cs 5410 computer and network security cloud security
play

CS 5410 - Computer and Network Security: Cloud Security Professor - PowerPoint PPT Presentation

CS 5410 - Computer and Network Security: Cloud Security Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Imagine Southeastern Security for Enterprise and Infrastructure (SENSEI) Center


  1. CS 5410 - Computer and Network Security: Cloud Security Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

  2. Imagine… Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 2

  3. In the beginning… • In the past, industry was saddled between sufficient computing power and significant “Cap-Ex”. • Who could afford giving everyone a computer? • Users instead worked from “dumb” terminals, which became increasingly capable. • All the processing was handled by a single timesharing mainframe. Computing became indispensable and ubiquitous... • ... and the centralized model of computing 
 all but disappeared. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 3

  4. … but then … • With an increasing number of computationally enabled users, the need for larger infrastructure grew... • ... to support wild fluctuations in traffic. • ... to calculate answers to really big questions. • ... to reduce the Cap-Ex of replacing “obsolete” PCs. • Resources can be pushed, pulled, moved, redistributed… Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 4

  5. Grid Computing • Distributed computing has long been studied, but grid computing was the first to talk about federating these resources across multiple administrative domains. • Grid computing often centered around CPU scavenging, or the use of “wasted” cycles to perform useful work for the grid. • e.g., Distributed.net, SETI@home, Folding@home... • A number of companies offered software 
 to coordinate the arbitrary execution of 
 code (for a price). • e.g., IBM, Sun Microsystems and HP Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 5

  6. Cloud Computing • Cloud computing is ... umm... • Acceptable definitions are hard to come by, but roughly it is “the use of computing resources over a network connection”. • Isn’t that just grid computing? • Isn’t that just... the Internet? Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 6

  7. More Information • Cloud computing can more accurately be split into four sub-classes of service: • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Software as a Service (SaaS) • Network as a Service (NaaS) Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 7

  8. IaaS • The most basic model of cloud computing. • Customers are allocated machines (generally VMs), upon which they can run (almost) arbitrary software. • Arbitrary, within the bounds of law of the hosting country. • Most common providers:Amazon EC2,Windows Azure Services Platform, Rackspace Cloud, etc • The infrastructure is flexible, and can be almost instantaneously allocated or deallocated by the administrator. • This is how many companies handle traffic spikes, expected or otherwise. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 8

  9. PaaS • Platform as a Service provides a “harness” for the execution of arbitrary software. • Allows developers to implement and run their software on a machine without worrying about the administrative details/lower layers. • Expands like IaaS, but happens automatically. • Why? See the above. • Examples: Google App Engine, 
 Windows Azure Cloud Service... Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 9

  10. SaaS • The cloud service installs and manages software, and users pay* to access this software through special clients. • *Either directly or through advertisements. • Load is automatically balanced over the infrastructure, allowing the application to use more resources as necessary. • Examples: Microsoft Office 365, Google Apps Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 10

  11. NaaS • The least well known of the services. • Not the same thing as Network Area Storage (NAS). • Network resources and services, instead of computation, are the provisioned quantity. • The most popular services: bandwidth on demand, VPNs... Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 11

  12. Dividing Lines • The services decrease in the complexity/ administration for which the user is willing to be responsible. • Want to be able to turn all the knobs? IaaS! • Want things just to work? SaaS! • The lines, are not entirely clear. • Some will debate where the borders 
 are, but more interesting problems 
 exist. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 12

  13. Cloud Security • Someone else, potentially across the planet, has access to your data. • What could possibly go wrong? • Data Exfiltration: • Policy configuration, in the VM, the OS, the “Harness”, or the application may make it easy to extract your sensitive data. • Risk: Many of these instances have 
 virtually the same configuration, so a weakness in one may be representative 
 of a widespread vulnerability. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 13

  14. Data Mining • Why exfiltrate data when you can gather statistics on it “in situ”. • Customer contact information • User behaviors • EVERYTHING • Your data is exposed, and there is very 
 little that you can do to prevent this. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 14

  15. Targeting by Nation-States Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 15

  16. Clouds as a Security Enhancement? • Are there any ways in which “the cloud” may actually be an improvement to security? Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 16

  17. Co-Residency Detection • Cloud computing saves money by running many instances on a single physical piece of hardware. • There are many reasons two competing companies would not want to be on the same physical hardware: • Increased traffic could indicate something secret or private happening. • Knowing the location of a competitor’s VM 
 may allow you to DoS it... or at least cost 
 them additional money to provision more 
 services. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 17

  18. Ristenpart Attack • 1. Use Amazon EC2 as a case study • U.S. Region - Linux Kernel • 2. Achieve PLACEMENT of their malicious VM on the same physical machine as that of a target customer. • Determine where in the cloud an instance is likely to be located. • Determine if two instances are co-residents. • Intentionally launch an instance to achieve co-residence with another user. • 3. Proceed to EXTRACT information and/or perpetrate all kinds of attacks Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 18

  19. Mapping the Cloud • Hypothesis: different availability zones (and possibly instance types) are likely to correspond to different internal IP address ranges. • Since we already know that it’s possible to infer the internal IP address of an instance associated with a public IP through the EC2’s DNS service... • If this hypothesis holds, an adversary can use a map of EC2 to determine the instance type and availability zone of their target, dramatically reducing the number of instances needed to achieve co- residence. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 19

  20. So How Do We Do This? HTTP gets No HTTP gets 2e+06 1.5e+06 CPU cycles 1e+06 500000 0 0 10 20 30 40 50 60 70 80 90100 0 10 20 30 40 50 60 70 80 90 100 0 10 20 30 40 50 60 70 80 90 100 Trial 1 Trial 2 Trial 3 • Ristenpart, et al. use a “Prime+Probe” technique to see cache hits and misses. • Others have suggested a variety of additional side channels, including network load. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 20

  21. Does this attack still work? • The one published does not work any more • Amazon reads these papers too • But alternative approaches to mapping EC2 have been developed (USENIX Security’14) • Active mechanisms to determine co- residency (Bates et al., CCSW 2012) • Other side-channel mechanisms (Mike Reiter, talk on Friday about) Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 21

  22. Regulation/Legal • Lots of the data that we generate comes encumbered with legal requirements. • Healthcare: HIPAA & HITECH • Financial: Graham-Leach-Bliley • Keeping the data within the US is a 
 requirement for some customers. • Some countries have strong privacy requirements, which should offer more protection. • In reality, legislation such as the Patriot Act (and related Anti-Terrorism legislation) mean your data can be exposed without your knowledge. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 22

  23. There Must Be More… • Emerging cryptographic constructions allow for computation on encrypted data. • That is, you encrypt your data and a cloud provider can blindly but meaningfully make changes to your data. • Techniques: Homomorphic encryption, garbled circuits. • This changes the game! • All the power of the cloud, 
 none of the risks... • We’ll discuss in the weeks ahead. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend