The Pump: 10 Years of Covertness Myong H. Kang Ira S. Moskowitz - - PowerPoint PPT Presentation

the pump 10 years of covertness
SMART_READER_LITE
LIVE PREVIEW

The Pump: 10 Years of Covertness Myong H. Kang Ira S. Moskowitz - - PowerPoint PPT Presentation

The Pump: 10 Years of Covertness Myong H. Kang Ira S. Moskowitz Stanley Chincheck Center for High Assurance Computer Systems US Naval Research Laboratory Code 5540 Washington, DC mkang@itd.nrl.navy.mil 1 A Brief History Started in 1993


slide-1
SLIDE 1

1

The Pump: 10 Years of Covertness

Myong H. Kang Ira S. Moskowitz Stanley Chincheck

Center for High Assurance Computer Systems

US Naval Research Laboratory Code 5540 Washington, DC mkang@itd.nrl.navy.mil

slide-2
SLIDE 2

2

A Brief History

!

Started in 1993 addressing data replication from Low database to High database

  • M. H. Kang and I. S. Moskowitz, “A Pump for rapid,

reliable, secure communication,” Proceedings of the First ACM Conference on Computer and Communications Security, 1993

!

Wanted to replace XTS-200 !

Network Pump algorithm was developed in 1995

!

Hardware version of the Pump

Completed January 2004 by NRL 5540

!

Navy Type accredited

As a critical security component of a cross-domain solution

Installed in various DoD facilities

!

About 60 in use

!

$3K for DoD customers !

Many papers later

US Patent filed, Navy Case #84,150, 25 July 2003

Applied for international rights

Trademarked “Network Pump™” name

!

17.5"W x 1.75"H x 10.5"D

!

19” rack mount

!

Ethernet 100BaseT interface

slide-3
SLIDE 3

3

Design Requirements

! Assurance

– Simple and easy to understand to facilitate accreditation – Protocol neutral

! Reliability

– No loss of messages – No duplication of messages

! Performance

– No reduction of data transfer rate due to security reasons

slide-4
SLIDE 4

4

Design Requirements (cont’d)

! Covert channel

– Reduce covert channel capacity as much as possible

without compromising performance

! Fairness

– Fair rates among many senders and many receivers

! Denial of service attack

– Resist denial of service attacks

slide-5
SLIDE 5

5

Basic Pump

Low system

Low application Low wrapper

Low system

Low application Low wrapper Non-volatile buffer

Pump High system

High wrapper High application

High system

High wrapper High application

Data Stochastic ACK Data ACK Low LAN High LAN

slide-6
SLIDE 6

6

Basic Pump (cont’d)

! The Pump’s confidentiality properties depend solely on the Pump

itself, not on the wrappers - Assurance

Separates MLS functions from other functions

Wrappers make the Pump a generic device that is independent of a specific application

! Provide ACKs to a sender - Reliability ! Provide non-volatile buffer - Reliability

Decoupled Low ACKs from High ACKs - Covert Channel

Low ACKs are stochastic ACKs based upon a moving average of the past m High ACK times - Performance

slide-7
SLIDE 7

7

Network PumpTM

. . . . . . L1 LI H1 . . . . . . HJ

Output buffer 1 Output buffer J

THP1 THPJ

Trusted Low Process

I{ I{ J{ J{

. . . . . .

ROUTING link1 linkI

. . . .

Receiver 1 Receiver I scheduler scheduler

slide-8
SLIDE 8

8

Network PumpTM (cont’d)

! Share output buffers among different sessions -

efficiency

! Acting as a router between receiving buffers and

  • utput buffers

– Round robin scheme - fairness and denial of service attack – Fair size - keep the queue length at a certain level - covert

channel and denial of service attack

slide-9
SLIDE 9

9

Hardware Pump

9

Dual Port RAM (Bypass Channel) High LAN Interface Low LAN Interface Administrator Interface Power Interface

  • VCC_5

VCC_12 VCC_3.3 VCC_RAM Reset Power_Fail

  • Fault

8

High RAM Security Monitor High EEPROM Low RAM Low EEPROM

High Microprocessor Low Microprocessor

High Ethernet Interface Serial Interface Power & Reset Control Battery Low Ethernet Interface

Control

slide-10
SLIDE 10

10

Hardware Pump (cont’d)

! Provides an interface to an administrator workstation

  • configuration and receiving error and performance

reports

– Specify Low and High IP addresses and port numbers for

  • pening connections

! Equipped with a built-in backup battery - Reliability

– Power failure: All messages in the volatile RAM will be

saved into non-volatile flash memory

– Pump start up: All undelivered messages will be restored to

the RAM and redelivery to the High IP addresses will commence

slide-11
SLIDE 11

11

!

  • J. McDermott, “The B2/C3 problem: How Big Buffers Overcome Covert Channel

Cynicism in Trusted Database Systems,” in Biskup, J., M. Morgenstern, and C. E. Landwehr, eds. Database Security, VIII: Status and Prospects. IFIP Transactions A-60, Elsevier Science B.V., Amsterdam, 1994.

!

  • R. Mraz, “Secure Directory File Transfer System”, Proc. 12th Annual Canadian

Information Technology Security Symposium, 2000.

!

  • N. Ogurtsov, H. Orman, R. Schroeppel, S. O'Malley, O. Spatscheck, “Experimental

results of covert channel limitation in one-way communication systems,” Network and Distributed System Security, 1997.

!

“Owl Computing Data Diode,” Common Criteria Security Target (EAL2), http://niap.nist.gov/cc-scheme/st/ST_VID4000-ST.pdf

!

US Patent 5,703,562, Method for Transferring Data from an Unsecured Computer to a Secured Computer, C.A. Nilsen Dec 30, 1997.

!

  • M. Bobbitt, “(Un)bridging the Gap,” Information Security, July 2000.

Related Ideas

slide-12
SLIDE 12

12

!

  • V. Anantharam, and S.Verdu, “Bits through queues,” Information Theory, IEEE

Transactions on , Volume: 42 , Issue: 1 , Jan. 1996.

!

  • V. Anantharam and S. Verdú, ``Reflections on the 1998 Information Theory Society

Paper Award: Bits through Queues,'' IEEE Information Theory Society Newsletter vol. 49, no. 4, Dec. 1999.

!

  • J. S. Holmgren and R. P. Rich, Metric Methodology for the Creation of Environments

and Processes to Certif Component: The NRL Pump, Naval Postgraduate School Monterey CA, March 2003.

!

  • A. Aldini and M. Bernado, “An Integrated View of Security Analysis and Performance

Evaluation: Trading QoS with Covert Channel Bandwidth” to appear: SAFECOMP 2004.

!

  • A. Aldini and M. Bernado, Measuring the Covert Channel Bandwidth in the NRL Pump,

technical report 2004, http://mefisto.web.cs.unibo.it/PubblSedeC0.html

!

  • R. Lanotte, A. Maggiolo-Schettini, S. Tini, A. Troina, and E. Tronci, Automatic Analysis
  • f the NRL Pump, preprint, 2004 www.di.unipi.it/~troina/mefisto/drafts/NRLdraft.pdf

Pump Relevant (non NRL)

slide-13
SLIDE 13

13 !

  • M. H. Kang and I. S. Moskowitz, “A Pump for rapid, reliable, secure

communication,” Proceedings of the first ACM Conference on Computer and Communications Security, 1993.

!

  • I. S. Moskowitz and M. H. Kang, “Discussion of a statistical channel,” Proceedings of

IEEE-IMS Workshop on Information Theory and Statistics, Alexandria, VA, 1994.

!

  • I. Moskowitz and M.H. Kang, “The Modulated-Input Modulated-Output Model,” Proc.

IFIP WG11.3 Workshop on Database Security, NY, August 1995.

!

  • J. Froscher, D. M. Golschlag, M. H. Kang,C. Landwehr, A. P. Moore, I. S. Moskowitz, and
  • C. Payne, “Improving Inter-Enclave Information Flow for a Secure Strike Planning

Application,” Proceedings of the 11th Annual Computer Security Applications Conference, pp.89 – 98,1995.

!

M.H. Kang and I. Moskowitz, “A data Pump for communication,” NRL Memorandum Report, 5540-95-7771, 1995.

!

  • M. H. Kang, I. S. Moskowitz and D. C. Lee, “A Network Version of the Pump,” Proc. 1995

IEEE Computer Society Symposium on Research in Security and Privacy. May 1995.

!

  • M. H. Kang, J. Froscher, and I. S. Moskowitz, “A Framework for MLS Interoperability,”
  • Proc. HASE’96, Niagara-on-the-Lake, Canada, October 1996.

Pump Relevant (NRL)

slide-14
SLIDE 14

14

!

  • M. H. Kang, I. S. Moskowitz, B. E. Montrose, and J. J. Parsonese, “A Case Study of Two

NRL Pump Prototypes,” 12th Annual Computer Applications Security Conference 1996.

!

  • M. H. Kang, I. S. Moskowitz. and D. C. Lee, “A Network Pump,” IEEE Transactions on

Software Engineering, vol. 22, no. 5, 1996.

!

  • M. H. Kang, A. P. Moore, and I. S. Moskowitz, “Design and Assurance Strategy for the

NRL Pump,” 2nd IEEE High-Assurance System Engineering Workshop (1997). IEEE Computer Magazine, Vol. 31, No 4, 1998.

!

US Patent application, 10/627,102, Navy Case #84,150, July 25, 2003.

Pump Relevant (NRL)

slide-15
SLIDE 15

15

Lessons Learned

! Bridge funding: Transitioning the product from

research and development to a certified real-world product

! Patient and flexible customers: Customers whose

patience and understanding afford some latitude in getting the product established

! Perseverance: The quality that the researchers and

developers had to exhibit to make this product a reality