A Research Project of InterSOC Cooperation b/w Keio and Hitachi - - PowerPoint PPT Presentation
A Research Project of InterSOC Cooperation b/w Keio and Hitachi - - PowerPoint PPT Presentation
A Research Project of InterSOC Cooperation b/w Keio and Hitachi Graduate School of Science and Technology, Keio Univ. Headquarters of Information Technology Center, Keio Univ. 11/20/2017@Mita Campus, Keio Univ. Takao KONDO latte@itc.keio.ac.jp
Security Operation in Keio Univ.
- KEIO-NET has 3 PoPs for upstream networks
– For WIDE-BB: 1 PoP – For SINET: 2 PoPs
- Installed next generation firewalls at upstream networks
boundary and campus boundary
– Conducts application protocol analysis – Separates security zones by each campus (zero trust approach)
11/20/2017 2
The Internet SINET
AS2904
WIDE-BB
AS2500 Hiyoshi Yagami Mita Shinano machi Fujisawa Shiba
: Router : Firewall
KEIO-NET
AS38635
KEIO-NET Prefix: 131.113.0.0/16 133.27.0.0/16 2001:df0:eb::/48 2001:200:167::/48 2001:200:1c0::/48
Features of University Networks
- Research and Education (RandE) networks
– Assigned to each faculty and department – Basically, operated by the assigned faculty and department (due to regard for research and education activities) – Information Technology Center (ITC) monitors RandE network traffic by FWs
- Administration (Adst) networks
– Assigned to administration offices – Basically, operated by ITC – ITC installed full-stacks security software (TLS proxy, Mail security, vulnerability scanner etc.) into the Adst networks
11/20/2017 3
Necessary to suppress too much security scan in RandE networks
Keio SOC / WIDE SOC
- WIDE-BB: nationwide RandE backbone network
– Operational and experimental network – Commodity traffic and Darknet traffic can be captured
- KEIO-NET: Service network in Keio Univ.
– Flow info (5 tuples) analysis, L7 analysis by FWs
11/20/2017 4
WIDE-BB
AS2500
Darknet
Hiyoshi Hiyoshi Mita Shiba Fujisawa Shinano machi
: Router : Firewall
KEIO-NET
AS38635
WIDE Neighbors
: : Flow collector L7 Analyzer
Use-cases of InterSOC Cooperation
- Vulnerable hosts list (stub => upstream)
– E.g., Hosts which have bad CVSS score
11/20/2017 5
- Darknet analysis result (upstream => stub)
– Early threat warning: (e.g., the num of dst port 445 accesses shapely raised about two weeks before the world first affected report
- f WannaCry.
Necessary to conduct access control for cooperation
CVSS scoring in Keio Univ. Access pattern analysis in WIDE-BB Finding vulnerable hosts in the other stubs Vulnerable hosts list (WIDE = Keio) Analysis results (WIDE = Stub Nets)
InterSOC Modules Overview
- AAA agent conducts access control of gathered info.
– In User Apps, InterSOC cooporation
- Uniformed format in DB input/output
– For flexible changing of gathering info. – E.g., Fluentd, logstash etc.
- SOCs are communicated via InterSOC Agents
– For hide the actual DB from external entities
- User Apps retrieve gathered info via REST API
11/20/2017 6
REST API AAA fluentd, logstash etc. Uniformed format (e.g., JSON) syslog sflow netflow DNS ... RDMS DNS query log FW log xflow log
- Vul. Scan
log ... Inter-SOC Agent User Apps (e.g., Visualization) ...
Other AS
Inter-SOC Agent
ここの話題!
