA) system

55 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

56 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Challenge of Manual Model Construction

Manual modeling of dependencies – capturing the network's intended workflow and links to physical assets – is prohibitively expensive in complex enterprises We focus on development of an automated approach: • Use network traffic; • Automatically learn network dependencies; • Deduce higher-level information about a network's mission based on network services and applications

57 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

An example for a high level view of an automatically derived mission models. Swim lanes represent sub networks, network devices are represented by tasks and a human silhouette marks client network devices

58 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Advantage in Large-Scale Cyber Warfare as a Function of Strategy and Network Properties

J.H. Cho and J. Gao, “Cyber War Game in Temporal Networks,” accepted to PLOS ONE, 2016

59 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Cyber War Strategies in Temporal Networks

Current State-of-the-Art •



Cyber war strategies often require resource efficiency solution under highly distributed, resource constrained networks Little prior work investigates heuristic cyber strategies studying the impact of network characteristics on performance

Goal:

Identify near-optimal strategies by attackers or defenders to minimize resource consumption and maximize a win probability; the problem is formulated as:

Node i’s resource level is defined as:

where resource consumption by taking an action is:

Cho (ARL), Gao(NEU, NS CTA) – accepted to PLOS ONE Journal 60 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Optimality Analysis of Cyber Strategies BFA: Brute-Force Attack with solution search in O (N 2N) RF-A: Resource First – Attack with solution search in O(N2) IF-A: Influence First – Attack with solution search in O(N3) Influence is measured based on k-hop reachability as:

Heuristic cyber strategies perform close to optimal solution(s) with significantly less complexity; under a sparse network, influence-first-attack strategy outperforms resource-first counterpart.

Cho (ARL), Gao(NEU, NS CTA) – accepted to PLOS ONE Journal 61 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Performance Analysis: Win Probability & Resource Consumption

Current State-of-the-Art •

Little existing work considers network temporality and density that may affect optimal cyber war strategies by attackers or defenders Network density reduces win probability in a highly temporal network

Network temporality differently affect the performance of cyber strategies under different network density; overall influence-first is preferred in terms of winning and resource consumption; Influence-first attack incurs less resource consumption in a dense network; there exists a critical node degree maximizing resource consumption

Cho (ARL), Gao(NEU, NS CTA) – accepted to PLOS ONE Journal 62 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

Performance Analysis: System Vulnerability

System vulnerability is highly sensitive to network temporality and density. • Less system failure occurs under a sparse network; • High temporality introduces high system vulnerability or system failure in an earlier time than under low temporality

Cho (ARL), Gao(NEU, NS CTA) – accepted to PLOS ONE Journal 63 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

REFERENCES Schneider, F. B., “Blueprint for a Science of Cybersecurity,” The Next Wave, Vol. 19, No.2, 2012 Bau, J., and Mitchell, J.C., “Security Modeling and Analysis ,” Security & Privacy, IEEE, May-June 2011 J.H. Cho, H. Cam, and A. Oltramari, “Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis,” accepted to IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA’2016), 21-25 March 2016, San Diego, USA Ben-Asher, N., Oltramari, A, Erbacher, R.F., and Gonzalez, C. (2015). Ontology-based Adaptive Systems of Cyber Defense. The 10th International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS). Fairfax, VA, USA H. Marshall et al., Cyber Operations Battlefield Web Services (COBWebS); Concept for a Tactical Cyber Warfare Effect Training Prototype, Fall SIW 2015, Orlando, FL, 2015 Marvel, L. M., Brown, S., Neamtiu, I., Harang, R., Harman, D., & Henz, B. (2015, October). A framework to evaluate cyber agility. In Military Communications Conference, MILCOM 2015-2015 IEEE (pp. 31-36). IEEE. Chadha, Ritu, et al. "CyberVAN: A Cyber Security Virtual Assured Network Testbed." Military Communications Conference, MILCOM 2016-2016 IEEE. IEEE, 2016. S. Noel, J. Ludwig, P. Jain, D. Johnson, R. Thomas, J. McFarland, B. King, S. Webster and B. Tello, "Analyzing Mission Impacts of Cyber Actions," in Proceedings of the NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact, Istanbul, 2015. 64 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

REFERENCES M. Lange, R. Moeller, G. Lang and F. Kuhr, "Event Prioritization and Correlation based on Pattern Mining Techniques," in 14th International Conference on Machine Learning and Applications, Miami, 2015.

J.H. Cho and J. Gao, “Cyber War Game in Temporal Networks,” accepted to PLOS ONE, 2016 Ganin, A. A., Massaro, E., Gutfraind, A., Steen, N., Keisler, J. M., Kott, A., ... & Linkov, I. (2016). Operational resilience: concepts, design and analysis. Scientific reports, 6. Kott, Alexander, David S. Alberts, and Cliff Wang. "Will Cybersecurity Dictate the Outcome of Future Wars?." Computer 48.12 (2015): 98-101.

Kott, Alexander. "Towards fundamental science of cyber security." Network Science and Cybersecurity. Springer New York, 2014. 1-13. arXiv:1512.00407 Kott, Alexander, Nikolai Stoianov, Nazife Baykal, Alfred Moller, Reginald Sawilla, Pram Jain, Mona Lange, and Cristian Vidu. "Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop." arXiv preprint arXiv:1601.00912 (2016). Gil, Santiago, Alexander Kott, and Albert-László Barabási. "A genetic epidemiology approach to cyber-security." Scientific reports 4 (2014).

65 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

REFERENCES

Kott, Alexander, and Gary Citrenbaum, eds. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer Science & Business Media, 2010.

66 UNCLASSIFIED / APPROVED FOR PUBLIC RELEASE

The Nation’s Premier Laboratory for Land Forces

Suggest Documents