The Premise: Hack in Paris, 2015 I may be right on some stuff. - - PowerPoint PPT Presentation

the premise hack in paris 2015
SMART_READER_LITE
LIVE PREVIEW

The Premise: Hack in Paris, 2015 I may be right on some stuff. - - PowerPoint PPT Presentation

The Premise: Hack in Paris, 2015 I may be right on some stuff. Probably wrong on other bits. Analogue is meant to help people think differently. This is the Hack in Paris 2015 version, and is subject to all sorts of changes as the


slide-1
SLIDE 1
slide-2
SLIDE 2

The Premise: Hack in Paris, 2015

  • I may be right on some stuff. Probably wrong
  • n other bits.
  • Analogue is meant to help people think

differently.

  • This is the Hack in Paris 2015 version, and is

subject to all sorts of changes as the book is finished.

  • Please send me your ideas.
  • Thanks! See you next year.
  • For first edition signed copies of the book:
slide-3
SLIDE 3

1ST Edition Signed Copies

slide-4
SLIDE 4

The World As It Is

<Le Sigh>

  • Security is Broken. Abysmally so.
  • TCP/IP was just an experiment.
  • We run the planet on it.
  • Assume the bad guys are inside already.
  • We ‘know’ newer, faster technology will

protect networks and data.

– (Same promises since 1980s)

  • If You Can’t Measure It, You Can’t Manage It.
slide-5
SLIDE 5

My Analogue Assessment

  • Digital is Not Binary
  • Security is Not Static
  • No Common Metric: Risk,

Security & Privacy

  • We “Can’t” Measure Security. Or can we?
  • Defense > Offense Is ‘Almost’ Possible
slide-6
SLIDE 6

My Political Assessment

  • Security Only Keeps the Good Guys Honest.
  • Legislation, Regulations and Governance

Require Willingness to Follow the Rules.

  • Here Comes the IoT
  • International Cooperation Can Solve Many

Security Issues… if, and only if, Technology Comes First. Politics, Second.

slide-7
SLIDE 7

Winn As Young TV Repairman

slide-8
SLIDE 8

And Color Blind

slide-9
SLIDE 9

I Grew Up Analogue Rock'n'Roll: Complex Systems

  • Realizations for I.T. & Security

– We teach success not failure. – Digital is NOT Binary – Analogue Still Rules (Or Should) – You Can’t Fix It in the Mix (Music or People) – I know all about Feedback! Security Doesn’t.

  • Some Ways to Rethink Security

– (Some you may think are odd…but they work!)

  • I Have Had to Respond to Some Incredible Incidents
slide-10
SLIDE 10

Analogue: WTF? Continuously Variable & Dynamic

slide-11
SLIDE 11

Is It Analogue?

slide-12
SLIDE 12

Analogue = Continuously Variable

slide-13
SLIDE 13

Averaging Quanta: Plank’s ‘d’

slide-14
SLIDE 14

Continua (Not Binary)

slide-15
SLIDE 15

Sine Waves: Analogue

slide-16
SLIDE 16

The Internet Is Analogue & Alive

slide-17
SLIDE 17

The Brain is Analogue

slide-18
SLIDE 18

Analogue Bio-Computers (Neural Interface / IoT)

slide-19
SLIDE 19

Security Models

slide-20
SLIDE 20

Static Security Models

  • Expensive
  • Not Prone to

Communica<on/Commerce

  • Models from 1970’s
  • Bell LaPadula
  • Bibi
  • Analyze/Decide Prior to

Permission

slide-21
SLIDE 21

Manufacturing Engineering Marke<ng Human Resources

Fortress Mentality & Risk Avoidance

Build the walls high enough and the computers are secure.

slide-22
SLIDE 22

The Reference Monitor

  • Each System Request Is Mediated
  • Yes/No Decisions
  • Process Halts

System Request Halt Processing

Go/NoGo

Look up ACTs Deny/Permit Con<nue Process NoGo Go

slide-23
SLIDE 23

Protect-Detect-Respond’ The Original ‘Model: 1994

slide-24
SLIDE 24

Is The Vault Secure?

slide-25
SLIDE 25

Safe Ratings

  • This terribly expensive burnished steel

vault is secure against:

  • 3200C Oxyacetylene torch for 92 Hrs.
  • 5.2kg of 3.8 Rated TNT
  • AYer that… all bets are off!
  • Is the Vault the Only Defense We Use?
slide-26
SLIDE 26

It’s About Time

slide-27
SLIDE 27

Can You Rate Your Firewall? (0-10)

slide-28
SLIDE 28

Why We Can’t Rely on Protection

  • No Product Guarantees
  • Networks are highly dynamic
  • Most protection is highly static.
  • The security posture changes

continuously

  • Network maps are ‘iffy’.

