Ongoing Cyber Security Projects
NSF Industry/University Cooperative Research (I/UCRC) Program
Ongoing Cyber Security Projects Salim Hariri, Director The - - PowerPoint PPT Presentation
NSF Industry/University Cooperative Research (I/UCRC) Program Ongoing Cyber Security Projects Salim Hariri, Director The University of Arizona nsfcac.arizona.edu email: hariri@ece.arizona.edu (520) 977-7954 NSF IUCRC in US 2 75+ IUCRC
NSF Industry/University Cooperative Research (I/UCRC) Program
2
Advanced Electronics and Photonics (7 centers) Advanced Manufacturing 6 Advanced Materials 11 Biotechnology 6 Civil Infrastructure Systems 1 Energy and Environment 12 Health and Safety 6 IT, Communication, and Computing 24 (CAC) + CAC@Mexico System Design and Simulation 3
75+ IUCRC Centers 225 University sites, 876 Industry/government members
3
4
Hidden Iframes
– <iframe src="http://www.MaliciousWebsite.com" width="1" height="1"> </iframe>
– <a href=”http://www.maliciousSite.com”?>Wonderful Website</a>
Malicious Scripts
» Reading files from local drive » Fill up a local drive » Access or replace files on the local machine » Launch an application » If the browser will allow it, JavaScript can look at browser history or cookies. » Exploit bugs in a browser
Iframe model
– Hidden or misplaced Iframes – Iframes can be larger than normal to contain a malicious replication of a legitimate webpage
This is a non-malicious HTML file that is properly formatted.
This file contains a malicious obfuscated JavaScript. Obfuscation is the deliberate act of encoding the text to make if difficult for humans to understand. It doesn’t have to be malicious, but this
14
15
AMAP Prototype Dashboard: This dashboard has 6 tabs. The Input File tab is used to input files into the system for both training and analysis, the Anomaly Structure Analysis tab is used to request and see the results of structural behavior analysis for files, the Anomaly Dynamic Analysis tab is used to request and see the results of dynamic behavior analysis for files, the Signature-Based Analysis tab is used to request and see the results of signature- based analysis for files, the Training tab is used to start, stop and see training status of the system and the Settings tab contains additional settings to fine tune the system.
16
Input File Tab: This tab is used to input files into the system for both training and
retrieved by the system from a specified URL.
17
AMAP Analysis Results Page: This page shows the results of an analysis performed by AMAP. In this specific instance it’s the results of structural analysis. AMAP will report statistics about the analysis performed, the specific files that were detected as abnormal/malicious, detection reason and recommended action for each.
18 The AMAP prototype web interface is highly responsive and can be used on any device including mobile phones.
19
Application: Program + DATA Virtual OS: Embedded Observer Agents Innate Immunity & Surveillance Layer Hardware OS + TPM checks AppFlow Adaptive Immunity & Control Layer Optimizing & Learning Immunity D-Agent
B-Cell T-Helper Cell Memory Cell Killer T-Cell Dendritic cell 1. 2.
Layered Self Protection Engine (SPE) Layered Computing Stack
Innate Surveillance Self Protection Agents (SPAs)
CONTROLLER knowle dge OBSERVER
Self Recognition Agents (SRAs)
SRA (Users) SRA (apps) SRA (server) SRA (protocol) SRA (device)
Users Apps Protocols Devices Servers Users Apps Protocols Devices Servers
Action 1 Action m Action 1 Action m Action 1 Action m Action 1 Action m Action 1 Action m
21
Self Recognition Flows (SRFs)
22
AIM SDN Controller OF Switch
Resilient Communication Anomaly Behavior Analysis (ABA Network Model Monitoring Service Resilient Computation
Wired/Wireless Network (Radio, Cellular, WiFi, Internet) OF Switch
Command and Control Center
Resilient Servers
OF Switch
ARMY SBIR Phase I: (Sept. 2016- March 2017) – Resilient Middleware Services for Cyber Physical Systems (RMS) Phase I ($150,000), Phase II ($750,000 Pending)
Anomaly Sensors
Packet Sensor Aflow Sensor
Analyzers
MAC BAU Network BAU Transport BAU DNS BAU HTTP BAU ModBus BAU
Group Policy 1 Group Policy 2 Group Policy N
Policy 1 Action M1 Action N1 Policy 2 Action M2 Action N2 Policy 3 Action M3 Action N3 Policy Y Action MY Action NY Policy X Action MX Action NX Policy Z Action MZ Action NZ
Anomaly Behavior Analysis Units (BAUs)
DFARS – Defense Federal Acquisition Regulation Supplement
– DoD-specific acquisition regulations
December 30, 2015, the U.S. Department of Defense (DoD) published a three-page interim rule:
– Implement all of the requirements of NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. – Deadline is December 31, 2017.
