Survivability Analysis of a Computer System under an Advanced - - PowerPoint PPT Presentation

survivability analysis of a computer system under an
SMART_READER_LITE
LIVE PREVIEW

Survivability Analysis of a Computer System under an Advanced - - PowerPoint PPT Presentation

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack guez , Xiaolin Chang , Xiaodan Li , Kishor S. Trivedi Ricardo J. Rodr rjrodriguez@unizar.es , xlchang@bjtu.edu.cn , { xiaodan.li,ktrivedi }


slide-1
SLIDE 1

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack

Ricardo J. Rodr´ ıguez†, Xiaolin Chang‡, Xiaodan Li§, Kishor S. Trivedi§

rjrodriguez@unizar.es, xlchang@bjtu.edu.cn, {xiaodan.li,ktrivedi}@duke.edu

All wrongs reversed †University of Zaragoza ‡Beijing Jiaotong University §Duke University †Second University of Naples

June 27, 2016 3rd International Workshop on Graphical Models for Security Lisbon, Portugal

slide-2
SLIDE 2

Introduction (I)

Cyberattacks are rapidly increasing +38% in 2015a

Cybercrime is a growing (and quite wealthy) industry

High cost for companies (estimated cost of $575B)

Service downtime and cleanup of compromised systems Loss of customer confidence, even data theft

ahttps://news.sap.com/

pwc-study-biggest-increase-in-cyberattacks-in-over-10-years/

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 2 / 19

slide-3
SLIDE 3

Introduction (I)

Cyberattacks are rapidly increasing +38% in 2015a

Cybercrime is a growing (and quite wealthy) industry

High cost for companies (estimated cost of $575B)

Service downtime and cleanup of compromised systems Loss of customer confidence, even data theft

ahttps://news.sap.com/

pwc-study-biggest-increase-in-cyberattacks-in-over-10-years/

Just a little bit scared. . .

Critical infrastructures: provide essential services to the society

Examples: power distribution, water treatment, financial services. . . Discontinuity of service may lead to fatalities or injuries

Different nature, from unintended acts of nature to intentional attacks (e.g., sabotage, terrorism)

Cyberattacks to these systems have an increasing trend

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 2 / 19

slide-4
SLIDE 4

Introduction (II)

Malware

Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour

Viruses, worms, keyloggers, ransomware, etc.

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

slide-5
SLIDE 5

Introduction (II)

Malware

Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour

Viruses, worms, keyloggers, ransomware, etc.

Advanced Persistent Threat (APT)

Advanced: sophisticated attack

Involves a previous reconnaissance of the target

Persistent: long-term staying

The longer they stay in the system, the more data are exfiltrated

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

slide-6
SLIDE 6

Introduction (II)

Malware

Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour

Viruses, worms, keyloggers, ransomware, etc.

Advanced Persistent Threat (APT)

Advanced: sophisticated attack

Involves a previous reconnaissance of the target

Persistent: long-term staying

The longer they stay in the system, the more data are exfiltrated

Knowledge is power

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

slide-7
SLIDE 7

Introduction (III)

APT examples Operation Aurora: attributed to China, in 2010 a lot of companies

from different domains (such as Google, Yahoo, Morgan Stanley, or Dow Chemicals) were attacked

Stuxnet: attributed to US-Israel and discovered in 2010, affected to

Siemens PLCs of SCADA networks in Iran nuclear facilities Others: GhostNet, Duqu, Flame, . . .

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 4 / 19

slide-8
SLIDE 8

Introduction (IV)

APT life-cycle

EFIL LMOV INFECT EXPLOIT

1

Entry point/exploitation: 0-days or known but not fixed vulnerabilities

2

Infection: make persistence. Normally, also installs RAT tools

3

Lateral movement: move through the network, looking data of interest and other hosts to compromise

4

Exfiltration: modify or send out network boundaries sensitive data

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 5 / 19

slide-9
SLIDE 9

Introduction (IV)

APT life-cycle

EFIL LMOV INFECT EXPLOIT

1

Entry point/exploitation: 0-days or known but not fixed vulnerabilities

2

Infection: make persistence. Normally, also installs RAT tools

3

Lateral movement: move through the network, looking data of interest and other hosts to compromise

4

Exfiltration: modify or send out network boundaries sensitive data

Survivability

System’s ability to withstand malicious attacks and support the system’s mission even when parts of the system are damaged Assessing the impact of an APT allows to characterize a system against those intended failures and evaluate mitigation techniques

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 5 / 19

slide-10
SLIDE 10

Introduction (V)

Contribution

Survivability assessment of a computer system under an APT attack Security model (as a Stochastic Reward Net)

Integrates defender + attacker actions

Assumptions made: event times are exponentially distributed Four survivability metrics

1

System recovery

2

System availability

3

Data confidentiality loss

4

Data integrity loss

. . . after a vulnerability is announced, and during vulnerability mitigation strategy is being deployed

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 6 / 19

slide-11
SLIDE 11

Related Work

Survivability metrics

Little research on quantitative evaluation metrics

Survivability of a resilient database system against intrusions, modeled with CTMC. Later, extended to semi-Markov processes (Wang et al., 2006, 2010) General approach for survivability quantification of networked systems using SRNs (Trivedi and Xia, 2015) Survivability assessment of Saudi Arabia crude-oil pipeline network (Rodr´ ıguez et al., 2015)

Our model allows us. . .

Not only availability analysis, also confidentiality and integrity (loss) Investigate security attributes during the transient period that:

Starts after a vulnerability is publicly announced Ends when the vulnerability is fully removed

Quantitative assessment of these attributes Insights on cost/benefit trade-offs of investments

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 7 / 19

slide-12
SLIDE 12

Background

Petri nets – explanation simplified

Underlying Markov-chain Places (circles, pX) Transitions (bars, tX) Time interpretation Tokens (black dots)

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 8 / 19

slide-13
SLIDE 13

Background

Petri nets – explanation simplified

Underlying Markov-chain Places (circles, pX) Transitions (bars, tX) Time interpretation Tokens (black dots)

Extensions

Stochastic PNs: exponentially distributed firing time in transitions Generalized SPNs: immediate + timed transitions (any distribution)

Also inhibitor arcs

Stochastic Reward Nets: GSPN + reward functions at net level

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 8 / 19

slide-14
SLIDE 14

System Description and Model (I)

* Not known vulnerabilities * Not skill enough to find 0-day vulnerabilities

Starts exploit implementation Starts vulnerability mitigation deployment

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 9 / 19

slide-15
SLIDE 15

System Description and Model (I)

* Not known vulnerabilities * Not skill enough to find 0-day vulnerabilities

Starts exploit implementation Starts vulnerability mitigation deployment

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 9 / 19

slide-16
SLIDE 16

System Description and Model (II)

GOOD EXPLOIT CODE IMPLEMENTATION REPAIRED EFIL LMOV INFECT EXPLOIT VULN FOUND CRASH FAIL VULN PATCH IMPLEMENTATION C F

Survivability metrics defined

m1 Probability that the vulnerable system has been patched at time t m2 Probability that the system is unavailable at time t m3 Mean accumulated time that the system is unavailable in (0, t] m4 Mean accumulated loss of system confidentiality and integrity in (0, t]

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 10 / 19

slide-17
SLIDE 17

System Description and Model (III)

pprepare Tprepare pdeploy Tdeploy pready pvul Tvul pexploit Texploit Tinfect plmov Tlmov pinfect pefil Tefil prepair [gvul] pexploit2 pgood Tc1 Tc2 Tc3 Tf4 Tc4 Tf3 Tf2 Tf1 Tr1 Tr2 t1 t3 t4 t5 t6 t7 Tf5 pfail pcrash t2 pbugfound Tbugfound tvul pvul_s [gf5] 1 ptvul

gvuln if (#(pvulns) == 1) then 1 else 0 gf5 if (#(pvuln) == 1) then 1 else 0

m1 Expected number of tokens of pgood at time t m2 Expected number of tokens of (pcrash + pfail + pdeploy) at time t m3 Expected accumulated reward of (pcrash + pfail + pdeploy) by time t m4 Expected accumulated reward of pexfil by time t

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 11 / 19

slide-18
SLIDE 18

Experiments and Discussion (I)

Symbol Definition Mean value 1/δ Mean time that the discovered vulnerability is known to all 30 min 1/λprepare Mean time for implementing a mitigation strategy 20 days 1/λdeploy Mean time for installing the mitigation strategy 12 days 1/λvuln Mean time for generating the exploit code 4 days 1/λfail Mean time that the computer system fails 365 days 1/λfix Mean time that the computer system completes the failure

  • r crash fixing

2 days 1/λefil Mean time that the attacker obtains the desired information 2 days 1/λexploit Mean time for injecting the exploit code into the system 7 days 1/λinf Mean time that the exploit code is persistent 1 days 1/λlmov Mean time that the attacker finds sensitive data of interest 7 days ρ1 Probability that the exploit code works in the system 0.6 ρ2 Probability that the exploit code is persistent 0.6 ρ3 Probability that the attacker finds its target 0.6 ρ4 Probability that the attacker obtains the desired information 0.6

SPNP software P04, P08, P12 , P16, and P20 represent the results of 1/λprepare = {4, 8, 12, 16, 20} days, respectively Crash probability of 10% and 40%

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 12 / 19

slide-19
SLIDE 19

Experiments and Discussion (II)