Especially ingress/egress

  • Partner networks are often

security suspects.

  • Complexity breeds vulnerability
  • New hacks & ‘0’-Days
  • Patches take time
  • Improper configuration
  • Insiders (Errors & Intent)

How Much Protection Does The Window Provide (Time)?

slide-29
SLIDE 29

What Can We Measure?

+

Reaction Detection

slide-30
SLIDE 30

Time Based Security Formula

  • Protec<on (The glass/bank vault)
  • Detec<on (The sensors and alarms)
  • Reac<on (The cops)
  • Two Analogue Components:
  • Time (Dynamic)
  • > (Versus ‘=‘ which is sta<c)

P(t)

> D(t) + R(t)

Measure Your Network Security … Now!

slide-31
SLIDE 31

MAD Cold War = Time

slide-32
SLIDE 32

Adding It All Up: D(t) + R(t)

Manual Defensive Detection + Reaction Times

100 200 300 400 1 2 3 4 Detect Notify Transit Rectify Seconds

D + R = 527 Secs. E = 8.8 Mins F = 81.3MB. (T‐1) F = 6.7MB (512)

Automatic Defensive Detection + Reaction Times

200 400 600 1 2 3 4 Detect Notify Transit Rectify Milli-Seconds

D + R = 600ms E = .6 Secs F = 92K (T‐1) F = 7.7K (512)

slide-33
SLIDE 33

Evaluating Exposure: E(t)

  • Assume No Protec<on:
  • If P = 0,
  • Then E(t) = D(t) + R(t)
  • If P > 0,
  • Then E(t) = [P(t) – (D(t) + R(t))]
  • Given Total Access to Your Networks ‐
  • How much ‘Value’ can be stolen in 1 minute?
  • How about 10 minutes?
  • What about 2 hours?
  • Cost in $ of DOS/DDoS?
  • Best‐Case Metric of Security

Lim Et = Lim (Dt) + Lim (Rt)

t >> 0 t > >0 t >> 0

slide-34
SLIDE 34

Data Evaluation

Stop Treating Networks As Single Objects!

Date Location Server If this data is released, modified or destroyed: Company Proprietary Employee Private Customer Private Business Partner, Government, Other The results will be absolutely disasterous with no chance of economic or politcal recovery. There will be severe financial, political or other undesirable results, but we will survive. It's gonna cost us big time, but spin doctoring will take care of it. Negligible effects, but we still really don't want it to happen. Publish it all you want. It's free, please take it!

slide-35
SLIDE 35

Defense in Depth (Yes, but…)

P > D + R

P(d1) > D(d1) + R(d1)

P(r1) > D(r1) + R(r1)

slide-36
SLIDE 36

Measuring Which Files Are Targets

  • P > D + R

– If P = 0, then D + R = E

  • F / BW = T

– BW(mb)/~10 = BW(MB)

  • 1Gb/sec ~ (100MB/Sec)

– F = 100MB

  • If E > 1sec, or E > T, F is Vulnerable
slide-37
SLIDE 37

Dim All The Data

I = E/R

  • T = F / BW
slide-38
SLIDE 38

Bandwidth Compression

1GB/Sec 1MB/Sec 10‐3

slide-39
SLIDE 39

The Bad Guys Know Math, Too

  • Offense: Think
  • 1/[P = (D+R)]
  • If Defense P > 0
  • then Offense A > P for success,
  • iff (D + R) > P
  • If Defense P = 0,
  • then Offense A < (D + R) or A < E (Defense)
slide-40
SLIDE 40

Kill Root

slide-41
SLIDE 41

Multiple Admins

  • With Mul<ple Individuals, What

Happens to Trust Factor?

  • Improves? Worsens?

B A A OR B

slide-42
SLIDE 42

Typical of the Enterprise?

A OR B OR C OR D OR E

slide-43
SLIDE 43

Admin Weakens Security Trust Factors: ‘OR

  • If 2 Admins (OR)
  • Admin 1 and Admin 2 TF = .9 Each
  • Total TF = TF1 * TF2 = .81 (<.9)
  • If 2 Admins (OR)
  • Admin 1 TF = .9
  • Admin 2 TF = .5
  • Total TF = .9 * .5 = .45!
  • Lower TF than the Weakest Link!
slide-44
SLIDE 44

2MR

slide-45
SLIDE 45

2MR Goal

  • Ensure that Administrators Do Not Exceed Authority
  • Ensure They Do Not Cause Inten<onal or Accidental Damage
  • Reduce Risk From Insiders With Authority
slide-46
SLIDE 46

Two Man Rule: #1

  • Admin 1 + Admin 2 = Security Relevant Changes
  • Must Have 2 Authorized Admins Prior to Change
slide-47
SLIDE 47

Problems With Two Man Rule

  • Forces Hierarchal Administra<on for Security Relevant Changes
  • Good!
  • Slows Down Process/Func<onality
  • Bad!
  • How Do We Achieve Balance?
  • Time, of course!
slide-48
SLIDE 48

Do You Trust Your Partner?

slide-49
SLIDE 49

Binary Trust

  • Complete Trust is Placed in One Individual Over A Network
  • What is Your Trust Factor?
slide-50
SLIDE 50

TRUST FACTORS (Analogue)

slide-51
SLIDE 51

FEEDBACK

slide-52
SLIDE 52

Intel ‐ Market Research Decision Making (C3I) War figh<ng/ Deployment – Product/Service Launch

OODA Loop (JIT-Supply Chain)

Observe Orient Decide Act

Contextualize

slide-53
SLIDE 53

Squeezing the Loop(t)

O O D A

O O D A

O O D A

O O D A

O O D A O O D A OO D A

Time Time

slide-54
SLIDE 54

Defense in Depth - OODA

O O D A

O O D A O O D A O O D A O O D A

O O D A O O D A O O D A O O D A
slide-55
SLIDE 55

Feedback Is Analogue (Equilibrium vs. Chaos/Tipping Point)

Acoustic Electrical Mechanical Abstrac<on

slide-56
SLIDE 56

Haptics/Learning

slide-57
SLIDE 57

Adding Time Based Security to Protection Products

Protec<on Process

Reac<on Channel Start Clock Stop Clock If T > x, then R Process Request Process Approval Process Stopped?

slide-58
SLIDE 58

TBS Feedback

  • Admin A AND Admin B Must Agree, but. . .
  • Security Ac<on Can Occur Before B Agrees
  • Saves Time, Increases Exposure & Vulnerability

A B

slide-59
SLIDE 59

Using TBS to Enforce 2MR Security Admin Process

Reac<on Channel Start Admin 2 Clock Stop Admin 2 Clock If T > x, then R Admin 1 Request Admin 1 Request Approval Admin 1 Request Stopped?

slide-60
SLIDE 60

Adding TBS to I&A Mechanisms I& A

Reac<on Channel Start Clock Stop Clock I&A Request I&A Approval I&A Stopped? P = Maximum Window for Authen<ca<on. D = Amount of Time It Takes to Detect a Users Sign‐on R = Amount of Time It Takes to Sever a Connec<on

slide-61
SLIDE 61

Adding TBS to Access Control

Reac?on Channel Start Clock Stop Clock Process Request Process Approval Process Stopped? P = Time To Provide Legi<mate Access To Resources D = Time To Detect R = Time To Respond

slide-62
SLIDE 62

Fundamental ‘Bit’ of Feedback

slide-63
SLIDE 63

Adding Analogue Feedback (Time)

slide-64
SLIDE 64

T-AND Gate

Truth Table

slide-65
SLIDE 65

How Do You Launch A Nuclear Missile?

slide-66
SLIDE 66

Launch a Nuke Circuit

Launch

slide-67
SLIDE 67

Go Out of Band (OOB)

slide-68
SLIDE 68

O.O.B. - Time Based Escalation

APT: 400+ Days… Seriously?

As Sensors > , [Dt + Rt] > 0 Common OOB Security Protocol

8

slide-69
SLIDE 69

Reaction Matrix

Desired Measured Detected Event (Anomaly) Chosen Reaction Time Time 3 Bad Password Attempts Log and Notify Admin 1 sec 2.4 secs 3 Bad Password Attempts Turn off Account/Notify Admin 1 sec .94 secs Mulitple Port Scan Initiate Trace Route 250ms 1.5 secs Internal User - Audit Bahavior #1 Involve HR Immediately Ping of Death Kill the Bastard :-) Syn-Ack Attack Reaction # 23 Mail Bombs Reaction # 81 Firewall Breach Attempt Autofilter Source 100ms 2.7 secs Traffic 2X Anticipated Log and Notify Admin Multiple Site Attack Shut Down Network 3 secs 2 Days Shut Down $ Server Isolate Network 1 min 2.4 hours

