Performance and Security Tradeoff Katinka Wolter Bertinoro, June - - PowerPoint PPT Presentation

performance and security tradeoff
SMART_READER_LITE
LIVE PREVIEW

Performance and Security Tradeoff Katinka Wolter Bertinoro, June - - PowerPoint PPT Presentation

Performance and Security Tradeoff Katinka Wolter Bertinoro, June 26, 2010 Table of Contents Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems


slide-1
SLIDE 1

Performance and Security Tradeoff

Katinka Wolter Bertinoro, June 26, 2010

slide-2
SLIDE 2

Table of Contents

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 2

slide-3
SLIDE 3

motivation

◮ what does the performance security tradeoff mean? ◮ we need to measure performance ◮ we need to measure security ◮ what are the costs of performance? ◮ what are the costs of security? ◮ can we trade one against the other?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 3

slide-4
SLIDE 4

performance classical metrics

◮ throughput ◮ response time, completion time

evaluation tools

◮ CTMC ◮ queueing model ◮ GSPN, SRN, PEPA

measures

◮ accumulated reward ◮ expected reward ◮ moments of reward ◮ time to absorption

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 4

slide-5
SLIDE 5

Performance versus Security Quantification

◮ performance can be measured, quantified ◮ cost of performance can be quantified ◮ can we measure security? ◮ can we determine the cost of security? ◮ ultimately cost in terms of performance

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 5

slide-6
SLIDE 6

Security Cost

It cost British Columbians almost $15 million a day to ensure a peaceful Olympics. Members of the Vancouver 2010 Olympic Games Integrated Security Unit

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 6

slide-7
SLIDE 7

Information Week April 2007

◮ Forrester Research survey of 28

companies

◮ Security Breaches Cost $90 To $305 Per

Lost Record

◮ 25% respondants do not know how to

quantify loss

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 7

slide-8
SLIDE 8

security cost Google

Gmail now can be set to encrypt communications between a browser and Google’s servers by default, an option that makes the e-mail service harder to snoop on but also potentially slower.

Google mail

Your computer has to do extra work to decrypt all that data, and encrypted data doesn’t travel across the Internet as efficiently as unencrypted data, that’s why we leave the choice up to you.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 8

slide-9
SLIDE 9

IBM slogans IBM Security Solutions

Manage Risk. Reduce Costs. Enable Innovation.

IBM Virtualisation

Virtualisation Security Solutions from IBM Internet Security SystemsTM Manage the risks of virtualisations and realise the cost savings.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 9

slide-10
SLIDE 10

IBM security IBM cloud computing security

IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM’s capabilities empower you to dynamically monitor and quantify security risks, enabling you to better:

◮ understand threats and vulnerabilities in terms of business impact, ◮ respond to security events with security controls that optimize

business results,

◮ prioritize and balance your security investments.

IBM Security Solutions for Data Centers

Your company can build a secure, dynamic information infrastructure that helps you accelerate innovation while reducing cost and complexity of security.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 10

slide-11
SLIDE 11

energy costs IT costs

◮ total energy costs of FUB 10 M Euro ◮ electricity

50%

◮ power consumption of FUB’s central IT services ◮ how much redundancy, security is necessary?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 11

slide-12
SLIDE 12

security concerns are not new Problems

◮ cost of security incident unknown ◮ incidents may not be detected ◮ information security aims to get close to theoretical max. without

knowing the cost.

◮ security risks may have very low probability. Don’t invest close to

potential damage to prevent, but detect.