Probability of GOOD state at time t under different crash probabilities (metric m1)

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 10% Probability of GOOD state at time t (days) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 40% Probability of GOOD state at time t (days)

Crash probability has little effect

Deployment starts when mitigation strategy is ready (regardless the system state is)

The smaller 1/λprepare, the larger increase in m1

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 13 / 19

slide-20
SLIDE 20

Experiments and Discussion (III)

Probability of unavailable system at time t under different crash probabilities (metric m2)

Crash probability = 10% Probability of unavailable state at time t (days) 0.005 0.01 0.015 0.02 0.025 10 20 30 40 50 P04 P08 12 P16 P20 Time P 0.01 0.02 0.03 0.04 0.05 0.06 0.07 10 20 30 40 50 P04 P08 P12 P16 P20 Time Crash probability = 40% Probability of unavailable state at time t (days)

Both crash probability and λprepare affect unavailability

When exploit code is ready, system crashes frequently Once mitigation strategy is ready, it starts deployment

The larger 1/λprepare, the larger increase in m2 (not hold at beginning!)

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 14 / 19

slide-21
SLIDE 21

Experiments and Discussion (IV)

Probability of (a) CRASH+FAIL and (b) DEPLOY state at time t under crash probability of 10%

0.005 0.01 0.015 0.02 10 20 30 40 50 P04 P08 P16 P20 Time Crash probability = 10% Probability of CRASH+FAIL state at time t (days) P12 0.005 0.01 0.015 0.02 10 20 30 40 50 P04 P08 P16 P20 Time Crash probability = 10% Probability of DEPLOY state at time t (days) P12

(a) (b) At the beginning, the smaller 1/λprepare, the larger increase in m2

Mainly caused by the probability of DEPLOY state

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 15 / 19

slide-22
SLIDE 22

Experiments and Discussion (V)

Mean accumulated time that the system is unavailable under different crash probabilities (metric m3)

0.1 0.2 0.3 0.4 0.5 0.6 0.7 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 10% Mean accumulated time of unavailable system up to time t (days) 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 40% Mean accumulated time of unavailable system up to time t (days)

System Unavailability 1: if (#(pfail) == 1 or #(pcrash) == 1 or #(pdeploy) == 1) Confidentiality loss 1: if (#(pefil) == 1) 0: otherwise 0: otherwise

Same reasoning as for m2

The larger 1/λprepare, the larger increase in m3 (not at the beginning)

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 16 / 19

slide-23
SLIDE 23

Experiments and Discussion (VI)

Mean accumulated of system confidentiality and integrity loss by time t under different crash probabilities (metric m4)

0.2 0.4 0.6 0.8 1 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 10% Mean accumulated loss of confidentiality up to time t (days) 0.05 0.1 0.15 0.2 0.25 0.3 10 20 30 40 50 P04 P08 P16 P20 Time P12 Crash probability = 40% Mean accumulated loss of confidentiality up to time t (days)

The larger 1/λprepare and/or the smaller crash probability, the larger mean accumulated loss

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 17 / 19

slide-24
SLIDE 24

Conclusions and Future Work

Conclusions

Critical infrastructures mainly targeted by Advanced Persistent Threats: make persistent and send sensitive data out

Interest to survive these attacks, minimizing the impact

CTMC model-based survivability analysis of a computer system under an APT Four metrics proposed to analyze system recovery, system availability, data confidentiality loss, and data integrity loss

Numerical results help to choose the best strategies Insights on the cost/benefit trade-offs of investment efforts in system recovery strategies, as well as vulnerability mitigation schemes

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 18 / 19

slide-25
SLIDE 25

Conclusions and Future Work

Conclusions

Critical infrastructures mainly targeted by Advanced Persistent Threats: make persistent and send sensitive data out

Interest to survive these attacks, minimizing the impact

CTMC model-based survivability analysis of a computer system under an APT Four metrics proposed to analyze system recovery, system availability, data confidentiality loss, and data integrity loss

Numerical results help to choose the best strategies Insights on the cost/benefit trade-offs of investment efforts in system recovery strategies, as well as vulnerability mitigation schemes

Future work

Extend the model to consider security improvements Multiple vulnerabilities; some event times no exponentially distributed Better modelling of restoration process

R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 18 / 19

slide-26
SLIDE 26

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack

Ricardo J. Rodr´ ıguez†, Xiaolin Chang‡, Xiaodan Li§, Kishor S. Trivedi§

rjrodriguez@unizar.es, xlchang@bjtu.edu.cn, {xiaodan.li,ktrivedi}@duke.edu

All wrongs reversed †University of Zaragoza ‡Beijing Jiaotong University §Duke University †Second University of Naples

June 27, 2016 3rd International Workshop on Graphical Models for Security Lisbon, Portugal