Hybrid Risk Assessment Model based on Bayesian Networks - - PowerPoint PPT Presentation

hybrid risk assessment model based on bayesian networks
SMART_READER_LITE
LIVE PREVIEW

Hybrid Risk Assessment Model based on Bayesian Networks - - PowerPoint PPT Presentation

Introduction State of the art Hybrid Risk Assessment Model Conclusion Hybrid Risk Assessment Model based on Bayesian Networks Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar


slide-1
SLIDE 1

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Hybrid Risk Assessment Model based on Bayesian Networks

Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar

francois-xavier.aguessy@telecom-sudparis.eu Thales Communications & Security, Paris, France Telecom SudParis, Institut Mines-Télécom, Évry, France

IWSEC 2016, Tokyo, September 12th, 2016

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 1 / 20

slide-2
SLIDE 2

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Outline

1

Introduction

2

State of the art

3

Hybrid Risk Assessment Model

4

Conclusion

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 2 / 20

slide-3
SLIDE 3

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Introduction

Context:

Increase in the number and complexity of attacks. Need means to know the attacks that can happen, are happening, and to prevent them.

Goal: Modelling multi-step attacks for Dynamic Risk Assessment. Assess the level of security of an information system according to security alerts. Determine the attacks that are currently happening. Know how the attacker arrived here and what he could do next. Models based on attack graph.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 3 / 20

slide-4
SLIDE 4

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Outline

1

Introduction

2

State of the art Attack Graphs Dynamic Risk Assessment models Cycle problem

3

Hybrid Risk Assessment Model

4

Conclusion

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 4 / 20

slide-5
SLIDE 5

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Attack graphs

First representation of network attacks. Several formalisms regrouped under the name Attack Graph. Logical attack graphs:

AND/OR directed graph, Nodes are logical facts reachable by an attacker, Leaves represent the preconditions used to achieve goals.

Topological attack graphs:

Based on logical attack graphs, More concise and understandable, Nodes are machines or IP addresses linked by attack steps.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 5 / 20

slide-6
SLIDE 6

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Attack graphs

13:execCode(webServer,apache):0 14:RULE 2 (remote exploit of a server program):0 15:netAccess(webServer,tcp,80):0 16:RULE 6 (direct network access):0 17:hacl(internet,webServer,tcp,80):1 18:attackerLocated(internet):1 20:vulExists(webServer,'CAN-2002-0392',httpd,remoteExploit,privEscalation):1

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 5 / 20

slide-7
SLIDE 7

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Attack graphs

First representation of network attacks. Several formalisms regrouped under the name Attack Graph. Logical attack graphs:

AND/OR directed graph, Nodes are logical facts reachable by an attacker, Leaves represent the preconditions used to achieve goals.

Topological attack graphs:

Based on logical attack graphs, More concise and understandable, Nodes are machines or IP addresses linked by attack steps.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 5 / 20

slide-8
SLIDE 8

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Attack graphs

H1 H2 H3

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 5 / 20

slide-9
SLIDE 9

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Dynamic Risk Assessment models

Attack graphs:

Technology mastered, Contains accurate description of multi-steps attacks, × Not created to model on-going attacks (no nodes for detection/alerts, no position of attacker).

Attack nets:

Concurrency and progress of several attacks, × Attacker can not be in several places (several privileges), × Difficult to add tokens (representing alerts) during runtime.

Bayesian attack graphs:

Powerful tools to compute and propagate probabilities, Description of attacks more expressive (no-more AND/OR), × Size of Conditional Probability Tables × Management of cycles (Bayesian networks need acyclic graphs).

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 6 / 20

slide-10
SLIDE 10

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Dynamic Risk Assessment models

PETERSON SURFACE

and a hyperbolic paraboloid for a surface of transla- tion). These surfaces were first considered by K.M. Peterson as examples of surfaces allowing of a deforma- tion over a principal base.

I.Kh. Sabitov

Editorial comments. For references see also Peterson

correspondence. AMS 1980 Subject Classification: 53A05

PETRI NET - A mathematical model of discrete

dynamical systems, including data systems (parallel programs, operating systems, computers and their equipments, and computer networks), which is oriented to the qualitative analysis and synthesis of such systems (discovering deadlocks or conflict situations and bottlenecks, computer-aided synthesis of parallel pro- grams and computer components, etc.). It was intro- duced by C. Petri in the 1960-s. A Petri net is a set N=(T, P, F, M o), where T is a finite set of symbols called transitions, P is a finite set of symbols called

places, P n

T = 0, F is an incidence function:

F: TXP U PX T

{O, I},

and M 0 is an initial marking

Mo:P

{O, I, ...