Source: A Structured Ap- proach to Computer Security,

  • T. Olovsson (1992)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 12

slide-13
SLIDE 13

Information Security

CIA Properties

◮ Confidentiality

(information is not passed to unauthorised parties, defense)

◮ Integrity

(information is not modified by unauthorised parties, banking)

◮ Availability

(information is at disposition, telephone)

◮ (non-repudiation)

sender and receiver are authentic

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 13

slide-14
SLIDE 14

security versus dependability analogies

◮ error, fault, failure in dependability ◮ vulnerability, security fault (Trojan hoarse), security failure ◮ failures can be modelled as random processes

differences

◮ accidental problems in dependability ◮ intentional problems in security ◮ attacker accumulates reward ◮ redundancy is helpful in dependability, detrimental for security

references

◮ Littlewood, Brocklehurst, Fenton, Mellor, Page, Wright (1993) ◮ Littlewood, Strigini (2004), Nicol, Sanders, Trivedi (2004)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 14

slide-15
SLIDE 15

weak hypothesis survey of security quantification

◮ Verendel 2009: survey of 90 papers between 1981 and 2008. ◮ includes hardly model-based analysis ◮ it is unclear whether the methods applied are appropriate ◮ quantitative analysis needs large numbers of results ◮ solid, empirical data is necessary, hence

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 15

slide-16
SLIDE 16

weak hypothesis survey of security quantification

◮ Verendel 2009: survey of 90 papers between 1981 and 2008. ◮ includes hardly model-based analysis ◮ it is unclear whether the methods applied are appropriate ◮ quantitative analysis needs large numbers of results ◮ solid, empirical data is necessary, hence ◮ Quantified Security is a Weak Hypothesis

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 15

slide-17
SLIDE 17

security engineering prevention

protect data and communication to avoid security breaches

diagnosis/detection

identify whether and when a security incident has happened

response

stop attack from causing further damage

recovery

recover from security breach, rekey, use backup data

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 16

slide-18
SLIDE 18

security metrics

metrics for security in analogy with dependability metrics

t t1 t2 td1 td2 tr1 tr2 TBI TTID TTIR TBDR

◮ TBI: Time Between Incidents ◮ TTID: Time To Incident Discovery ◮ TTIR: Time To Incident Recovery ◮ TBDR: Time Between Detection and Recovery

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 17

slide-19
SLIDE 19

simple Markovian security model parameterise using

◮ inverse of MTBSI as rate of the fail transition ◮ inverse of MTTID as rate of the detect transition ◮ inverse of MTBDR as rate of the recover transition.

The states relate to prevention, diagnosis, recovery. Open question: how do we know the rates?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 18

slide-20
SLIDE 20

Performance Cost of Encryption

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 19

slide-21
SLIDE 21

performance cost of encryption experiments

◮ experimental study, no model ◮ investigation of different algorithms for symmetric and asymmetric

encryption

◮ investigation of different implementations ◮ encryption of 1,137 byte plaintext file ◮ keylength: DES 56bit, DESede (Triple DES) 112, Skipjack 80, 128 all

  • thers

◮ results for symmetric and asymmetric algorithms include key

generation, algorithm initialization and message encryption times

  • C. Lamprecht, A. van Moorsel, P. Tomlinson, and N. Thomas. Investigating the

efficiency of cryptographic algorithms in online transactions. International Journal

  • f Simulation: Systems, Science & Technology, 7(2):63–75, 2006.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 20

slide-22
SLIDE 22

performance of Sun JCE implementation

◮ encryption times range between 85ms and 180ms ◮ triple DES (DESede) hardly slower than DES

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 21

slide-23
SLIDE 23

performance of Java Cryptix implementation

◮ encryption times range between 15ms and 50ms ◮ AES = Rijndael hardly slower than DES ◮ triple DES (DESede) slightly slower than DES

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 22

slide-24
SLIDE 24

conclusions for symmetric encryption performance versus security

◮ IDEA and Cryptix implementation seem to be best ◮ security measured in key length ⇒ DES and Skypjack less secure ◮ security and cost do not correlate ◮ implementation matters

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 23

slide-25
SLIDE 25

asymmetric encryption public key cryptography

◮ encrypt with destinations public key ◮ receiver decrypts with private key ◮ avoids problem of secure key transmission ◮ security increases with key length ◮ current security standard RSA-1024 ◮ measurement of key generation and encryption time

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 24

slide-26
SLIDE 26

speed of public key encryption

◮ DSA only provides non-repudiation, no data confidentiality ◮ Diffie-Hellman 1024 is omitted for clarity