Assumed Environment
- Public Key Infrastructure (PKI) is available
- AAA Server in each domain stores:
– its domain's public key signed by CA – its members' public keys signed by domain AAA server
- Inter-domain routing of AAA signaling
– Requirements: policies b/w domains, scalability
- Ticket-based Access Control System
– Access Control List (ACL) is distributed as Ticket to each User – Ticket contains: Subject, Action, Resource, Valid time – Ticket is signed by Owner and pre-distributed to User
11/20/2017 7
AAA Server Upstream ISP Domain Stub-net-1 Domain Inter-SOC Agent AAA Server Inter-SOC Agent User AAA Server Stub-net-2 Domain Inter-SOC Agent Owner
User Authentication Procedures
Inter SOC Agent AAA AAA AAA
[info_request]Kprivuser + [ticket]Kprivowner
user_id_request user_id_reply nonce + user_id {nonce}Keyprivuser + user_id [Kpubuser]Kprivstub-net-1+ [Kpubstub-net-1]KprivCA user_authn_request
Authentication phase
Stub-net-1 Domain Upstream ISP Domain Stub-net-2 Domain User ID retrieval Challenge/Response AuthN User’s Pubkey retrieval & User’s AuthN
Inter-SOC AAA App
Info request by User
Inter SOC Agent Inter SOC Agent
user_authn_reply
11/20/2017 8
User Authorization Procedures
Inter SOC Agent AAA Inter SOC Agent AAA Inter SOC Agent AAA
[Kpubowner]Kprivstub-net-2 + [Kpubstub-net-2]KprivCA info_reply + [{Skisp-stub-1 + nonce}Kpubuser]Kprivisp user_authr_request
Authorization phase
Owner’s Pubkey retrieval & User’s AuthR Inter-SOC AAA App
Session Key Stub-net-1 Domain Upstream ISP Domain Stub-net-2 Domain
user_authr_reply
11/20/2017 9
Related Work
- Access control per content
– Authenticated / authorized users can (i) know existence of content,(ii) retrieve content
- Access control based on multi-domain routing
– AAA signaling mechanism on multi-domain overlay
- Scalability
– The num of content files and domains
11/20/2017
Kerberos [1] Shibboleth[2] RADIUS[3] Diameter Inter-SOC App Per-content yes yes yes yes Multi-domain routing yes yes
no
yes Scalability No[4] no no yes
10
[1] C. Neuman et.al., "Kerberos: An Authentication Service for Computer Networks", In Proc. of IEEE Communications Magazine, 1994, pp. 33 –38 [2] W. Jieet.al., "A Guanxi Shibboleth based Security Infrastructure", In Proc. of IEEE EDOC WKSHPS'08, 2008, pp. 151 –158 [3] C. Rigney et.al., " Remote Authentication Dial In User Service (RADIUS)", RFC2138, IETF, 2000 [4] S. Sakaneet.al., "Problem Statement on the Cross-Realm Operation of Kerberos." RFC5868, IETF, 2010
AAA Protocol "Diameter"
- Diameter base protocol
– Exchange AAA related information safely – For signaling in Multi- domain Environment
- Diameter application
– Extension of Diameter base protocol extension – Defines diameter message format for carrying app. specific data – e.g., Diameter EAP App. (AuthN and AuthZ for network access)
Diameter Server Diameter Server Diameter Server User DB User DB User DB
Domain A Domain C Domain B Diameter Overlay Network
11/20/2017 11
Diameter Base Protocol
Diameter EAP App Diameter SIP App Diameter Inter- SOC App
Diameter Inter-SOC Application
- Diameter message: Command + AVPs
– Command code: specifies action when Diameter message is received – AVP (Attribute Value Pair): stores data delivered by command
- New command of Diameter InterSOC App.
– Public key Request/Answer Command for AuthN & AuthZ
- New AVP of Diameter InterSOC App
– Carry AuthN & AuthZ information – Public key Request Command
- Origin-Host AVP, Origin-Realm AVP, Destination-Realm AVP,
User-name AVP, Session ID AVP,
– Public key Answer Command
- Origin-Host AVP, Origin-Realm AVP, Session ID AVP,
Public-key AVP
11/20/2017 12
Conclusion
- Security operation in Keio Univ.
– Installed next generation firewalls at upstream networks boundary and campus boundary – Necessary to suppress too match payload scan in RandE networks
- InterSOC cooperation system
– AAA agent conducts access control of gathered info. – Uniformed format in DB input/output – SOCs are communicated via InterSOC Agents – User Apps retrieve gathered info via REST API
11/20/2017 13