}.

Informally speaking, a Petri net is a labelled oriented graph having a set of vertices T U P (see Fig.). From a place-vertex pEP, represented by a there runs an arc to a transition-vertex represented by a rectangle, if and only if

F(p, t) = 1

circle, tET, (p is the input place for t; in the figure P={Pl,P2,P3}, T= {a, b, c, d}). From a transition-vertex t there runs an arc to the place-vertex p if and only if

F(t,p) = 1

(p is an output place for n. The place P can be marked with a marking Mo(p )7'=0, which

is

frequently represented by a corresponding number of tokens. The dynamics of the modelled system is described in terms of the functioning of the Petri net. The net

  • perates in discrete time by passing from marking to

marking. Each marking

is

a function M: P--4{O, I, ...

}: a change in the marking (bcginning

with ,\1IJ) is performed by a net transition. A transition

t E T can fire with marking M if for any pEP.

144

M(P)-F(P, t);:;;' 0,

i.e. if each input place of it has at least one token. The firing of t given M replaces the latter by M' in accor- dance with the following rule: for any pEP,

M"(p) = M(P)-F(P, t)+F(t,p),

i.e. t removes a token from each input place, and adds a token to each output place. If several transitions can fire, some one of them fires. The net halts if at some marking (a deadlock marking) none of the transitions can fire. For a given initial marking, a Petri net can generate by virtue of its indeterminate operation vari-

  • us sets of firing sequences. These form words over the

alphabet T, and the set of all words generated by the Petri net is called its language. Two Petri nets are equivalent if they generate the same language. Research on Petri nets is conducted along two lines. The mathematical theory is advanced by a formal analysis of their properties. The most interesting prob- lems include recognizing deadlock situations, recogniz- ing equivalence of nets from the languages they gen- erate, evaluating complexity of nets, and comparing the expressive power for various subclasses of Petri nets and their extensions. It has been found that the deadlock problem is solvable, and the properties of the class of languages generated by Petri nets have been

  • examined. This class is strictly contained in the class of

recursively-enumerable languages and strictly includes the class of regular languages, while it partially inter- sects with the class of context-free languages. The second line is the use of Petri nets as the basis of models for discrete dynamical systems in information technology, economics, digital engineering, etc. In distinction to finite automata (cf. Automaton, fin- ite), which are used to describe global changes in the states of a system, Petri nets concentrate on local events (these correspond to transitions), local condi- tions (these correspond to places), and local links between events and conditions. Therefore, one can give a more adequate simulation of distributed asynchro- nous systems in terms of Petri nets rather than auto- mata. References

[I] PETERSON. 1.L.: Perri neT Theon' and The modelling 0lIT.lrems.

Prentice Hall. 1'181. [2] KOTOV, V.E.: Petri nets, Moscow. 1986 (in Russian). [3] STARKE. P.H.: Petri-Nelze. Deutsch. Verlag Wissenschaft.. 1981. [4] REISSIG. W.: Pelri nm. Springer. 1985.

  • VE. Kotov

Editorial comments.

Being a baSIC model of parallel computations, Petri nets have been studied very extensively during recent years. There is a yearly conference on Petri

  • nets. The best overview of currently active research is con-

tained in the proceedings of thiS conference, published by

  • Springer. The monograph [A

1] contains a brief account on

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 6 / 20

slide-11
SLIDE 11

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Dynamic Risk Assessment models

Attack graphs:

Technology mastered, Contains accurate description of multi-steps attacks, × Not created to model on-going attacks (no nodes for detection/alerts, no position of attacker).

Attack nets:

Concurrency and progress of several attacks, × Attacker can not be in several places (several privileges), × Difficult to add tokens (representing alerts) during runtime.

Bayesian attack graphs:

Powerful tools to compute and propagate probabilities, Description of attacks more expressive (no-more AND/OR), × Size of Conditional Probability Tables × Management of cycles (Bayesian networks need acyclic graphs).

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 6 / 20

slide-12
SLIDE 12

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Dynamic Risk Assessment models

Cloudy Sprinkler Rain Wet Grass

C=True 0.8 C=False 0.2 Cloudy True False R=True 0.8 0.1 R=False 0.2 0.9 R=True 0.7 R=False 0.3 Rain True False Sprinkler True False True False WG=True 0.99 0.90 0.90 0.0 WG=False 0.01 0.10 0.10 1.0 François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 6 / 20

slide-13
SLIDE 13

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Dynamic Risk Assessment models

Attack graphs:

Technology mastered, Contains accurate description of multi-steps attacks, × Not created to model on-going attacks (no nodes for detection/alerts, no position of attacker).

Attack nets:

Concurrency and progress of several attacks, × Attacker can not be in several places (several privileges), × Difficult to add tokens (representing alerts) during runtime.

Bayesian attack graphs:

Powerful tools to compute and propagate probabilities, Description of attacks more expressive (no-more AND/OR), × Size of Conditional Probability Tables × Management of cycles (Bayesian networks need acyclic graphs).

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 6 / 20

slide-14
SLIDE 14

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Cycles in attack graphs

A topological attack graph:

H1 H2 H3

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 7 / 20

slide-15
SLIDE 15

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Cycles in attack graphs

Current approaches followed to build Bayesian Attack graphs from a cyclic graph (when mentioned):

H1 H2 H3

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 7 / 20

slide-16
SLIDE 16

Introduction State of the art Hybrid Risk Assessment Model Conclusion Attack Graphs Dynamic Risk Assessment models Cycle problem

Cycles in attack graphs

But there are three possible paths:

H1 H2 H3 H2 H3 H1 H3 H1 H2

The solution we propose: enumerate the paths.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 7 / 20

slide-17
SLIDE 17

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Outline

1

Introduction

2

State of the art

3

Hybrid Risk Assessment Model Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

4

Conclusion

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 8 / 20

slide-18
SLIDE 18

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

High-level model architecture

Hybrid Risk Assessment Model

Topological Attack Graph Operator Feedback Alerts at0, … , at

  • n topological assets
  • r on attack steps

Assets compromise probabilities risk current attack status Dynamic Risk Correlation Models Probability reconciliation DRCM from at0 with alert at0 DRCM from at with alerts at0, … , at

...

Future Risk Assessment Models FRAM from t0 attack source FRAM from tm attack source

...

Probability reconciliation Impact analysis François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 9 / 20

slide-19
SLIDE 19

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Dynamic Risk Correlation Model

Build from a bunch of (ordered) alerts. To analyze how these alerts may have been produced. Gives attack sources and attack paths (via the Bayesian topological nodes) probabilities.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 10 / 20

slide-20
SLIDE 20

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Dynamic Risk Correlation Model from alert on h1

Topological Asset h1←h2←h3 Attack Step as(h3→h2) Condition 3 Topological Asset h1 Attack Step as(h2→h1) Topological Asset h1←h2 Condition 1 Condition 2 Attack Step as(h3→h1) Topological Asset h1←h3 Condition 4 Attack Step as(h2→h3) Topological Asset h1 ←h3←h2 Condition 5 Condition 6 Sensor h1 Attack source h2 Attack source h3 Attack source h2 Attack source h3 Attack Source h1 Sensor h2 Sensor h2 Sensor s(as(h2→h1)) Sensor s(as(h3→h2)) Sensor h3 Sensor s(as(h3→h1)) Sensor s(as(h2→h3)) Sensor h3

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 11 / 20

slide-21
SLIDE 21

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Dynamic Risk Correlation Model from alert on h1

Topological Asset h1←h2←h3 Attack Step as(h3→h2) Condition 3 Topological Asset h1 Attack Step as(h2→h1) Topological Asset h1←h2 Condition 1 Condition 2 Attack Step as(h3→h1) Topological Asset h1←h3 Condition 4 Attack Step as(h2→h3) Topological Asset h1 ←h3←h2 Condition 5 Condition 6 Sensor h1 Attack source h2 Attack source h3 Attack source h2 Attack source h3 Attack Source h1 Sensor h2 Sensor h2 Sensor s(as(h2→h1)) Sensor s(as(h3→h2)) Sensor h3 Sensor s(as(h3→h1)) Sensor s(as(h2→h3)) Sensor h3

