Outsourcing Mobile Security in the Cloud Gatan Hurel - - PowerPoint PPT Presentation

outsourcing mobile security in the cloud
SMART_READER_LITE
LIVE PREVIEW

Outsourcing Mobile Security in the Cloud Gatan Hurel - - PowerPoint PPT Presentation

Outsourcing Mobile Security in the Cloud Gatan Hurel <gaetan.hurel@inria.fr> Rmi Badonnel <remi.badonnel@loria.fr> Abdelkader Lahmadi <abdelkader.lahmadi@loria.fr> Olivier Festor <olivier.festor@inria.fr> Gatan Hurel


slide-1
SLIDE 1

Outsourcing Mobile Security in the Cloud

Gaëtan Hurel <gaetan.hurel@inria.fr> Rémi Badonnel <remi.badonnel@loria.fr> Abdelkader Lahmadi <abdelkader.lahmadi@loria.fr> Olivier Festor <olivier.festor@inria.fr>

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 1 / 20

slide-2
SLIDE 2

Plan

Introduction Related work Mobile Security as a Service Preliminary results Conclusions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 2 / 20

slide-3
SLIDE 3

Context

Ubiquity of mobile devices

– large-scale deployment – mainly smartphones and tablets

source: IDC analytics 2013

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 3 / 20

slide-4
SLIDE 4

Context

Ubiquity of mobile devices

– large-scale deployment – mainly smartphones and tablets

source: IDC analytics 2013

Mobile malware increase

– devices carry sensitive and valuable information – numerous attacks & infection vectors

source: Juniper mobile threat report 2013

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 3 / 20

slide-5
SLIDE 5

Traditional mobile security

On-device approaches:

– dedicated applications installed on the smartphones – security checks mainly based on devices’ resources

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 4 / 20

slide-6
SLIDE 6

Traditional mobile security

On-device approaches:

– dedicated applications installed on the smartphones – security checks mainly based on devices’ resources

Limits of on-device security approaches

– resource consumption – installation, configuration & maintenance – users’ awareness and involvement

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 4 / 20

slide-7
SLIDE 7

Traditional mobile security

On-device approaches:

– dedicated applications installed on the smartphones – security checks mainly based on devices’ resources

Limits of on-device security approaches

– resource consumption – installation, configuration & maintenance – users’ awareness and involvement

= ⇒ How to efficiently provide security for mobile devices using cloud-based mechanisms?

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 4 / 20

slide-8
SLIDE 8

Plan

Introduction Related work Mobile Security as a Service Preliminary results Conclusions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 5 / 20

slide-9
SLIDE 9

Virtualization and cloning methods

Virtual replicas of real devices [1]

– execution traces and traffic mirroring from real devices – real devices’ activity replayed on replicas – detecting threats on replicas, applying protections on devices

Virtual mobile instances (VMI) [2]

– with larger resources to host complex applications – accessed by real devices to execute those applications – dedicated monitoring subsystem to detect anomalies within VMIs

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 6 / 20

slide-10
SLIDE 10

Mobile security functions outsourcing

Pure cloud-based outsourcing

– e.g. application firewall [3], antivirus [4]

SDN-based outsourcing [5]

– leverages network controller’s global view – security checks transparently applied on traffic

NFV-based outsourcing [6]

– dynamic deployment of middleboxes in the cloud using virtualization – not dedicated to mobile security, but shows the potentiality of the cloud

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 7 / 20

slide-11
SLIDE 11

Motivation Limitations of current cloud-based approaches:

– focus on specific instance(s) of the whole security threats set – lack of flexibility and contextualization regarding how and when to use them

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 8 / 20

slide-12
SLIDE 12

Motivation Limitations of current cloud-based approaches:

– focus on specific instance(s) of the whole security threats set – lack of flexibility and contextualization regarding how and when to use them

Security threats may vary depending on context:

– time and space (e.g. malware trends, attached network) – applications (e.g. gaming, banking) – remote destinations (e.g. unknown/well-known server)

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 8 / 20

slide-13
SLIDE 13

Motivation Limitations of current cloud-based approaches:

– focus on specific instance(s) of the whole security threats set – lack of flexibility and contextualization regarding how and when to use them

Security threats may vary depending on context:

– time and space (e.g. malware trends, attached network) – applications (e.g. gaming, banking) – remote destinations (e.g. unknown/well-known server) – ...

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 8 / 20

slide-14
SLIDE 14

Plan

Introduction Related work Mobile Security as a Service Preliminary results Conclusions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 9 / 20

slide-15
SLIDE 15

Proposed approach

Dynamic composition of mobile security functions in the cloud:

– outsource mobile security functions in the cloud – dynamically select and activate security functions – transparently link and instantiate compositions of security functions

Main enablers:

– Network Function Virtualization (NFV) – Software-Defined Networking (SDN/Openflow)

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 10 / 20

slide-16
SLIDE 16

Our cloud-based mobile security architecture

A new cloud-based architecture to:

– host a large set of mobile security functions – build and deploy tailored security compositions depending on context and risks

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 11 / 20

slide-17
SLIDE 17

Key entities

Involves three entities:

– the mobile device with running applications and a virtual OpenFlow-based switch – the security manager - in cloud infrastructure - to manage outsourced security functions – the remote dest. interacting with the mobile device

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 12 / 20

slide-18
SLIDE 18

Main idea

An application wants to communicate with a (new) dest. :

  • 1. the switch probes the OpenFlow controller
  • 2. the security manager possibly activates new security functions
  • 3. the controller links those functions and build a tailored composition
  • 4. the controller notifies the switch of the resulting composition
  • 5. the switch makes traffic pass through the security composition

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 13 / 20

slide-19
SLIDE 19

Plan

Introduction Related work Mobile Security as a Service Preliminary results Conclusions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 14 / 20

slide-20
SLIDE 20

Our first outsourced security function

Implementation of a configuration checker for mobile devices [7].

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 15 / 20

slide-21
SLIDE 21

Our first outsourced security function - cont’d

Outsourced configuration checker:

– based on the OVAL standard – remotely checks configuration of mobile devices – detects vulnerable states – implements a probabilistic model to efficiently schedule assessments

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 16 / 20

slide-22
SLIDE 22

Our first outsourced security function - cont’d

Outsourced configuration checker:

– based on the OVAL standard – remotely checks configuration of mobile devices – detects vulnerable states – implements a probabilistic model to efficiently schedule assessments

− → Collected information about vulnerable configurations can be exploited by the security manager

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 16 / 20

slide-23
SLIDE 23

Plan

Introduction Related work Mobile Security as a Service Preliminary results Conclusions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 17 / 20

slide-24
SLIDE 24

Summary

Mobile security is a critical issue

– mobile devices largely deployed – numerous privacy and security issues – on-device security approaches limits

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 18 / 20

slide-25
SLIDE 25

Summary

Mobile security is a critical issue

– mobile devices largely deployed – numerous privacy and security issues – on-device security approaches limits

Cloud + NFV + SDN = efficient mobsec outsourcing

– reduction of devices’ resources usage – dynamic security depending on context and risks – transparent deployment from an end-user view

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 18 / 20

slide-26
SLIDE 26

Future work

Mathematical modeling:

– investigate compositions mechanisms – determination of cost (resources), quality and complexity of compositions – tradeoffs between on-device and in-cloud security functions

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 19 / 20

slide-27
SLIDE 27

Future work

Mathematical modeling:

– investigate compositions mechanisms – determination of cost (resources), quality and complexity of compositions – tradeoffs between on-device and in-cloud security functions

Prototyping and evaluation:

– OpenVSwitch deployed on Samsung Galaxy S4 – experiments with the Mininet simulator – later: Openstack & NFV integration

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 19 / 20

slide-28
SLIDE 28

Bibliography

[1] Portokalidis et al. Paranoid Android: Versatile Protection for Smartphones. Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC’10) [2] Kim et al. Monitoring and Detecting Abnormal Behavior in Mobile Cloud

  • Infrastructure. Proceedings of the 12th IEEE/IFIP Network Operations and

Management Symposium (NOMS’12) [3] Kilinc et al. WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) [4] Oberheide et al. Virtualized In-Cloud Security Services for Mobile Devices. Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt’08) [5] Jin et al. Malware Detection for Mobile Devices Using Software-Defined

  • Networking. Proceedings of the 2nd GENI Research and Educational Experiment

Workshop (GREE 2013) [6] Sherry et al. Making Middleboxes Someone else’s Problem: Network Processing As a Cloud Service. Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication [7] Barrere et al. A Probabilistic Cost-efficient Approach for Mobile Security

  • Assessment. Proceedings of the 9th IFIP/IEEE International Conference on

Network and Service Management (CNSM’13)

Gaëtan Hurel INRIA NGE, FP7 Flamingo project Outsourcing Mobile Security in the Cloud 20 / 20