MAFTIA: FTI Dependability: Basic Concepts and Terminology a - - PowerPoint PPT Presentation

maftia
SMART_READER_LITE
LIVE PREVIEW

MAFTIA: FTI Dependability: Basic Concepts and Terminology a - - PowerPoint PPT Presentation

Fundamental Concepts of Dependability [Avizienis, Laprie & Randell 2001] MAFTIA: FTI Dependability: Basic Concepts and Terminology a European project for [Laprie 1992] Intrusion-tolerant data processing dependable Internet applications


slide-1
SLIDE 1

MAFTIA:

a European project for dependable Internet applications despite intrusions and accidental faults

Yves Deswarte LAAS-CNRS Toulouse, France deswarte@laas.fr David Powell

Dependability as a generic concept [Laprie 1985] Secure systems from insecure components [Dobson & Randell 1986] Intrusion-tolerant file system [Fraga & Powell 1985] Intrusion-tolerant security server [Deswarte, Blain & Fabre 1991] Intrusion-tolerant data processing [Fabre, Deswarte & Randell 1994] Fundamental Concepts of Dependability [Avizienis, Laprie & Randell 2001] Dependability: Basic Concepts and Terminology [Laprie 1992]

FTI

MAFTIA

Malicious- and Accidental-Fault Tolerance for Internet Applications IST Dependability Initiative Cross Program Action 2

Dependability in services and technologies

University of Newcastle (UK)

Brian Randell, Robert Stroud

University of Lisbon (P)

Paulo Verissimo

DERA, Malvern (UK)

Tom McCutcheon, Colin O’Halloran

University of Saarland (D)

Birgit Pfitzmann

LAAS-CNRS, Toulouse (F)

Yves Deswarte, David Powell

IBM Research, Zurich (CH)

Marc Dacier, Michael Waidner

  • c. 55 man-years, EU funding c. 2.5M€
  • Jan. 2000 -> Dec. 2002

Industrial Advisory Board

Andrew Izon (North Durham NHS Trust, GB) Jean-Claude Lebraud (Rockwell-Collins, F) Derek Long (CISA Ltd., GB) Joachim Posegga (SAP Systems, D) Carlos Quintas (Easyphone, P) Gilles Trouessin (Ernst & Young Audit, F) Gritta Wolf (Credit Suisse, CH)

slide-2
SLIDE 2

Objectives

Architectural framework and conceptual model (WP1) Mechanisms and protocols:

  • dependable middleware (WP2)
  • large scale intrusion detection systems (WP3)
  • dependable trusted third parties (WP4)
  • distributed authorization mechanisms (WP5)

Validation and assessment techniques (WP6)

Authorisaton

Contributes to protection:

  • Error detection/confinement
  • Intrusion prevention/confinement

For Internet applications:

  • More flexible than “client-server” paradigm
  • Contributes to privacy:

personal information is disclosed only on a ”need- to-know” basis

Dependability

Trustworthiness of a computer system such that reliance can justifiably be placed on the service it delivers

J.-C. Laprie (Ed.), Dependability: Basic Concepts and Terminology in English, French, German, Italian and Japanese, 265p., ISBN 3-211-82296-8, Springer-Verlag, 1992.

The Dependability Tree

Dependability Fault Prevention Fault Tolerance Fault Removal Fault Forecasting Impairments Attributes Methods Availability Reliability Safety Confidentiality Integrity Maintainability Fault Error Failure Security

slide-3
SLIDE 3

The Dependability Tree

Dependability Fault Prevention Fault Tolerance Fault Removal Fault Forecasting Impairments Attributes Methods Availability Reliability Safety Confidentiality Integrity Maintainability Fault Error Failure

Security

Availability Reliability Safety Confidentiality Integrity Maintainability

w.r.t. author- ized actions

Are these attributes sufficient?

Dependability Fault Prevention Fault Tolerance Fault Removal Fault Forecasting Impairments Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Fault Error Failure Methods

Security Properties

Confidentiality Integrity Auditability Accountability Authenticity Availability Anonymity Secrecy Privacy Non-repudiability Traceability Imputability Opposability Irrefutability Auditability Accountability Authenticity Anonymity Secrecy Privacy Non-repudiability Tracability Imputability Opposability Irrefutability

Security Properties

Confidentiality Integrity Availability Auditability Accountability Authenticity Anonymity Secrecy Privacy Non-repudiability Tracability Imputability Opposability Irrefutability

slide-4
SLIDE 4

Security Properties

Confidentiality Integrity

  • f

Availability

Information Meta-information

  • existence of operation
  • identity of person
  • personal data
  • message content
  • message origin
  • sender, receiver identity

Accountability A+I Anonymity C Privacy C Authenticity I Non-repudiation A+I

The Dependability Tree

Dependability Fault Prevention Fault Tolerance Fault Removal Fault Forecasting Impairments Attributes Methods Availability Reliability Safety Confidentiality Integrity Maintainability Fault Error Failure Security

Fault, Error & Failure

Error Error

Failure Failure

adjuged or hypothesized cause of an error that part of system state which may lead to a failure

Fault

  • ccurs when delivered service deviates from

implementing the system function

H/W fault Bug Attack Intrusion

Internal, dormant fault

Example: Single Event Latchup

SELs (reversible stuck-at faults) may occur because of radiation (e.g., cosmic ray, high energy ions) Satellite on-board computer

Internal, active fault

SEL

Internal, externally-induced fault

Vulnerability Cosmic Ray

External fault

Lack of shielding

slide-5
SLIDE 5

Internal, dormant fault

Intrusions

Intrusions result from (at least partially) successful attacks: Computing System

Internal, active fault

Intrusion

Internal, externally-induced fault

Attack

External fault

Vulnerability

account with default password

Who are the intruders?

1: Outsider 2: User 3: Privileged User

Authentication Authorization Authentication Authorization Authentication Authorization

Insiders or Outsiders ?

01 Informatique 1998

1200 companies in 32 countries 66% experienced fraud in last 12 months

  • 85% by company employees

Computer Crime and Security Survey 2001 (Computer Security Institute and the FBI)

http://www.gocsi.com/prelea_000321.htm 91% of respondent reported employee abuse of Internet (79% in 2000) but decreasing proportion of disgruntled employees: 76% (82% in 2000) 70% cite Internet as a frequent point of attack (59%)

Outsiders vs Insiders

Outsider: not authorized to perform any of specified object-operations Insider: authorized to perform some of specified object-operations

D: an object-

  • peration domain

A: privilege

  • f user a

B: privilege

  • f user b
  • utsider intrusion

(unauthorized increase in privilege) insider intrusion (abuse of privilege)

Outsider: not authorized to perform any of specified object-operations

slide-6
SLIDE 6

The Dependability Tree

Dependability Fault Prevention Fault Tolerance Fault Removal Fault Forecasting Impairments Attributes Methods Availability Reliability Safety Confidentiality Integrity Maintainability Fault Error Failure Security

Fault Tolerance

Error Error

Failure Failure

Fault

Fault Treatment

Diagnosis Isolation Reconfiguration

Fault Treatment Fault Treatment

Diagnosis Diagnosis Isolation Isolation Reconfiguration Reconfiguration

Error Processing Error Processing

Damage assessment Damage assessment Detection & Recovery Detection & Recovery

Backward recovery Forward recovery Compensation-based recovery (fault masking) 4 5 6 7 1 2 3 3 12 13 11 1 2 3 1 2 3 1 2 3 4 5 6 7 4 5 6 7

Error Processing Error Processing (wrt intrusions)

Error (security policy violation) detection

  • + Backward recovery (availability, integrity)
  • + Forward recovery (availability, confidentiality)

Intrusion masking

  • Fragmentation (confidentiality)
  • Redundancy (availability, integrity)
  • Scattering
slide-7
SLIDE 7

Intrusion Masking

Intrusion into a part of the system should give access only to non-significant information

FRS: Fragmentation-Redundancy-Scattering

Fragmentation: split the data into fragments so that isolated fragments contain no significant information: confidentiality Redundancy: add redundancy so that fragment modification or destruction would not impede legitimate access: integrity + availability Scattering: isolate individual fragments

Different kinds of scattering

Space: use different transmission links and different storage sites Time: mix fragments (from the same source, from different sources, with jamming) Frequency: use different carrier frequencies (spread-spectrum) Privilege: require the co-operation of differently privileged entities to realise an operation (separation of duty, secret sharing)

Prototype

. . .

. . . User Sites Storage Sites Security Sites Data Processing Sites Networks Application Windows Application Fragment File Fragment Key Shadows Smartcard

[Blain & Deswarte 1994] [Fraga & Powell 1985] [Fray et al. 1986] [Deswarte et al. 1991] [Fabre et al. 1994]

FRSed File Server

File Scattering Fragments Replication Fragmentation

User Site Multicast Network Storage Sites

slide-8
SLIDE 8

File Fragmentation

Padding P1 P2 P3 P4 File Pages Pagination Ciphered Page Fragments Enciphering Distribution Key nonce sign. P1

Fragment name := OWHF(file name, page #, frgt #,key)

FRSed Security Management

  • No single trusted site or administrator
  • Global trust in a majority of security sites

(and administrators)

Server Security Server SERVERS Server Server

  • 1. Authentication

& access requests

  • 2. Tickets
  • 3. Access
  • 2. Tickets

Security Site Security Site Security Site

Authentication

  • 2. Local

Authentication

CP8

Security Site Security Site Security Site

  • 1. Smartcard

Activation

  • 3. Global

Decision

  • 4. Session key

distribution

Authorization

Security Server

Secured Servers

  • 1. Request

to open a session Security Site

  • 3. tickets

Security Site Security Site

  • 2. Global

Decision

  • 4. direct access

Fi l e name AC L Ke y sha d

  • w
slide-9
SLIDE 9

Fragemented Data Processing

. . . . . . . . . . . . . . . D 2 D 1 D 3 C 2 C 1 C 3

Scattering

D :Data C : Code D 2 D 1 D 3 C 2 C 1 C 3 C D

F

Fragmentation Replication

Dl3 ? ? Cl3 ? ? Cl Dl Site l D 2 D 1 D 3 C 2 C 1 C 3 C D Dk1 Dk2 ? Ck1 Ck2 ? Ck Dk Site k Dj1 ? ? Cj1 ? ? C j D j Site j Di3 Di2 ? Ci3 Ci2 ? C i D i Site i

R D

Fault Tolerance

Error Error

Failure Failure

Fault

Fault Treatment

Diagnosis Isolation Reconfiguration

Fault Treatment Fault Treatment

Diagnosis Diagnosis Isolation Isolation Reconfiguration Reconfiguration

Error Processing Error Processing

Damage assessment Damage assessment Detection & Recovery Detection & Recovery

Fault Treatment

Diagnosis

  • determine cause of error, i.e., the fault(s)

localization nature

Isolation

  • prevent new activation

Reconfiguration

  • so that fault-free components can provide an

adequate, although degraded, service

Fault Treatment (wrt intrusions)

Diagnosis

  • Non-malicious or malicious (intrusion)
  • Attack (to allow retaliation)
  • Vulnerability (to allow removal)

Isolation

  • Intrusion (to prevent further penetration)
  • Vulnerability (to prevent further intrusion)

Reconfiguration

  • Contingency plan to degrade/restore service
  • inc. attack retaliation, vulnerability removal
slide-10
SLIDE 10

Fault-tolerance Structuring

administration (sub-)system component or (sub-)system

Error processing Fault treatment masking

a posteriori

error detection service user service user API service exception error reports fault isolation system reconfiguration recovery detection/recovery error detection error detection fault diagnosis (from possible lower level) service exception

Intrusion-tolerance Structuring

security administration (sub-)system component or (sub-)system

Error processing Fault treatment masking (FRS)

a posteriori

error detection intruder alert System security

  • fficer (SSO)

service user service user API service insecurity signal error reports intrusion and vulnerability isolation system reconfiguration (from possible lower level) service insecurity signal error detection IDS sensors recovery detection/recovery error detection error detection intrusion, attack and vulnerability diagnosis

FTI

http://www.research.ec.org/maftia/

Authorisation

References

  • Avizienis, A., Laprie, J.-C., Randell, B. (2001). Fundamental Concepts of Dependability, LAAS Report N°01145, April

2001, 19 p.

  • Blain, L. and Deswarte, Y. (1994). A Smartcard Fault-Tolerant Authentication Server, in 1st Smart Card Research and

Advanced Application Conference (CARDIS'94), Lille, France, pp.149-165.

  • Deswarte, Y., Blain, L. and Fabre, J.-C. (1991). Intrusion Tolerance in Distributed Systems, in IEEE Symp. on Research in

Security and Privacy, Oakland, CA, USA, pp.110-121.

  • Deswarte, Y., Fabre, J.-C., Laprie, J.-C. and Powell, D. (1986). A Saturation Network to Tolerate Faults and Intrusions, in

5th Symp. on Reliability of Distributed Software and Database Systems (SRDS-5), Los Angeles, CA, USA, pp.74-81, IEEE Computer Society Press.

  • Dobson, J. E. and Randell, B. (1986). Building Reliable Secure Systems out of Unreliable Insecure Components, in IEEE
  • Symp. on Security and Privacy, Oakland, CA, USA, pp.187-193.
  • Fabre, J.-C., Deswarte, Y. and Randell, B. (1994). Designing Secure and Reliable Applications using FRS: an Object-

Oriented Approach, in 1st European Dependable Computing Conference (EDCC-1), Berlin, Germany LNCS 852, pp.21- 38.

  • Fraga, J. and Powell, D. (1985). A Fault and Intrusion-Tolerant File System, in IFIP 3rd Int. Conf. on Computer Security

(IFIP/Sec’85), (J. B. Grimson and H.-J. Kugler, Eds.), Dublin, Ireland, Computer Security, pp.203-218.

  • Fray, J.-M., Deswarte, Y. and Powell, D. (1986). Intrusion-Tolerance using Fine-Grain Fragmentation-Scattering, in IEEE
  • Symp. on Security and Privacy, Oakland, CA, USA, pp.194-201.
  • Laprie, J.-C. (1985). Dependable Computing and Fault Tolerance: Concepts and Terminology, in 15th Int. Symp. on Fault

Tolerant Computing (FTCS-15), Ann Arbor, MI, USA, IEEE, pp.2-11.

  • J.-C. Laprie (Ed.), Dependability: Basic Concepts and Terminology in English, French, German, Italian and Japanese,

265p., ISBN 3-211-82296-8, Springer-Verlag, 1992.

  • D. Powell, A. Adelsbasch, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B.

Randell, R. Stroud, P. Veríssimo, M. Waidner. MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications), Sup. of the 2001 International Conference on Dependable Systems and Networks (DSN2001), Göteborg (Suède), 1-4 juillet 2001, IEEE, pp. D-32-D-35.

slide-11
SLIDE 11