Modeling SITAR System Security - CiteSeerX

4 downloads 817 Views 95KB Size Report
proxy servers, acceptance monitors, ballot monitors, audit control module ... Places PA, Pam, Pbm, Pup and Pdown and the transitions m. P_V. P_G. P_A. P_am.
Modeling SITAR System Security Dazhi Wang1 , Bharat B. Madan2 , and Kishor S. Trivedi2 1 Department of Computer Science, Duke University [email protected] 2 Department of Electrical and Computer Engineering, Duke University {bbm, kst}@ee.duke.edu

Proxy Server

I. I NTRODUCTION Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several research efforts are currently afoot to design such systems, such as Enclaves, EMERALDS, ITUA, MAFTIA and SITAR. Before any security mechanism can be accepted to provide protection to a system, it is important to assess its efficacy. Earlier security evaluations were mainly based on a qualitative assessment, such as [1], [2]. This may not be enough to characterize intrusion tolerant systems. Recent studies to security evaluation have begun to take a quantitative approach by using probabilistic and statistical methods as in traditional reliability analysis [6], [3], [5], [4]. In this paper we apply probabilistic modeling to the SITAR system, which is an intrusion tolerant architecture developed jointly by MCNC and Duke University. We start with a continuous-time Markov model that describes the dynamic behavior of multiple intrusion tolerance strategies that exist in SITAR. In order to increase the fidelity of the model to the SITAR architecture, we found it difficult to continue with the hand construction of a CTMC, we motivate and use the stochastic reward net (SRN) model to capture the SITAR system behavior as well as the attacker behavior.

1) Malicious request detection by acceptance monitor Copyright 2003 Chillarege Press

Acceptance Monitor

COTS Servers

P1

B1

A1

S1

P2

B2

A2

S2

Pi

Bi

Ai

Si

request

response

request Audit Control

Fig. 1.

response

Adaptive Reconfiguration

control

SITAR System Architecture

2) Acceptance testing on the responses by acceptance monitor 3) Voting and agreement by ballot monitor 4) Automatic auditing in audit control module and manual monitoring III. T HE BASIC M ODEL System repaired all vul. fixed System repaired vul. exist Vul. found

G

all vul. fixed

V

Compromise not detected by SITAR

UC

Compromise discovered

F

Server repaired vul. exist

Compromise Server detected, Server repaired out of all vul. fixed redundancy repaired Compromise vul. exist detected, out of redundancy Server repaired all vul. fixed

GD

II. SITAR S YSTEM OVERVIEW The SITAR system has the following main subsystems: proxy servers, acceptance monitors, ballot monitors, audit control module, adaptive reconfiguration module (ARM), and the COTS servers. Figure 1 presents a logical view of the SITAR architecture. In SITAR, the detection of an attack and the compromise can be carried out by multiple subsystems as enumerated below:

Ballot Monitor

Fig. 2.

FS

State Transition Model for Threat Level One

Figure 2 and Figure 3 shows the state transition diagram for the SITAR system operating in an environment with varying threat levels. In threat level 1, there is only 1 COTS server while for the threat level 3 there are 3 redundant COTS servers so as to achieve higher security Fast Abstract ISSRE 2003

System repaired all vul. fixed

T_mal

P_vul

T_fix

P_fix

P_G n

System repaired vul. exist

T_go

#

T_rm T_V

Vul. found

[g1]

G

V

all vul. fixed

Compromise not detected by SITAR

UC

Compromise discovered

F

[g8]

T_G

[g4]

T21 T22

T_att T12

[g4] T13

[g3]

V1 Compromise detected, out of redundancy

Compromise detected, out of redundancy

[g3]

[g4]

T11

T23

T_r2 P_det

[g4]

P1

Server repaired

P_FS

P2

#

Compromise not detected by SITAR P_A

GD

[g3]

T_r1

[g3]

Compromise Server detected, repaired tolerated vul. exist

P_GD

[g2] P_V

T_am1

Server repaired, all vul. fixed

T_dec2

[g6]

T_amr1

T_bm1

[g5]

T_dec

T_am2

T_acm

T_rec

FS P_am

T_amr2

P_bm

T_bm2

P_UC

P_F

Server repaired P_dam

T_down

P_rec

Fig. 3.

State Transition Model for Threat Level Three

T_all

P_up

P_down

m

and intrusion tolerance capabilities. Initially, the system is in state G, in which no vulnerability is found. The system will go into vulnerable state V from good state G, indicating that some of these vulnerabilities have been identified. In state V , attackers try various ways to exploit these vulnerabilities, and in the mean time system administrators may be fixing the vulnerabilities. If all vulnerabilities are fixed before the attacker can issue an attack, the system will return to state G; otherwise the vulnerability will eventually be successfully exploited and an attack is injected into the system. If SITAR’s internal components are able to detect an attack before any damage gets done to the system, the system will continue to stay in vulnerable state V . Otherwise the attack sneaks into the system resulting in some damage to the COTS servers. If the compromise is detected, and the resulting damage can be tolerated by redundancies present in the SITAR system, the system still returns to the vulnerable state after the attack. As is the case in Figure 3, if one COTS server is compromised by the malicious attack and the system detects the compromise, it can tolerate the compromise by changing to state V1 and continue providing services with 2 COTS servers up. If the system detects the compromise but can not mask the damage the attack causes, it will enter either graceful degradation state GD or fail-secure state F S depending on the impact of the attack. IV. SRN M ODEL In order to capture the details of attacker behavior as well as system behavior, and to avoid the manual construction of a high fidelity but complex Markov chain, we develop the SRN model for SITAR security. Figure 4 gives the model. Places PG , PV , PGD , PF S , PU C and PF correspond to the system’s security states. Transitions Tmal and Tatt are timed transitions characterizing the attackers’ behavior of probing the system’s vulnerabilities and their subsequent exploitation to attack the system. Places PA , Pam , Pbm , Pup and Pdown and the transitions Copyright 2003 Chillarege Press

T_rep

#

[g7]

Fig. 4.

SRN Model for SITAR Security

associated with these places characterize the system’s redundancy structure and intrusion tolerance mechanisms. Finally the transitions Trep , Trec , Tf ix characterize the system recovery behavior. The guard functions are shown in Table I. g1 g2 g3 g4 g5 g6

guard functions #(Pvul 6= 0) #(Pvul = 0) #(Pup ) > #(Pdown ) #(Pup ) < #(Pdown ) #(Pdet ) > #(Pvul ) #(Pup ) > 1

TABLE I E NABLING FUNCTIONS IN SITAR SRN

MODEL

R EFERENCES [1] Information Technology Security Evaluation Criteria (ITSEC):Provisional Harmonized Criteria. ISBN 92-826-7024-4, Dec. 1993. [2] P.D. Goldis. Questions and answers about tiger teams. EDPACS, The EDP Audit, Control and Security Newsletter, 27(4):1–10, Oct. 1989. [3] E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 23(4):235–245, April 1997. [4] B.B. Madan, K. Goˇseva-Popstojanova, K. Vaidyanathan, and K.S. Trivedi. Modeling and quantification of security attributes of software systems. In Proc. Int. Conf. on Dependable Systems and Networks, (IPDS stream), volume 2, pages 505–514, 2002. [5] R. Ortalo, Y. Deswarte, and M. Kaˇaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25:633–650, Oct. 1999. [6] S. Singh, M. Cukier, and W. H. Sanders. Probabilistic validation of an intrusion-tolerant replication system. International Conference on Dependable Systems and Networks (DSN’03), June, 2003.

Fast Abstract ISSRE 2003