Sample Reaction Matrix

slide-70
SLIDE 70

What events matrix build

slide-71
SLIDE 71
  • E‐Mail
  • File Transfer
  • HTTP

Manufacturing Engineering Marke<ng Human Resources Route r Comms

Single Reaction Channel

Reaction Matrix: R1….Rn

slide-72
SLIDE 72
  • E‐Mail
  • File Transfer
  • HTTP

Manufacturing Engineering Marke<ng Route r Comms

Detection in Depth

Reaction Channel 1 Reaction Channel 2

Human Resources

OOB Security OOB Security

slide-73
SLIDE 73

Solving Denial of Service: OOB Comm

  • 1. Email Bombs
  • 2. Bandwidth Filling Spam
  • 3. Other Denial of Service

ISP ‐ 1 Hop Target Vic<m

  • 1. Detect Awack
  • 2. React
  • 3. Contact ISP
  • 4. Out‐of‐Band Comm
  • 5. Filter Awack @ISP
  • 1. Receive Detect/React Info
  • 2. Process/Validate Comm
  • 3. Filter Awack
  • 4. Establish Primary Channel
slide-74
SLIDE 74

Getting at the Source of DoS/CnC/Botnet

ISP Target Vic<m + Detect/React

  • 1. Target Detects and Reacts to ISP‐1
  • 2. ISP‐1 Calls its Partners
  • 3. ISP‐2 Matches ISP‐1 Detec<on
  • 4. ISP‐3 Calls its Partners
  • 5. ISP‐3 Matches ISP‐2 Detec<on
  • 6. Trace Till ISP‐Last

ISP ‐ 2 + Detect/React ISP ‐ 3 + Detect/React ISP ‐ Last + Detect/React DoS Source

slide-75
SLIDE 75

TCP/IP OOB Reac<on Channel D/R D/R D/R D/R D/R Mgmt. All Managemtnt Porn in English clear. Carbon unit analysis and subsequent reac<ons

Out of Band Analogue Security Detection in Depth & Reaction Channel

  • Lo‐BW
  • TBS Protocol
slide-76
SLIDE 76

Apply ‘Negative’ Time in Sensor & Reaction Based Networks

Use Delay Lines to match D(t) + R(t) or T‐AND Gates Op<mize for Lim Et = Lim (Dt) + Lim (Rt)

t > 0 t > 0 t > 0

Time Difference < 0, thus perfec<ng security.

  • Write (Input)
  • Delay Time
  • Read (Output)
slide-77
SLIDE 77

Theorem: Qi(t)/t  0 implies yi ≤ 0. Recall: Qi(t+1) = max[Qi(t) + yi(t), 0] Proof: Qi(τ+1) = max[Qi(τ) + yi(τ), 0] ≥ Qi(τ) + yi(τ). Thus: Qi(τ+1) ‐ Qi(τ) ≥ yi(τ) for all τ. Use telescoping sums over τ in {0, …, t‐1}: Qi(t) – Qi(0) ≥ ∑τ=0 yi(τ). Divide by t and take limit as t ∞.

t‐1

slide-78
SLIDE 78

What Else Can Analogue Network Security Do For You?

  • Encourage International Cooperation
  • Measure NW Security … Now!
  • Talk to Risk Folks
  • Added Resilience
  • Stop Bots
  • Malware Scanning w/NW-Delay Line
  • Stop Click Through Infections (NW-DL)
  • IoT – End Point ‘Intelligence’
  • Improved Mobile/Remote Security
  • Enhanced Two Factor

I have not figured it all out yet…

slide-79
SLIDE 79

Analogue Network Security Tenets

Nothing is Absolute (‘0’ or ‘1’) Digital is Not Binary Dynamic Approach (vs. Sta<c) Time is the Security Metric All Data (NWs) Are Not Equal Security is Fractal Use Trust Factors Apply Two Man(+) Rule Feedback/OODA Apply Detec<on in Depth Sensor Based Granularity OOB Comm Fundamental New Logic Elements

slide-80
SLIDE 80

Winn Schwartau, Founder & CEO +1.727.393.6600 Winn Schwartau

  • www.AnalogueNetworkSecurity.Com
  • +1 727 393 6600
  • CEO/Founder
  • TheSecurityAwarenessCompany.Com
  • Winn@TheSecurityAwarenessCompany.com

facebook.com/TheSACompany twiwer.com/SecAwareCo

linkedin.com/company/the‐security‐awareness‐company

Comments? Questions? Responses?

.COM