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 25

slide-27
SLIDE 27

message digest

Cost of different algorithms to produce a message digest

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 26

slide-28
SLIDE 28

summary encryption cost symmetric encryption

IDEA is fastest

asymmetric encryption

best were: RSA-1024 for public key encryption SHA-256 for hashing (producing a digest)

performance security tradeoff

There is no indication that the recommendations provide a good tradeoff

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 27

slide-29
SLIDE 29

Performance Evaluation of a Key Distribution Centre

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 28

slide-30
SLIDE 30

Performance Evaluation of a Key Distribution Centre (Zhao, Thomas) performance of authentication algorithm

◮ key distribution for secure access to resources ◮ key distribution for secure communication ◮ stochastic process algebra model for the Needham-Schroeder protocol

(Kerberos) from [Zhao&Thomas09] questions

  • 1. how many clients can a given KDC configuration support?
  • 2. how much service capacity must we provide at a KDC to satisfy a

given number of clients?

  • 3. how long can a key be used before it is insecure?
  • Y. Zhao and N. Thomas, Efficient solutions of a PEPA model of a key distribution

centre, Performance Evaluation, 67(2010), pp. 740–756

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 29

slide-31
SLIDE 31

2.Performance-Evaluation of a Key-Distribution Centre (Zhao, Thomas)

  • 1. Alice −

→ KDC : A, B, N1

  • 2. KDC −

→ Alice : {KS, A, B, N1, {KS, IDA}KB}KA

  • 3. Alice −

→ Bob : {KS, IDA}KB

  • 4. Bob −

→ Alice : {N2}KS

  • 5. Alice −

→ Bob : {f (N2)}KS

◮ N1 and N2 are nonces (random items

  • f data).

◮ IDA is a unique identifier for Alice. ◮ f (N) is a predefined function applied

to the nonce N.

❄ ☞ ✎ ✛ ❙ ❙ ❙ ❙ ✇ ❙ ❙ ❙ ❙ ♦ ✲

Alice Bob KDC 1 2 3 5 4

◮ Alice and KDC share a key

KA

◮ Bob and KDC share a key

KB

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 30

slide-32
SLIDE 32

scalability

❄ ✻

Alice1 Bob1

✛ ✠ ✟ ❄ ✻

Alice2 Bob2

✛ ✠ ✟ ❄ ✻

AliceN BobN

✛ ✠ ✟ ✚ ✚ ✚ ✚ ✚ ❂ ✚✚✚✚✚ ❃ ✡ ✡ ✡ ✡ ✢✡ ✡ ✡ ✡ ✣ ❙ ❙ ❙ ❙ ✇ ❙ ❙ ❙ ❙ ♦

KDC

does it scale

modelling N pairs of Alice and Bob

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 31

slide-33
SLIDE 33

PEPA model

For N = 1 KDC

def

= (request, ⊤).(response, rp).KDC Alice

def

= (request, rq).(response, ⊤).Alice′ Alice′

def

= (sendBob, rB).(sendAlice, ⊤).(confirm, rc).Alice′′ Alice′′

def

= (usekey, ru).Alice Bob

def

= (sendBob, ⊤).(sendAlice, rA).(confirm, ⊤).Bob′ Bob′

def

= (usekey, ⊤).Bob System

def

= KDC ⊲

L Alice ⊲

K Bob

where, L = {request, response}, K = {sendBob, sendAlice, confirm, usekey}.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 32

slide-34
SLIDE 34

server utilisation of key distribution centre

a number of simplifications and approximations lead to results.

  • average utilisation versus the number of client pairs. ru = 1.1,

rA = rB = rc = rq = 1.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 33

slide-35
SLIDE 35

response time of key distribution centre

  • average response time versus the number of client pairs. ru = 1.1,

rA = rB = rc = rq = 1.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 34

slide-36
SLIDE 36

response time of key distribution centre

  • average response time versus the number of client pairs. ru = 1.1,

rA = rB = rc = rq = 1.

