RheoStat : Real-time Risk Management Ashish Gehani and Gershon Kedem - - PowerPoint PPT Presentation
RheoStat : Real-time Risk Management Ashish Gehani and Gershon Kedem - - PowerPoint PPT Presentation
RheoStat : Real-time Risk Management Ashish Gehani and Gershon Kedem Department of Computer Science, Duke University 1 PROBLEM : Intrusion response Manual response decreasingly tenable: High attack frequency Great attack diversity
PROBLEM : Intrusion response
Manual response decreasingly tenable:– High attack frequency – Great attack diversity – Rapid attack execution – Protection Time
< Detection Time + Response Time False positives preclude retaliation Network connections encrypted2
SOLUTION STRATEGY
Automate response:– Model runtime risk – Build vulnerability management primitives – Dynamically manage risk – Minimize impact on performance
Passive response - limit to owner’s domain Host-based3
RISK MODEL : Management
Threat Vulnerabilities Assets Risk Risk Threshold Consequences Safeguards Likelihood Yes Reconfigure
4
RHEOSTAT : Signatures
Timeouts :
Initialized System Alarm Event e1 Time t4 Time t0 Time t1 Time t2 Time t3 Time t5 Event e2 Event e3 Event e4 t2−t1 > t_pre t5−t4 > t_post t3−t1 > t_pre
5
RISK MODEL : Threat
Events : E- =
- )
- =
- 2
- )
- ;
- \
- ));
- 2
Matching function :
(t- ;
- \
- ))
- \
- )j
- )j
6
ARM : Active Reference Monitor
Subject: i Object: j Right: k Request Permission p(i,j,k) Application Access Control: M p(i,j,k) Granted Permission p(i,j,k) Denied Permission Intrusion Detector (i,j,k) Predicate Threat Level: l True D(i,j,k) False False True Timer Expired Default for p(i,j,k) Undefined Defined MonitorException: True False (i,j,k) MonitorException: σ (i,j,k) σ σ σ σ > Cost[ (i,j,k)] Benefit[ (i,j,k), l]
7
RISK MODEL : Vulnerability
Weaknesses : W = fw 1 ; w 2 ; : : : g; W (t- )
- W
- 2
- )
- P
- 2
- )
- 2W
- )
- );
- 2
- )
- 2
- )
- 2
- )
- 2
- )
- )
- v
- )
- )j
- 2
8
RISK MODEL : Consequence
Objects : O = fo 1 ;- 2
- )
- O
- );
- 2
- );
- 2
- );
- 2
- )
- 2A(t
- )
- )
- )
- );
- 2
9
RISK MODEL : Unmanaged Risk
Unmanaged Risk : R = X t- 2T
- )
- V
- )
- C
- )
- jP
- jO
10
RISK MODEL : Vulnerability Management
Auxiliary safeguards : (P )- P
- P
- (P
11
ARM : Skeleton of Auxiliary Safeguard
public abstract class PredicateThread extends Thread{ protected PredicateThread(Permission permission, Object lock); public void run(){ if(condition) result=true; synchronized(lock){ lock.notify(); } } public boolean getResult(); }
12
RISK MODEL : Managed Risk
Managed Vulnerability : V (t- )
- 2
- )\(P
- )
- )j
- 2
- )\(P
- )
- v
- )
- )j
- 2
- 2T
- )
- V
- )
- C
- )
13
RISK MODEL : Risk Tolerance
Event : e Risk before : R b Risk change :- 6=
- Risk threshold :
- >
- >
- R
- <
- <
14
RISK MODEL : Risk Recalculation
Threat change : Æ (T (t- );
- ;
- \
- ))
- (t
- ;
- \
- ))
- );
- 2
- );
- ) cached
15
RISK MODEL : Risk Reduction
Enable safeguards : ((P ))- (P
- )
- 2(
- )\(P
- )
- )j
- 2(
- )\(P
- )
- v
- )
- )j
- 2T
- )
- V
- )
- C
- )
16
RISK MODEL : Cost and Complexity
Increase of Risk Reduction Cost :- (((P
- 2((P
- )
- (((P
- R
17
RHEOSTAT : Response Heaps
Key = Frequency in Workload Risk Reduction
Disabled Heap Responses Enabled Heap Responses
Key = Frequency in Workload Risk Relaxation Activate response Deactivate response Safeguard Safeguard
18
RHEOSTAT : Pre-Processing
Step 1
8p- 2
- )
- :p
- 2(
- )\(P
- )
- v
- )
- (1
- v
- ))
- )j
- C
- )
- )
19
RHEOSTAT : Safeguard Selection
Step 2 Set
((P )) =- Step 3 Choose:
- );
- 2
Step 4 Add
r to ((P ))Step 5 Recalculate Risk :
R 00 = R a- X
- 2((P
- )
- f
- )
20
RHEOSTAT : Response Completion
Step 6
R 00 > R )Step 3
R 00- R