survivability analysis of a computer system under an
play

Survivability Analysis of a Computer System under an Advanced - PowerPoint PPT Presentation

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack guez , Xiaolin Chang , Xiaodan Li , Kishor S. Trivedi Ricardo J. Rodr rjrodriguez@unizar.es , xlchang@bjtu.edu.cn , { xiaodan.li,ktrivedi }


  1. Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack ıguez † , Xiaolin Chang ‡ , Xiaodan Li § , Kishor S. Trivedi § Ricardo J. Rodr´ rjrodriguez@unizar.es , xlchang@bjtu.edu.cn , { xiaodan.li,ktrivedi } @duke.edu � All wrongs reversed † University of Zaragoza ‡ Beijing Jiaotong University § Duke University † Second University of Naples June 27, 2016 3rd International Workshop on Graphical Models for Security Lisbon, Portugal

  2. Introduction (I) Cyberattacks are rapidly increasing + 38 % in 2015 a Cybercrime is a growing (and quite wealthy) industry High cost for companies (estimated cost of $ 575 B ) Service downtime and cleanup of compromised systems Loss of customer confidence, even data theft a https://news.sap.com/ pwc-study-biggest-increase-in-cyberattacks-in-over-10-years/ R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 2 / 19

  3. Introduction (I) Cyberattacks are rapidly increasing + 38 % in 2015 a Cybercrime is a growing (and quite wealthy) industry High cost for companies (estimated cost of $ 575 B ) Service downtime and cleanup of compromised systems Loss of customer confidence, even data theft a https://news.sap.com/ pwc-study-biggest-increase-in-cyberattacks-in-over-10-years/ Just a little bit scared. . . Critical infrastructures: provide essential services to the society Examples: power distribution, water treatment, financial services. . . Discontinuity of service may lead to fatalities or injuries Different nature, from unintended acts of nature to intentional attacks (e.g., sabotage, terrorism) Cyberattacks to these systems have an increasing trend R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 2 / 19

  4. Introduction (II) Malware Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour Viruses, worms, keyloggers, ransomware, etc. R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

  5. Introduction (II) Malware Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour Viruses, worms, keyloggers, ransomware, etc. Advanced Persistent Threat (APT) Advanced : sophisticated attack Involves a previous reconnaissance of the target Persistent : long-term staying The longer they stay in the system, the more data are exfiltrated R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

  6. Introduction (II) Malware Specially crafted software with one goal: achieve malicious activities Different types of malware, depending on their behaviour Viruses, worms, keyloggers, ransomware, etc. Advanced Persistent Threat (APT) Advanced : sophisticated attack Involves a previous reconnaissance of the target Persistent : long-term staying The longer they stay in the system, the more data are exfiltrated Knowledge is power R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 3 / 19

  7. Introduction (III) APT examples Operation Aurora : attributed to China, in 2010 a lot of companies from different domains (such as Google, Yahoo, Morgan Stanley, or Dow Chemicals) were attacked Stuxnet : attributed to US-Israel and discovered in 2010, affected to Siemens PLCs of SCADA networks in Iran nuclear facilities Others: GhostNet , Duqu , Flame , . . . R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 4 / 19

  8. Introduction (IV) APT life-cycle EXPLOIT INFECT LMOV EFIL Entry point/exploitation: 0-days or known but not fixed vulnerabilities 1 Infection: make persistence. Normally, also installs RAT tools 2 Lateral movement: move through the network, looking data of interest 3 and other hosts to compromise Exfiltration: modify or send out network boundaries sensitive data 4 R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 5 / 19

  9. Introduction (IV) APT life-cycle EXPLOIT INFECT LMOV EFIL Entry point/exploitation: 0-days or known but not fixed vulnerabilities 1 Infection: make persistence. Normally, also installs RAT tools 2 Lateral movement: move through the network, looking data of interest 3 and other hosts to compromise Exfiltration: modify or send out network boundaries sensitive data 4 Survivability System’s ability to withstand malicious attacks and support the system’s mission even when parts of the system are damaged Assessing the impact of an APT allows to characterize a system against those intended failures and evaluate mitigation techniques R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 5 / 19