  • 1. how many clients can a given KDC configuration support?
  • 2. how much service capacity must we provide at a KDC to satisfy a

given number of clients?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 34

slide-37
SLIDE 37

server utilisation of key distribution centre

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.01 0.02 0.03 0.04 0.05 ru U rp=1 rp=2 rp=3 rp=4 rp=5

average utilisation varied against the rate of session key use, ru. rq = rA = rB = rc = 1, N = 150.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 35

slide-38
SLIDE 38

server response time of key distribution centre

10 20 30 40 50 60 70 80 90 100 110 120 130 0.01 0.02 0.03 0.04 0.05 ru W rp=1 rp=2 rp=3 rp=4 rp=5

average response time varied against the rate of session key use, ru. rq = rA = rB = rc = 1, N = 150.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 36

slide-39
SLIDE 39

server response time of key distribution centre

10 20 30 40 50 60 70 80 90 100 110 120 130 0.01 0.02 0.03 0.04 0.05 ru W rp=1 rp=2 rp=3 rp=4 rp=5

average response time varied against the rate of session key use, ru. rq = rA = rB = rc = 1, N = 150.

  • 3. how long can a key be used before it is insecure?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 36

slide-40
SLIDE 40

Performance evaluation of key distribution centre Summary

◮ utilisation, response time of KDC increase with number of clients ◮ shorter use of session key increases security ◮ shorter use of session key increases utilisation and response time of

KDC but

◮ parameters do not translate to a system ◮ tradeoff between performance and security is not formulated

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 37

slide-41
SLIDE 41

Models for Software-System Security

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 38

slide-42
SLIDE 42

Modelling Intrusion Tolerant Systems security of intrusion tolerant system

◮ abstract model for system security ◮ purpose is to describe and quantify security ◮ compromise of confidentiality ◮ compromise of data integrity ◮ denial of service attacks ◮ description of security state ◮ stochastic process with levels of security

  • B. B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan and K. S. Trivedi. A

Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems, Performance Evaluation (2004), 56, pp. 167–186.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 39

slide-43
SLIDE 43

states of the model good state

preserved through

◮ authentication, access control, encryption ◮ firewalls, proxy servers ◮ strong configuration management, upgrades for known vulnerabilities

vulnerable state

reached through

◮ penetration ◮ exploration phases of an attack.

active attack state

◮ potential damage

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 40

slide-44
SLIDE 44

more states several degraded states

◮ masking through redundancy, backups (MC) ◮ restauration/reconfiguration possible (graceful degradation, GD) to

handle DoS

◮ fail-secure to preserve confidentiality, integrity (FS)

several failed states

◮ intrusion detection fails (undetected compromised state, UC) (false

negative)

◮ fail with alarm (F) (true positive)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 41

slide-45
SLIDE 45

counter measures design and implementation of intrusion tolerant system

◮ error detection ◮ damage assessment ◮ error recovery, updates (redundancy) ◮ fault treatment

recovery states

◮ graceful degradation prevents denial-of-service attack ◮ stop system to protect confidentiality or data integrity

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 42

slide-46
SLIDE 46

state-transition model

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 43

slide-47
SLIDE 47

state-transition model possible outcome of analysis

where should I invest, depending on attack model?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 43

slide-48
SLIDE 48

GSPN model

◮ unavailable in states FS, F, UC, A = 1 − πFS − πF − πUC ◮ for DoS, ADoS = 1 − (πF + πUC) ◮ for MTTSF states UC, GD, FS, F are absorbing states, compute time

to absorption in a DTMC.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 44

slide-49
SLIDE 49

measures considered measures

◮ availability ◮ mean time to security failure (MTTSF)

parameters

◮ mean sojourn times

hg = 1/2, hV = 1/3, hA = 1/4, hMC = 1/4, hUC = 1/2, hTR = 1/6.