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 11 / 20

slide-22
SLIDE 22

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Build of the model according to detections

time Alert 1 Alert 2 Alert 3 Dynamic Risk Correlation Model from Alert 1 Dynamic Risk Correlation Model from Alert 2 Sources and nodes probabilities Inference With detections (alert 1) Dynamic Risk Correlation Model from Alert 1 Sources and nodes probabilities Inference With detections (alert 1, 2) Sources and nodes probabilities Inference With detections (alert 1) Dynamic Risk Correlation Model from Alert 3 Dynamic Risk Correlation Model from Alert 2 Sources and nodes probabilities Inference With detections (alert 1, 2, 3) Sources and nodes probabilities Inference With detections (alert 1, 2) Dynamic Risk Correlation Model from Alert 1 Sources and nodes probabilities Inference With detections (alert 1)

Probability reconciliation Probability reconciliation

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 12 / 20

slide-23
SLIDE 23

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Performance improvement – pruning

Prune paths that do not bring information. Count the number of no-detection or no-information. Two parameters: maximum to keep, and maximum to explore.

TN1 AS1.1 TN1.1 S1 S AS3.1 S TN3.1 S S AS1.2 TN1.2 S S AS1.3 TN1.3 S S AS1.4 TN1.4 S S AS3.2 S TN3.2 S MaxNumberNoInfoToKeep = 4 MaxNumberNoInfoToExplore = 8 MaxNumberNegativeDetectionsToKeep = 2 MaxNumberNegativeDetectionsToExplore = 4 AS2.1 TN2.1 S S AS2.2 TN2.2 S S AS2.3 TN2.3 S S AS2.4 TN2.4 S S

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 13 / 20

slide-24
SLIDE 24

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Future Risk Assessment model

Build from an attack source with its probability. To analyze the most probable possible futures. Dynamicity by updating the probability of conditions, taking into account the context (already exploited vulnerabilities...).

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 14 / 20

slide-25
SLIDE 25

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Example of Future Risk Assessment model

Topological Asset h1h2h3 Attack Step as(h2->h3) Condition 3 Attack Step as(h1->h2) Topological Asset h1 h2 Condition 1 Condition 2 Attack Step as(h1->h3) Topological Asset h1 h3 Condition 4 Attack Step as(h3->h2) Topological Asset h1 h3h2 Condition 5 Condition 6 Attack Source h1 François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 15 / 20

slide-26
SLIDE 26

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Performances ?

No evidences, No sensors, Only Forward propagation. No need to go very far from detections / attack sources, Several small models in parallel.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 16 / 20

slide-27
SLIDE 27

Introduction State of the art Hybrid Risk Assessment Model Conclusion Architecture Dynamic Risk Correlation Model Future Risk Assessment Model Performance results

Performances

Simulations network topology:

Subnet 1 Subnet 2 Subnet 7

h1.1 h1.2 h1.3

...

h2.1 h2.2 h2.3 h3.1 h3.2 h3.3

HRAM model generation and inference duration:

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 17 / 20

slide-28
SLIDE 28

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Outline

1

Introduction

2

State of the art

3

Hybrid Risk Assessment Model

4

Conclusion

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 18 / 20

slide-29
SLIDE 29

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Conclusion

Bayesian inference is a powerful tool to deduce the effects of several events on a global model. Well adapted to Dynamic Risk Assessment problem. To use the inference algorithms, necessary to satisfy the constraints of the formalism (acyclic, CPT size. . . ). Definition of an hybrid model combining dynamic risk correlation models (past) with possible future models (future). Generation of the HRAM on topologies far bigger than the state of the art.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 19 / 20

slide-30
SLIDE 30

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Thanks for your attention! Any questions?

F.-X. Aguessy, O. Bettan, G. Blanc, V. Conan, H. Debar. Hybrid Risk Assessment Model based on Bayesian Networks. In 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings, 2016. francois-xavier.aguessy@telecom-sudparis.eu Slides available online @ https://fxaguessy.fr/en/articles/hram/

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 20 / 20

slide-31
SLIDE 31

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Accuracy results

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 21 / 20

slide-32
SLIDE 32

Introduction State of the art Hybrid Risk Assessment Model Conclusion

Performance improvements – Polytree

A directed graph is a polytree if its underlying undirected graph is a tree. Even exact inference algorithms are much more performing (Lauritzen or Pearl). Can do exact inference up to 25.000 nodes (whereas problems with > 500) with a normal laptop. Specification of the dynamic risk correlation models as polytrees.

François-Xavier Aguessy Hybrid Risk Assessment Model based on Bayesian Networks 22 / 20