  10. Introduction (V) Contribution Survivability assessment of a computer system under an APT attack Security model (as a Stochastic Reward Net) Integrates defender + attacker actions Assumptions made: event times are exponentially distributed Four survivability metrics System recovery 1 System availability 2 Data confidentiality loss 3 Data integrity loss 4 . . . after a vulnerability is announced, and during vulnerability mitigation strategy is being deployed R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 6 / 19

  11. Related Work Survivability metrics Little research on quantitative evaluation metrics Survivability of a resilient database system against intrusions, modeled with CTMC. Later, extended to semi-Markov processes (Wang et al., 2006, 2010) General approach for survivability quantification of networked systems using SRNs (Trivedi and Xia, 2015) Survivability assessment of Saudi Arabia crude-oil pipeline network (Rodr´ ıguez et al., 2015) Our model allows us. . . Not only availability analysis, also confidentiality and integrity (loss) Investigate security attributes during the transient period that: Starts after a vulnerability is publicly announced Ends when the vulnerability is fully removed Quantitative assessment of these attributes Insights on cost/benefit trade-offs of investments R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 7 / 19

  12. Background Petri nets – explanation simplified Underlying Markov-chain Places (circles, p X ) Transitions (bars, t X ) Time interpretation Tokens (black dots) R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 8 / 19

  13. Background Petri nets – explanation simplified Underlying Markov-chain Places (circles, p X ) Transitions (bars, t X ) Time interpretation Tokens (black dots) Extensions Stochastic PNs: exponentially distributed firing time in transitions Generalized SPNs: immediate + timed transitions (any distribution) Also inhibitor arcs Stochastic Reward Nets : GSPN + reward functions at net level R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 8 / 19

  14. Starts exploit implementation Starts vulnerability mitigation deployment System Description and Model (I) * Not known vulnerabilities * Not skill enough to find 0-day vulnerabilities R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 9 / 19

  15. System Description and Model (I) * Not known vulnerabilities * Not skill enough to find 0-day vulnerabilities Starts exploit implementation Starts vulnerability mitigation deployment R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 9 / 19

  16. System Description and Model (II) PATCH GOOD IMPLEMENTATION REPAIRED FAIL CRASH F C VULN FOUND EXPLOIT CODE EXPLOIT INFECT LMOV EFIL IMPLEMENTATION VULN Survivability metrics defined m 1 Probability that the vulnerable system has been patched at time t m 2 Probability that the system is unavailable at time t m 3 Mean accumulated time that the system is unavailable in ( 0 , t ] m 4 Mean accumulated loss of system confidentiality and integrity in ( 0 , t ] R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 10 / 19

  17. System Description and Model (III) p prepare T prepare p ready p deploy T deploy p good t 2 t 3 t 4 t 5 t 6 t 1 T efil [ g vul ] p efil T bugfound p infect T infect p exploit p lmov T lmov T exploit t vul 1 p tvul p vul p bugfound T vul T f1 T c1 T f2 T f3 T c3 T c2 T c4 p exploit2 t 7 p repair p crash T r1 T r2 [ g f5 ] T f4 p fail p vul_s T f5 g vuln if ( #( p vuln s ) == 1) then 1 else 0 if ( #( p vuln ) == 1) then 1 else 0 g f 5 m 1 Expected number of tokens of p good at time t m 2 Expected number of tokens of ( p crash + p fail + p deploy ) at time t m 3 Expected accumulated reward of ( p crash + p fail + p deploy ) by time t m 4 Expected accumulated reward of p exfil by time t R.J. Rodr´ ıguez et al. Survivability Analysis of a Computer System under an APT Attack GraMSec 2016 11 / 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend