resilient networking thorsten strufe · 20.04.2015 fs wintersemester fs sommersemester 1 2...

55
Resilient Networking Thorsten Strufe Dresden, SS 15 Disclaimer: this course has been created with very valuable input from Günter Schäfer, Mathias Fischer, and the members of the Chair.

Upload: others

Post on 25-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Resilient Networking

Thorsten Strufe

Dresden, SS 15

Disclaimer: this course has been created with very valuable input from Günter Schäfer, Mathias Fischer, and the members of the Chair.

Page 2: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 2

Lecture Outline

Who are we?

Organizational matters (Preliminaries)

Course outline

A brief introduction

20.04.2015

Page 3: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 3

Who is Who

Professur „Datenschutz und Datensicherheit“

For this lecture:

• Thorsten Strufe (Lectures) • INF 3070 / +49 351 463 38247

• thorsten.strufe [at] tu-dresden.de

Teaching assistants

• This lecture doesn‘t have one.

• Stefanie Roos for some math/darknet parts

Consultation:

• Send me an Email (repeatedly…)

https://dud.inf.tu-dresden.de

20.04.2015

Page 4: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 4

What We‘re Interested In

• Can we prevent surveillance and retain our privacy?

• How can networks be made robust and secure?

• How can you communicate with confidentiality?

• Can we provide competitive (useful and performant) services without snooping on the users?

• Social Networking? • Recommendation Systems? • Data Mining on confidential data (biomedical!)?

• How can we analyse this context and develop sustainable

solutions (scientifically)?

• With everything getting digital: how can we avoid the next big data-loss desaster? [1] [2] [3] [4]

20.04.2015

Page 5: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 5

The fields we‘re working on

Surveillance Prevention

• Anonymous Communication

• Darknets

• Social network privacy

Network Security

• Network resilience

• Secure Network Coding

• DoS-resistant streaming

Secure Computation

• Personalized Medicine

• Private gene comparison

• Oblivious Recommenders

Secure Internet of Things

• Secure Smart Grids

• Smart Metering

• Secure Smart Homes

• Secure eTicketing Systems

20.04.2015

Data Collection

• Crawling and Monitoring

• User behavior understanding

& Analysis

• Dynamic complex graphs

• Inference prevention

Page 6: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 6

What we offer you

20.04.2015

FS Wintersemester FS Sommersemester

1 2 Informations- und Kodierungstheorie

3 Betriebssysteme & Sicherheit 4 Forschungslinie

5 BAS-4 SaC-1 / Kanalkodierung

6 BAS-4 SaC-2/Crypto

7 8 Vert-4, ANW/AFT, Beleg SaC-2/Crypto/Resilient Networking

9 Vert-4, ANW/AFT FB-Mining/Kanalkodierung

10 Diplomarbeit

FS Wintersemester FS Sommersemester

B1 B2 Informations- und Kodierungstheorie

B3 B4

B5 B-510 Betriebssysteme & Sicherheit

B6 B-520 Bachelor-Thesis

M1 BAS-4 M2 BAS-4, VERT-4, ANW

M3 Vert-4, FPA M4 Master-Thesis

B-510/B-520: • Security & Crypto 1 • S&C 2 (PETs) • Kanalkodierung • Seminare/Praktika

BAS-4: • Security & Crypto 1 • S&C 2 (PETs) • Crypto • Kanalkodierung Vert-4: • S&C 1&2 • Crypto • Resilient Networking • Mining Facebook • Kanalkodierung

Page 7: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 7

Some Words Regarding this Course

Main topic of the course is the security of deployed, crucial networks, networking functions, and network protocols.

Considering the Internet: networking is an essential service, hence the networking infrastructure is/may be the main target of attacks!

Now what!?

Page 8: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 8

Preliminary Course Overview

1. Introduction

2. Graphs and graph theory

3. Crypto basics (Symmetric/Asymmetric/MACs)

4. Link-Layer Security

5. IPsec

6. Resilient Routing (Attacks on BGP, SBGP)

7. TLS

8. DNS Security

9. DDoS and Countermeasures

10.Resilient Overlay Networks / Darknets

11.Intrusion Detection and Response

20.04.2015

Page 9: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 9

Organizational Matters

There will be some ex-cathedra parts, but please ask and discuss as much as possible!

Course Language Slides are in English, presentation as you prefer

=> What‘s your language of preference?

Slide history Based on several former courses given at TU Ilmenau, Uni

Mannheim, and TU Darmstadt

Heavily derived from „Network Security“ and „Protection of Communication Infrastructures“ of/with Prof. Schäfer in Ilmenau

20.04.2015

Page 10: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 10

Organizational matters

Courses • Mo 14:50 – 15:20 • E010

Exercises • Wed 9:20 – 10:50 • E009 (starts now, first meeting in CW 20: May 13, prepare now)

Exams • Oral exams, make appointments • Procedure:

• Questions available in German (and English upon request) • Answers given in German (and English upon request)

• No written material allowed (books, slides, notes) • Except language dictionaries for non-native speakers (German/English),

without any personal add-ons, handwritten comments, supplements, etc. • If needed, we will provide a list of important equations

All necessary information (will be) on the Web site

20.04.2015

Page 11: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 11

The Reading Group (Exercises)

Exercise course will be organized as a reading group

• Papers (links) available on the webpage (soon)

• Read papers early…

• One paper with relation to lecture topics will be presented (by a random one of you!) and discussed (by you!) each week (please take note of the emphasize on YOU :-) )

20.04.2015

Page 12: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 12

The Reading Group

Intention of the reading group is to learn • from good (and bad) scientific papers • that what others do is mostly no rocket science • how to read a paper properly

(for sure not in the order from beginning to the end!)

Different kinds of papers Papers: the classic form of scientific content spreading, a single contribution • Workshops: Early ideas, WiP, Challenges/discussions

(“Recurring issues with spark-plug electrodes”) • Conferences: concise studies (“On the electrode shapes

in spark-plug design”) Journal papers: self-contained (“On spark-plug design”) Surveys: summarizing a field or research area

Page 13: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 13

The Reading Group – Reviewing Papers

Paper idea • What is the field of research? What is the motivation of the

paper? • What is the problem the paper tries to solve? • What is the research question? • How relevant is this research? • What is the paper hypothesis? Paper content • What are the assumptions of the paper? • Which definitions are contained? • What is the idea for solving the problem? • Which implications does it entail? • How is the evaluation carried out? What about the results? Critical acclaim: Merits & Shortcomings

Page 14: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 14

The Reading Group – Reviewing Surveys (1)

Page 15: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 15

The Reading Group – Reviewing Surveys (2)

What is the field of research? What is the exact problem domain?

Survey content

• What are the assumptions in the survey? Which definitions are used?

• Aspects, requirements, concepts, properties?

• Which classification is used?

• Which implications does each class entail?

Critical acclaim

• How convincing are classification and implications?

• Completeness of the survey

• Merits & shortcomings

Page 16: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 16

Material

Slides/recordings will be on the web site

Literature/References

• Schäfer, Roßberg: Network Security

• For crypto: Dan Boneh‘s coursera course

• David Kahn: The Codebreakers

• Simon Singh: The Code Book

20.04.2015

Page 17: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 17

Questions?

Page 19: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 19

Potential Attackers and an Adversary Model

A word on assumptions.

Assume an omnipotent adversary. She could:

• access all information of interest

• compromise arbitrary intermediate systems

• physically destroy any or all components

Could we deal with this?

Unfortunately, no:

„Nothing can protect from an omnipotent adversary.“

More realistic (specific!) model of adversaries needed. 20.04.2015

Page 20: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 20

On Eve, Mallory, Craig, and Trudy…

An adversary model needs to define

• The intention of the adversary • Break and/or access <something>

• The behavior • Passive or active?

• The capabilities of an attacker • Computational capacity

• Resources (time and money)

• The area of control • Insider or outsider?

• Local, regional, or global?

20.04.2015

Page 21: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 21

The Dolev - Yao Model

Mallory has full control over the communication channel

• Intercept/eavesdrop on messages (passive)

• Relay messages

• Suppress message delivery

• Replay messages

• Manipulate messages

• Exchange messages

• Forge messages

But:

• Mallory can‘t break (secure) cryptographic primitives!

20.04.2015

Page 22: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 22

Motivation: A Changing World

Let’s get started!

“Always on”, ubiquitous connectivity to the global Internet has dramatically changed the way we

communicate,

conduct business, and

organize our society

Sensor networks and pervasive computing promise to create an additional layer of networked devices

However, the benefits associated with information and communication technology imply new vulnerabilities

The modern information society exhibits an increasing dependence on availability and secure operation of communication services

Page 23: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 23

What are „Resilient Networks“?

“Resilience is the ability of the network to provide and maintain an adequate level of service in the face of challenges to normal operation”

“Resilience is the ability of the network to provide and maintain an acceptable level of security service in case some nodes are compromised.”

Challenges? Compromised nodes…?

What kind of problems, challenges, threats could you imagine?

What exactly do these terms mean, anyway?

Sterbenz: Resilinets, 2006-2008 Chen et al.: Sensor Network Security, 2009

Page 24: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 24

Resilience Disciplines

Resilience comprises a multitude of disciplines

Sterbenz, James P.G. , Hutchison, David, Çetinkaya, Egemen K.. Jabbar, Abdul, Rohrer, Justin P, Schöller, Marcus and Smith, Paul. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. IEEE Computer Networks, 2010

Page 25: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 25

Resilience – Challenge Tolerance (1)

Survivability Capability of a system to fulfill its mission,

in a timely manner,

in the presence of threats such as attacks or large-scale natural disasters.

Covers correlated failures as result of intelligent adversary and failures of large parts of network infrastructure

Requires diversity: same fate unlikely to be shared by parts of system undergoing correlated failures

Fault tolerance Subset of survivability

Ability of system to tolerate faults to

prevent service failures

Relies on redundancy to compensate

random uncorrelated failures of components

Provides no sufficient coverage when facing correlated failures

Page 26: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 26

Resilience – Challenge Tolerance (2)

Disruption tolerance

Ability of a system to tolerate disruptions in the connectivity among its components

Traffic tolerance

Ability of the system to tolerate unpredictable offered load without a significant drop in carried load

Page 27: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 27

Resilience – Trustworthiness (1)

Dependability Quantifies resilience of the service delivery by a system

Basic measures

Mean Time To Failure (MTTF)

Mean Time To Repair (MTTR)

Consists of

Availability: readiness for usage

Reliability: continuous service delivery

Security Property of a system, and the measures taken such that it

protects itself from unauthorized access or change

Security shares availability and reliability with dependability

Page 28: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 28

Resilience – Trustworthiness (2)

Performability Property of a system such that it delivers performance

required by the service specification (QoS) such as:

delay

throughput or goodput

packet delivery ratio

Extends binary dependability concepts to the range of degradable systems

Page 29: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 29

Resilience – Robustness and Complexity

Robustness Control-theoretic property that relates the operation of a

system to perturbations of its inputs

In context of resilience, robustness describes trustworthiness of a system in the face of challenges that change its behavior

Complexity Refers to the way large numbers of systems

interact, resulting in emergent behavior

Resilience mechanisms increase complexity

Page 30: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 30

Threats in Communication Networks

Abstract Definition: • A threat is any possible event or sequence of actions that

might lead to a violation of one or more security goals • The actual realization of a threat is called an attack

Examples: • A hacker breaking into a corporate computer • Disclosure of emails in transit • Someone changing financial accounting data • A hacker temporarily shutting down a website • Someone using services or ordering goods

in the name of others

• ...

What are security goals? • Security goals can be defined:

depending on the application environment, or in a more general, technical way

Copyright © 2008 UC Regents. all rights reserved

Page 31: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 31

Security Goals in Application Environments

Public Telecommunication Providers: • Protect subscribers’ privacy

• Restrict access to administrative functions to authorized personnel

• Protect against service interruptions

Corporate / Private Networks: • Protect corporate confidentiality / individual privacy

• Ensure message authenticity

• Protect against service interruptions

All Networks: • Prevent outside penetrations (who wants hackers?)

Security goals are also called security objectives

Page 32: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 32

Security Goals Technically Defined (CIA)

Confidentiality: • Data transmitted or stored should only be revealed to the

intended audience • Confidentiality of entities is also referred to as anonymity

(Data) Integrity: • It should be possible to detect any modification of data • This requires to be able to identify the creator of some data

Availability: • Services should be available and function correctly

Accountability:

• It should be possible to identify the entity responsible for any communication event

Controlled Access: • Only authorized entities should be able to access

certain services or information Several other models have been proposed, anything beyond CIA

is constantly subject to arguments and discussions…

Page 33: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 33

Threats Technically Defined

Masquerade: • An entity claims to be another entity

Eavesdropping: • An entity reads information it is not intended to read

Authorization violation: • An entity uses a service or resources it is not intended to use

Loss or Modification of (transmitted) information: • Data is being altered or destroyed

Denial of Communication Acts (Repudiation): • An entity falsely denies its participation in a communication act

Forgery of information: • An entity creates new information in the name of another

entity

Sabotage: • Any action that aims to reduce the availability and / or correct

functioning of services or systems

Page 34: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 34

Threats and Technical Security Goals

Threats are often combined in order to perform an attack!