◮ pa probability of successful attack from vulnerable state

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 45

slide-50
SLIDE 50

results: availability insights

◮ higher probability of successful attack from vulnerable state pa reduces

availability

◮ longer mean time in the good state hG increases availability

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 46

slide-51
SLIDE 51

results: mean time to security failure insights

◮ MTTSF increases with longer mean time in the good state hG ◮ MTTSF decreases with higher probability of successful attack from

vulnerable state pa.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 47

slide-52
SLIDE 52

summary modelling an intrusion tolerant system

◮ flexibel model that can represent different types of attacks ◮ quantification of security (considering DoS, confidentiality, integrity

attacks)

◮ inspired by performability analysis ◮ doubtful parameter choices (planned improvements using SITAR) ◮ no notion of performance (planned improvements) ◮ no security cost ◮ no tradeoff

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 48

slide-53
SLIDE 53

Security of MANETs

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 49

slide-54
SLIDE 54

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-55
SLIDE 55

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may not detect (false negative)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-56
SLIDE 56

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may not detect (false negative) ◮ IDS may erroneously detect (false

positive)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-57
SLIDE 57

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may not detect (false negative) ◮ IDS may erroneously detect (false

positive)

◮ IDS may correctly detect

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-58
SLIDE 58

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may not detect (false negative) ◮ IDS may erroneously detect (false

positive)

◮ IDS may correctly detect and remove

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-59
SLIDE 59

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may not detect (false negative) ◮ IDS may erroneously detect (false

positive)

◮ IDS may correctly detect and remove ◮ node is excluded

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-60
SLIDE 60

security of MANETs

◮ group communication in mobile ad hoc

network using group key

◮ intrusion detection system (IDS) checks

for compromised nodes

◮ IDS may erroneously detect (false

positive)

◮ IDS may correctly detect and remove ◮ node is excluded ◮ new node arrives and is included ◮ key change is necessary to maintain

secure communication

Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile ad hoc networks. J.-H. Cho, I.-R. Chen, and P.-G. Feng. AINAW ’08: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications – Workshops, pp. 644–649, Washington, DC, USA, 2008. , Katinka Wolter, Performance and Security Tradeoff, SFM’10 50

slide-61
SLIDE 61

rekeying in MANETs intrusion detection

◮ voting-based intrusion detection ◮ byzantine failure, more than 1/3 of nodes compromised

rekeying frequency

◮ rekeying increases security ◮ rekeying increases load (cost) ◮ batch rekeying after n membership changes

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 51

slide-62
SLIDE 62

rekeying in MANETs intrusion detection

◮ voting-based intrusion detection ◮ byzantine failure, more than 1/3 of nodes compromised

rekeying frequency

◮ rekeying increases security ◮ rekeying increases load (cost) ◮ batch rekeying after n membership changes

  • ptimisation problem

how often to change key for optimal performance and security?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 51

slide-63
SLIDE 63

Petri net model parameters

◮ k1 rekey limit on (trusted) join and leave requests ◮ k2 rekey limit on detected and falsely detected compromised nodes

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 52

slide-64
SLIDE 64

measures performance measure

average response time R of transmitted message

security measure

MTTSF (attacker takes over or system becomes unavailable, more than 1/3 compromised nodes)

computation method

◮ analysis of SPN ◮ MTTA method (mean time to absorption)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 53

slide-65
SLIDE 65

mean time to security failure parameters

◮ k1 rekey limit on (trusted) join and leave requests ◮ k2 rekey limit on detected and falsely detected compromised nodes

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 54

slide-66
SLIDE 66

response time

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 55

slide-67
SLIDE 67

insights vary rekeying thresholds

◮ rekeying limit at 4 join/leave requests seems optimal ◮ for higher detected/falsely detected limit 2 join/leave requests might

be better

◮ either consider less join/leave requests, or less detected/falsely

detected nodes?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 56

slide-68
SLIDE 68

intrusion detection interval rekeying strategies

◮ individual rekeying (after each join, leave, evict event) ◮ threshold-based rekeying

◮ TAUDT, k1, k2 as above ◮ JALDT, k1 = limit on join requests, k2 = limit in leave requests and

evicted nodes.

parameters

◮ investigate optimal IDS interval (firing time) ◮ set TAUDT: (k1, k2) = (4,1), JALDT: (k1, k2) = (5,2) (enabling

condition)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 57

slide-69
SLIDE 69
  • ptimal intrusion detection time

◮ TIDS = 480 optimises MTTSF for individual rekeying ◮ TIDS = 600 optimises MTTSF for threshold-based rekeying