[https://www.gpo.gov/fdsys/pkg/FR-2015-12-30/pdf/2015-32869.pdf]
Supply chain security management techniques are
– Manual and labor intensive, – Not flexible to handle the complexity, dynamism, and heterogeneity – Infeasible to create a secure organization boundary
Goal: Autonomic security compliance
United States Government Configuration Baseline (USGCB) to create security configuration baselines for IT products
– Provides guidance to agencies on what should be done to improve and maintain effective configuration settings focusing primarily on security
Examples based on USGCB-Windows-Setting.xls (under Computer Configuration\Administrative Templates for Win):
– Turn Off Microsoft Peer-to-Peer Networking Services à To prevent users from utilizing the P2P features included with Windows. – Minimum password length (12 chars) à To make brute force password guessing attacks more difficult. – Network security: Force logoff when logon hours expire à To prevent users from remaining connected after their logon hours have expired. – Inbound connections (Block) à To minimize the risk of exploiting a vulnerable application with an inbound network port.
[https://usgcb.nist.gov/usgcb_faq.html]
Autonomic Security Compliance Engine
Supply Chain 1
The security control requirements
Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
NIST SP 800-171
Supply Chain 2
Physical Resource Operating System VM-1 Apps vResource Hypervisor VM-N Apps vResource
Server Systems Devices
NIST SP 800-171
1. Access Control 2. Awareness and Training 3. Audit and Accountability 4.
5. Identification and Authentication 6. Incident Response 7. Maintenance 8. Media Protection 9. Personnel Security
Protection
United States Government
chars) à To make brute force password guessing attacks more difficult.
when logon hours expire à To prevent users from remaining connected after their logon hours have expired.
à To minimize the risk of exploiting a vulnerable application with an inbound network port.
Metric (0-1) Report 3.1 Access Control 0.45 Security controls do not pass ý 3.1.8 Limit unsuccessful logon attempts. Failed the tests þ 3.1.9 Provide privacy and security notices consistent with applicable CUI rules. 0.9 90% of the security tests passed þ 3.2 Awareness and Training 1 PASS 3.3 Audit and Accountability 0.6 Not all the security controls are effectively applied ý 3.3.4 Alert in the event of an audit process failure. 0.3 The tests failed mostly ý 3.4 Configuration Management 0.55 The tests failed ý 3.5 Identification and Authentication 1 PASS þ 3.6 Incident Response 0.9 PASS ý 3.7 Maintenance 1 PASS þ 3.8 Media Protection 1 PASS ý 3.9 Personnel Security 0.4 More work is needed þ 3.10 Physical Protection 1 PASS þ 3.11 Risk Assessment 1 PASS þ 3.12 Security Assessment 1 PASS 3.13 System and Comm. Protection 0.7 Not all the security controls are effectively applied ý 3.13.6 Deny network communications traffic by default and allow network communications traffic by exception (i.e. deny all, permit by exception). 0.2 Failed the tests þ 3.14 System & Info. Integrity 0.95 PASS NIST SP 800-171 Security Control
Company Policy Compliance Program Configuration Report Critical Issues Compliance Report Action
30
Guidelines to protect Controlled Unclassified Information (CUI) in nonfederal information systems and organizations 14 security categories
10.Physical Protection 11.Risk Assessment 12.Security Assessment 13.System and Communications Protection 14.System and Information Integrity
3.1.11 – Terminate (automatically) a user session after a defined condition.
– Script name: check_created_accounts_SP800_171_3.1.11 – Checks the created accounts – Uses a given argument to detect if there is any unauthorized created accounts; if yes, gives critical warning (error) – It can also include a list of service accounts
3.1.12 – Monitor and control remote access sessions.
– Script name: check_current_users_SP800_171_3.1.12 – Monitors the currently active users – It evaluates the currently active user number based on a threshold – It uses a given list to check if there is any unauthorized active users
3.1.8 – Limit unsuccessful logon attempts.
– Script name: check_login_attempts_SP800_171_3.1.8 – Checks the auth.log to see if the number of unsuccessful attempts are beyond a limit
3.1.8 – Limit unsuccessful logon attempts.
– Script name: check_ssh_login_attempt_limit_SP800_171_3.1.8 – Checks the SSH configuration to see the current setting if there is any limitation for login attempts – It also checks if the found login attempts is below the threshold or not.
3.1.6 – Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
– Script name: check_open_ports_SP800_171_3.13.6 – Checks the open ports – It uses a given authorized port list to compare the ports – If there are any unauthorized ports, it gives a critical error to the admin.
Smart Services Smart Government Smart Healthcare Smart Grid Smart Homes Smart Auto Services Smart Critical Infrastructure Command/Cont rol Center
Data Command
Smart Building
45
IP Fluxing Resilient Communication System (RCS) Resilient Server
Resilient Command and Control System (RCCS)
Engineering workstation Database Server
HM I
Data Acquisition Server Historian Reports
Actuators/Effe ctors Sensors Physical System IP Fluxing
47
49
50
Input Output Resilient Algorithm Autonomic Management
Resilient Server
VM App 1 Primary: Version 1 Secondary: Version 2
Smart City Applications
VM App 2 Primary: Version 1 Secondary: Version 2
Application Repository
App 1 Version 1, 2, .. App n Version 1, 2, ..
VM Image Repository
VM Type 1 2, .. VM Type n
Configuration Engine Diversity Level Redundancy Level Shuffling Rate
Resilient Computations/Applications
52
Application Execution Env. 1
VM3 (V6) VM2 (V4) VM1 (V1)
Applications/Resources
Application Repository VM Images Repository
Diversit y Level
Resilient Cloud Middleware
Configuration Engine
Redunda ncy Level Shuffling Rate
Observer Analyzer
Application Supervisor
Application Resilient Editor User’s Application
Application Execution Env. 2
VM3 (V5) VM2 (V7) VM1 (V2)
Application Execution Env.n
VM3 (V2) VM2 (V4) VM1 (V3)
Controller Supervisor 1 Physical Node 1 Master 1 Worker 2 [V7] Worker 1 [V4] Worker 3 [V2] Supervisor 3 Physical Node 3 Master 3 Worker 8 [V5] Worker 7 [V3] Worker 9 [V8] Supervisor 2 Physical Node 2 Master 2 Worker 5 [V1] Worker 4 [V9] Worker 6 [V6] Data store for VM images Invoking Virtual Machins Check Pointing Supervisor Selection Worker Selection
services using DDDAS and moving target defence”, IJCC 2(2/3): 171-190, 2013
55
AIM SDN Controller
OF Switch
Resilient Communication Anomaly Behavior Analysis (ABA Network Model Monitoring Service Resilient Computation
Wired/Wireless Network (Radio, Cellular, WiFi, Internet) OF Switch
Command and Control Center
Resilient Servers
OF Switch
Tactical Operation Center
MTD Node Transmitter Module Receiver Module Modulation- BPSK
Frequency- 1 Ghz Packet size - 30 B Modulation- MSK Frequency -2 Ghz Packet size – 15B Modulation- QAM
F r e q u e n c y
. 5 G h z P a c k e t s i z e
5 B Modulation-QPSK Frequency- 2 Ghz
Packet size- 20
Modulation- BPSK
Frequency- 1 Ghz Packet size - 30 B
Modulation- MSK Frequency -2 Ghz Packet size – 15B
Modulation- QAM
F r e q u e n c y
. 5 G h z P a c k e t s i z e
5 B Modulation- MSK Frequency -2 Ghz Packet size – 15B
MTD Node Logical Link
Legend
Active Stand by Attacked
Link 1 L i n k 2 Link 4 L i n k 3
57
WiFi Cellular Cellular WiFi
Normal Behavior with no attack
Radio Radio Radio Cellular WiFi WiFi Radio Cellular
Primary link Secondary link Attacked link Time Normal Behavior with attack
59
60
XSS Exp. VMs DNS Attack Exp. VMs DDOS Exp. VMs Buffer Overflow Exp. VMs
61
62
Internet
64
65