CRUSOE: DATA MODEL FOR CYBER SITUATIONAL AWARENESS Tuesday 28 th - - PowerPoint PPT Presentation

crusoe data model for cyber situational awareness
SMART_READER_LITE
LIVE PREVIEW

CRUSOE: DATA MODEL FOR CYBER SITUATIONAL AWARENESS Tuesday 28 th - - PowerPoint PPT Presentation

CRUSOE: DATA MODEL FOR CYBER SITUATIONAL AWARENESS Tuesday 28 th August, 2018 Martin Husk Jana Komrkov Martin Latovika Daniel Tovark Introduction and Motivation CRUSOE Data Model Page 2 / 23 Cyber Situational Awareness


slide-1
SLIDE 1

CRUSOE: DATA MODEL FOR CYBER SITUATIONAL AWARENESS

Tuesday 28th August, 2018

Martin Husák

Jana Komárková Martin Laštovička Daniel Tovarňák

slide-2
SLIDE 2

Introduction and Motivation

CRUSOE Data Model Page 2 / 23

slide-3
SLIDE 3

Cyber Situational Awareness

Situational Awareness “Perception of the elements in the environment within a volume of time and space, the comprehension of their meaning and the projection of their status in the near future.” [Endsley, 1988] Network-wide Situational Awareness Network Awareness Threat/Attack Awareness Operation/Mission Awareness Prediction & Data Fusion [Evancich, 2014]

CRUSOE Data Model Page 3 / 23

slide-4
SLIDE 4

OODA Loop

Observe, Orient, Decide, Act [Boyd, 1976]

CRUSOE Data Model Page 4 / 23

slide-5
SLIDE 5

CRUSOE Project

Research of Tools for Cyber Situational Awareness and Decision Support of CSIRT Teams in Protection of Critical Infrastructures Observe – network and host monitoring Orient – visualization, incident handling dashboard Decide – impact assessment, attack countermeasure suggestion Act – dry-run of attack countermeasures

CRUSOE Data Model Page 5 / 23

slide-6
SLIDE 6

Contribution

Summary of the requirements on a data model that could be used for capturing cyber situational awareness. Proposal of a data model that fulfills the requirements and describe in details its entities and relationships. Description of the data sources that can be utilized to fill the model in fully automated or semi-automated fashion. Illustration of how does the proposed data model enhance incident response in common scenarios.

CRUSOE Data Model Page 6 / 23

slide-7
SLIDE 7

Requirements

CRUSOE Data Model Page 7 / 23

slide-8
SLIDE 8

Interviews with Incident Handlers

Interviews CSIRT/CERT teams from EU countries What do you lack in day-to-day operations and incident response? Common Answers Criticality estimation of attack target Vulnerability prioritization and dissemination Finding responsible person

CRUSOE Data Model Page 8 / 23

slide-9
SLIDE 9

Selected NATO Use Cases

NATO CDSA RFI Cyber Defense Situational Awareness Request for Information 35 use cases for cyber defence situational awareness system UC10 – Single authoritative data source UC12 – View connections of asset UC15 – Fuse data UC03 – Drill down / Roll up UC06 – View asset dependencies UC11 – View interconnectivity

CRUSOE Data Model Page 9 / 23

slide-10
SLIDE 10

Related Work

CyGraph System for improving cyber security posture Graph-based data model and database Layered design:

mission readiness cyber threats network infrastructure cyber posture

Other Data Models M2D2, Virtual Terrain, CAMUS, . . .

CRUSOE Data Model Page 10 / 23

slide-11
SLIDE 11

Data Model

CRUSOE Data Model Page 11 / 23

slide-12
SLIDE 12

Proposed Data Model

Key Characteristics All-embracing Comprehensive Attainable Sustainable Time-conscious Extensible Novelties compared to related work Adherence to automatically aquirable content Inclusion of Access Control Grouping mechanisms – host clustering, etc. Dependancy and redundancy nodes

CRUSOE Data Model Page 12 / 23

slide-13
SLIDE 13

Layers

Threat Layer Detecon and Response Layer Host Layer System Layer Threa Mission Layer Access Control Layer Network Layer

CRUSOE Data Model Page 13 / 23

slide-14
SLIDE 14

Host Layer

host host cluster

part of entrypoint

  • n

software resource

is a

physical host virtual host

hosted on

network service

provides

redundancy node

redundancy primary instance

vulnerability software version

has in

node device

is a has identity

Data mostly obtainable via network monitoring Clustering and virtualization information inserted manually

CRUSOE Data Model Page 14 / 23

slide-15
SLIDE 15

System Layer

software resource redundancy node

redundancy primary instance

component

provided by

dependency node

depends on dependency

confidentiality req. integrity req. availability req.

  • rganization unit

for

  • n

data

present on

application

has identity

mission

supports

Connects network hosts with components of critical systems Describes distribution of sensitive data

CRUSOE Data Model Page 15 / 23

slide-16
SLIDE 16

Network Layer

IP domain name

resolves to

node

  • rganization unit

is a has assigned connected

host subnet

part of

security event

target/source part of is a

  • bservation point

Network topology, connections with organization units

CRUSOE Data Model Page 16 / 23

slide-17
SLIDE 17

Detection and Response Layer

vulnerability

refers to

security event incident

relates to

response

response to

detection system

raises target/source

user IP

  • bservation point

data input

node

is a

Placement of intrusion detection systems History of security incidents

CRUSOE Data Model Page 17 / 23

slide-18
SLIDE 18

Access Control Layer

host device component application

has identity has identity

role user group

to assigned to member of

availability req.

  • rganization unit

for part of

subnet permission

has

CRUSOE Data Model Page 18 / 23

slide-19
SLIDE 19

Mission Layer

component confidentiality req. integrity req. availability req.

  • rganization unit

for

  • n

data

present on

mission

supports imposes

CRUSOE Data Model Page 19 / 23

slide-20
SLIDE 20

Threat Layer

software resource vulnerability

in refers to

software version

subversion has in

CVE

refers to

security event Enumeration of vulnerabilities related to software resources

CRUSOE Data Model Page 20 / 23

slide-21
SLIDE 21

Conclusion

CRUSOE Data Model Page 21 / 23

slide-22
SLIDE 22

Conclusion and Future Work

Conclusion Seven-layer model for cyber situational awareness, automation of obtaining data preferred, novel concepts included (access control, host clustering, etc.), evaluated through discussions with incident handlers. https://github.com/CSIRT-MU/CRUSOE-Data-Model Future Work Implementation of cyber situational awareness system. Further examination of available data sources.

CRUSOE Data Model Page 22 / 23

slide-23
SLIDE 23

THANK YOU FOR YOUR ATTENTION!

csirt.muni.cz

Martin Husák

@csirtmu husakm@ics.muni.cz