Augmenting Storage with an Intrusion Response Primitive to Ensure - - PowerPoint PPT Presentation

augmenting storage with an intrusion response primitive
SMART_READER_LITE
LIVE PREVIEW

Augmenting Storage with an Intrusion Response Primitive to Ensure - - PowerPoint PPT Presentation

Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data Ashish Gehani Surendar Chandra University of Notre Dame & Gershon Kedem Duke University 1 INTRODUCTION : Intrusion Response


slide-1
SLIDE 1

Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data

Ashish Gehani Surendar Chandra University of Notre Dame & Gershon Kedem Duke University

1

slide-2
SLIDE 2

INTRODUCTION : Intrusion Response

  • Vulnerabilities continuously discovered
  • Patches not always possible
  • Intrusion detection cuts exposure
  • Previous responses aimed at threat
  • We curtail consequence
  • Cryptography / Replication expensive

− → Focus on critical data

2

slide-3
SLIDE 3

MOTIVATION : Prevention Inadequate

  • Limited response options

– Raise alarm – Close network connection – Kill process

  • Occurs after attack

− → Data compromised

  • Irreversible

− → High response threshold to reduce false positives

3

slide-4
SLIDE 4

GOALS : Response Primitive

  • Guarantee security

– Confidentiality via encryption – Integrity via signed hashing – Availability via replication

  • Reduce Mean Time To Response
  • Compartmentalize the impact
  • Simple interface

– Automate recovery – Usable granularity

4

slide-5
SLIDE 5

BACKGROUND : Secure Filesystems

  • Symmetric ciphers (CFS, TCFS, CryptFS)

− → Read permission = Write permission

  • Self-certifying (SFS, SFS-RO, MS EFS)

− → Confidentiality not ensured

  • Distributed (Secure File System, Cepheus)

− → Access rights depend on network

  • No replication
  • No detector interface

5

slide-6
SLIDE 6

OVERVIEW : RICE

  • Provide response primitive

– Protection when needed – Data should survive compromise

  • Invoked by detector when risk is high
  • Latency from encryption is high

– Keep data protected – Unprotect when used – Encryption transformed to key deletion

  • Reversible via authentication

6

slide-7
SLIDE 7

OVERVIEW : Architecture

Intrusion Detector Capability Filesystem API Manager Write Unsigned Data Read Unencrypted Data Read Encrypted Data Write Signed Data

✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✂ ✂ ✂ ✂ ✂ ✂ ✂ ✂ ✂ ✄ ✄ ✄ ✄ ✄ ✄ ✄ ✄ ✄ ☎ ☎ ☎ ☎ ☎ ☎ ☎ ☎ ☎ ✆ ✆ ✆ ✆ ✆ ✆ ✆ ✆ ✆ ✝ ✝ ✝ ✝ ✝ ✝ ✝ ✝ ✝ ✞ ✞ ✞ ✞ ✞ ✞ ✞ ✞ ✞ ✟ ✟ ✟ ✟ ✟ ✟ ✟ ✟ ✟ ✠ ✠ ✠ ✠ ✠ ✠ ✠ ✠ ✠

Application Public/Private Keys Control Write Signed Encrypted Delta Remote Node Filesystem

7

slide-8
SLIDE 8

DESIGN : Protection Groups

  • Associates threat with group of targets
  • Compartmentalize response

− → Rest of system operates normally

  • Minimizes key manipulation

− → Reduces response time

  • Orthogonal to access control groups
  • Group g has asymmetric key pair eg, dg

8

slide-9
SLIDE 9

DESIGN : Confidentiality

  • File f encrypted with capability sf

− → Protected file ˆ f = Encrypt(sf, f)

  • File f in group g

− → Read capability fr = Encrypt(eg, sf)

  • Application reads f

− → RICE computes sf = Decrypt(dg, fr) f = Decrypt(sf, ˆ f)

  • If g threatened

– RICE deletes dg, f – f confidentiality safe

9

slide-10
SLIDE 10

DESIGN : Integrity

  • Authentication on close( ) with Write capability eg

– File delta computed : δf – δf hashed : hδf = H(δf) – Hash signed : ˆ hδf = S(eg, hδf )

  • If g threatened

– RICE deletes eg – Subsequent δf unauthenticated – Changes since open( ) lost

10

slide-11
SLIDE 11

DESIGN : Availability

  • Backups are synchronous
  • High frequency

− → Low loss, High cost

  • Upper bound on frequency

– Finding changed files, Replicating

  • Duplicate file on open( )
  • Compute delta on close( )

− → Asynchronous, No tradeoff

  • Transfer deltas to remote node
  • Deltas sufficient for post-intrusion reconstruction

11

slide-12
SLIDE 12

IMPLEMENTATION : Group Manager

  • RICE metadata in groups database
  • Password protected
  • List, Add, Remove operations
  • Input, Output to / from capabilities file

12

slide-13
SLIDE 13

IMPLEMENTATION : Capability Manager

  • System initialization

− → Read capabilities file

  • java.io.FileInputStream calls unsealFile( )

− → Decryption, Integrity verification

  • java.io.FileOutputStream calls sealFile( )

− → Encryption, Delta computation, Replication

  • Open RICE file count = 0

− → Commit capabilities file

13

slide-14
SLIDE 14

IMPLEMENTATION : Intrusion Detector Interface

  • Runtime protection

– Remove group g write access − → Delete eg, Unauthenticated writes possible – Remove group g read access − → Delete dg, Invoke disable( ) – disable( ) deletes decrypted files, duplicates

  • Regaining access

– Invoke enable( ) − → User authentication – Buffer enable( ) requests for performance

14

slide-15
SLIDE 15

EVALUATION : Example Usage

  • AccountManager uses /tmp for scratch files

SubmitData allows uploads to /tmp

  • AccountManager assumes atomicity for :

Copy, Append, Change Permission, Move ⇒ Race Condition

  • Event 16 denies password file writes in /tmp directory

Event 19 Chinese Wall’s upload servlet execution Event 22 Chinese Wall’s writes of scratch password file Event 23 RICE disable( ) of Documents object group

15

slide-16
SLIDE 16

EVALUATION : RICE Security Benefit

16

slide-17
SLIDE 17

EVALUATION : Micro Benchmark

17

slide-18
SLIDE 18

EVALUATION : Macro Benchmark Applications

  • Check - array, arithmetic, bit operations
  • Mtrt - ray tracer
  • Jess - puzzle expert system
  • Compress - Lempel-Ziv compressor
  • Db - memory resident database
  • Mpegaudio - MP3 decompressor
  • Jack - lexical parser

18

slide-19
SLIDE 19

EVALUATION : Macro Benchmark

19

slide-20
SLIDE 20

EVALUATION : Macro Benchmark - With Caching

20

slide-21
SLIDE 21

CONCLUSION :

  • RICE mediates file access
  • Allows dynamic data security / performance tradeoff
  • Intrusion detector can trigger :

– Read permission enforcement with encryption – Write permission verifiability with digital signatures – Data availability with remote delta replication

  • Reversible through authentication

21