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 58

slide-70
SLIDE 70
  • ptimal intrusion detection interval

◮ TIDS = 600 optimises response time for all rekeying strategies

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 59

slide-71
SLIDE 71

conclusions results

◮ security and performance of wireless group communication system ◮ security is measured in terms of MTTSF ◮ performance is measured in terms of response time ◮ intrusion detection threshold and ◮ intrusion detection interval are chosen as to optimise those measures

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 60

slide-72
SLIDE 72

Security of the email system

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 61

slide-73
SLIDE 73

Security of the email system considered system

◮ email system considered a queue ◮ Inbox, filtering mechanisms, user, ....?

attack types

◮ gather information (malicious access to mailbox, click on link in

malicious email)

◮ denial of service (email bombs flood the mail system)

  • Y. Wang, C. Lin, and Q.-L. Li. Performance Analysis of the Email System under

Three Types of Attacks. Performance Evaluation, 67(6), (June 2010)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 62

slide-74
SLIDE 74

multiple queues parameters

each queue is described by arrival and service time distribution/rate

◮ emails, M/M/1/N: λ, µ ◮ Cracking password, M/PH/1/1: αc and (γc, Sc) ◮ Malicious email, M/PH/1/1: αm and (γm, Sm) ◮ Email bombs, M/M/1/1: αb, βb

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 63

slide-75
SLIDE 75

Petri net model performance measure

◮ queue length ◮ system availability

security measure

◮ (availability) ◮ information leakage probability

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 64

slide-76
SLIDE 76

performance measures availability and queue length

◮ availability versus arrival rate of email bombs for different damage

duration

◮ average queue length versus email arrival rate

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 65

slide-77
SLIDE 77

security measures information leakage

◮ information leakage versus email arrival rate for different arrival rates

  • f cracking attacks

◮ information leakage probability versus email bomb arrival rate for

different probabilities of obtaining information after cracking the password.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 66

slide-78
SLIDE 78

insights security of email

◮ malicious emails are known security concern ◮ formalisation as finite queueing models doubtful ◮ provided performance as well as security measures ◮ availability, queue length, information leakage

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 67

slide-79
SLIDE 79

Modelling Performance Security Tradeoff

Introduction Performance Cost of Encryption Performance Evaluation of a Key Distribution Centre Modelling and Quantifying Intrusion Tolerant Systems Security of MANETs Security of the email system Modelling Performance Security Tradeoff Conclusions

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 68

slide-80
SLIDE 80

performance and security model

  • bjective

◮ separate performance and security models ◮ combined measures with optima (cf. performability) ◮ example: encryption of messages (recall Lamprecht et al.) ◮ assumption: longer keys → more secure, longer encryption time

model specification

◮ performance model (queue) ◮ security model (CTMC, ...)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 69

slide-81
SLIDE 81

Petri net model

parameters

Parameter Name Value/Delay generate 2.0 send 0.1 N 150 encrypt 0.1, . . ., 3.4 by 0.1 TSI 12.5,25,50,100, . . ., 15100 by 500 detect 120 recover 360 , Katinka Wolter, Performance and Security Tradeoff, SFM’10 70

slide-82
SLIDE 82

measures combine performance and security

◮ pure performance measure (throughput) ◮ pure security measure (prob. secure state) ◮ combined measures involving costs

Throughput(send) 10 · Pr {#processing > 0} Pr {secure} E [#secure] = Pr {#secure > 0} CPSM Throughput(send) + Pr {secure} Gain 2 · E [#processing IF #secure = 1] Loss −E [#processing IF #insecure = 1] lowCostRevenue 2 · E [#processing IF #secure = 1] − E [#processing IF #insecure = 1] highCostRevenue E [#processing] · (2 · E [#secure] − 5 · E [#insecure])

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 71

slide-83
SLIDE 83

analysis

0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 0.5 1 1.5 2 2.5 3 3.5 encryption time Pr{secure} throughput Pr{secure} + throughput

results

◮ Pr(secure) and throughput both high better metrics (Raj Jain) ◮ sum is HB as well

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 72

slide-84
SLIDE 84

indirect measures

  • 0.08
  • 0.06
  • 0.04
  • 0.02

0.02 0.04 0.06 0.08 0.1 0.12 0.5 1 1.5 2 2.5 3 3.5 encryption time lowCostRevenue highCostRevenue

penalties

◮ higher penalty ⇒ lower benefit ◮ optimum key length is the same

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 73

slide-85
SLIDE 85

encryption cost

0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11 0.5 1 1.5 2 2.5 3 3.5 encryption time lowCostRevenue gain

encryption cost

◮ cost = revenue - gain ◮ cost negligible for long keys ◮ cost of security failure

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 74

slide-86
SLIDE 86

simplified Model separation of performance and security model

◮ what happens if we keep the submodels completely separate? ◮ monotonous performance and security measures?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 75

slide-87
SLIDE 87

simplified model throughput

0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 0.5 1 1.5 2 2.5 3 3.5 encryption time Pr{secure} throughput Pr{secure} + throughput

combined performance and security measure

◮ limiting arrival process more pronounced ◮ throughput unaffected

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 76

slide-88
SLIDE 88

simplified model revenue

  • 0.08
  • 0.06
  • 0.04
  • 0.02

0.02 0.04 0.06 0.08 0.1 0.5 1 1.5 2 2.5 3 3.5 encryption time lowCostRevenue highCostRevenue

  • 0.02

0.02 0.04 0.06 0.08 0.1 0.5 1 1.5 2 2.5 3 3.5 encryption time lowCostRevenue gain

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 77

slide-89
SLIDE 89

insights lessons learnt

◮ assumptions made: TSI and encryption time are correlated ◮ processing discontinues/continues in case of recovery, what about the

measures?

◮ do we gain information beyond the assumptions made initially?

parameters

◮ we find optimal parameter settings!! ◮ how about realistic parameter values?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 78

slide-90
SLIDE 90

numerical issues

2000 4000 6000 8000 10000 12000 14000 16000 0.5 1 1.5 2 2.5 3 3.5

  • No. iterations

encryption time model with inhibitor model without inhibitor

remember performability

◮ many iterations needed ◮ poor accuracy

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 79

slide-91
SLIDE 91

numerical issues

0.5 0.6 0.7 0.8 0.9 1 2000 4000 6000 8000 10000 12000 14000 16000 Probability of secure state time between security incidents security model only with inhibitor, n = 150 without inhibitor, n = 1 without inhibitor, n = 2 without inhibitor, n = 3 without inhibitor, n = 5 without inhibitor, n = 10 without inhibitor, n = 150 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.5 1 1.5 2 2.5 3 3.5 with inhibitor, maxIter 1000 with inhibitor, maxIter 2000 with inhibitor, maxIter 5000 with inhibitor, maxIter 1000000 without inhibitor, maxIter 1000 without inhibitor, maxIter 2000 without inhibitor, maxIter 5000 without inhibitor, maxIter 1000000

◮ solution sensitive to queue length ◮ solution sensitive to no. of iterations

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 80

slide-92
SLIDE 92

conclusions quantify security

◮ model-based analysis of performance and security is a new field

although the issue has been around for long

◮ we still have no metric for security, but ◮ frequent change of key, or ticket increases security ◮ longer keys for encryption increase security ◮ performance can be measured using throughput and response time ◮ tradeoff can be formulated

security statement

◮ cryptographic algorithms are known to be secure ◮ security problems are dependability problems (overflow,

implementation, failures, etc.)

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 81

slide-93
SLIDE 93

conclusions and outlook model results

◮ do we find out something about the system, or about the model? ◮ setting up a good model is very difficult.

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 82

slide-94
SLIDE 94

conclusions and outlook model results

◮ do we find out something about the system, or about the model? ◮ setting up a good model is very difficult.

resume

do we lie with stochastics?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 82

slide-95
SLIDE 95

conclusions and outlook model results

◮ do we find out something about the system, or about the model? ◮ setting up a good model is very difficult.

resume

do we lie with stochastics?

, Katinka Wolter, Performance and Security Tradeoff, SFM’10 82