General Threats

Technical Security Goals

Masquer-ade

Eaves-dropping

Authori-sation

Violation

Loss or Mo-dification of

(transmitted) information

Denial of Communi-cation acts

Forgery of Infor-mation

Sabotage (e.g. by

overload)

Confidentiality x x x

Data Integrity x x x x

Accountability x x x x

Availability x x x x

Controlled Access

x x x

Page 35: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 35

Interlude: Security Services

Security Service:

• An abstract “service” seeking to ensure a specific security property

• Can be realised with the help of cryptographic algorithms and protocols or with conventional means:

Keep electronic document on a floppy disk confidential by storing it on the disk in an encrypted format or locking away the disk in a safe

Usually a combination of cryptographic and other means is most effective

Page 36: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 36

Security Services – Overview

Authentication

• Ensure that an entity has in fact the identity it claims to have

Integrity

• Ensure that data created by specific entity isn’t modified without detection

Confidentiality

• Ensure the secrecy of protected data

Access Control

• Ensure that each entity accesses only services and information it is entitled to

Non Repudiation

• Prevent entities participating in a communication exchange from later falsely denying that the exchange occurred

Page 37: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 37

More Terminology: Crypto-*

Cryptographic Algorithm:

• A mathematical transformation of input data (e.g. data, key) to output data

• Cryptographic algorithms are used in cryptographic protocols

Cryptographic Protocol:

• A series of steps and message exchanges between multiple entities in order to achieve a specific security objective

Cipher: a tuple of algorithms to en- and decrypt

Plain-/Ciphertext

Credentials, Keys, and Keying material

20.04.2015

Page 38: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 38

Network Security Analysis

To find countermeasures, threats have to be evaluated appropriately for a given network configuration.

Therefore, a detailed network security analysis is needed that: • evaluates the risk potential of the general threats to the entities

using a network, and

• estimates the expenditure (resources, time, etc.) needed to perform known attacks.

Attention: It is generally impossible to assess unknown attacks!

A detailed security analysis of a given network configuration / specific protocol architecture:

• might also be required to convince financially controlling entities in to grant funding for security enhancements, and

• can better be structured according to the more fine grained attacks on the message level.

Page 39: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 39

Architectural View of the Threatened “Object”

End- system

End- system

Network

Layer 5

Layer 4

Layer 3

Layer 5

Layer 4

Layer 3 Layer 3 Layer 3

Application Layer

Transport Layer

Network Layer Network Layer

Layer 2

Layer 1

Layer 2

Layer 1

Layer 2

Layer 1

Layer 2

Layer 1

Data Link Layer

Physical Layer

Data Link Layer

Physical Layer

Communication in Layered Protocol Architectures

Page 40: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 40

Security Analysis of Layered Protocol Architectures 1

Dimension 1: At which interface could an attack take place?

Endsystem (Initiator)

Endsystem (Responder)

Network

? ? ?

Page 41: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 41

Security Analysis of Layered Protocol Architectures 2

Layer 5

Layer 4

Layer 3

Layer 2

Layer 1

Layer 5

Layer 4

Layer 3

Layer 2

Layer 1

Layer 3

Layer 2

Layer 1

Layer 3

Layer 2

Layer 1

Application Layer

Transport Layer

Data Link Layer

Physical Layer

Network Layer

Data Link Layer

Physical Layer

Network Layer

?

?

?

?

?

Dimension 2: In which layer could an attack take place?

Page 42: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 42

Potential Points of Attack

End- system

Layer 5

Layer 4

Layer 3 Layer 3 Layer 3 Network Layer

Layer 2

Layer 1

Layer 2

Layer 1

Layer 2

Layer 1

Data Link Layer

Physical Layer

End- system

Layer 5

Layer 4

Layer 3

Layer 2

Layer 1

?

?

?

?

?

Network

? ? ?

Network Layer

Data Link Layer

Physical Layer

Application Layer

Transport Layer

Page 43: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 43

Security Analysis of Communication Infrastructures

Generally, attack techniques are based on: • Passive behaviour:

Eavesdropping

• Active behavior: Delay of PDUs (Protocol Data Units)

Replay of PDUs

Deletion of PDUs

Modification of PDUs

Insertion of PDUs

All have to be considered for security analyses!

Successful launch of one of the above attacks requires: • No detectable side effects to other communications

(connections / connectionless transmissions)

• No side effects to other PDUs of the same connection / connectionless data transmission between the same entities

Page 44: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 44

Towards a Systematic Threat Analysis

One approach: produce arbitrary threat list by any ad-hoc brainstorming method Example: Hospital Information System

Corruption of patient medical information Corruption of billing information Disclosure of confidential patient information Compromise of internal schedules Unavailability of confidential patient information ...

Drawbacks of this approach: • Questionable completeness of identified threats • Lack of rationale for identified threats other than experience • Potential inconsistencies (e.g. disclosure vs. unavailability of

confidential patient information in the example above)

Page 45: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 45

Threat Trees: One Systematic Threat Analysis Approach

A threat tree is a tree with: • nodes describing threats at different levels of abstractions, and • subtrees refining the threat of the node they are rooted at, • where the child nodes of one node give a complete refinement

of the threat represented by the parent node

Technique for establishing threat trees: • Start with general, abstract description of complete set of threats

for a given system (e.g. “security of system X compromised”) • Iteratively, gradually introduce detail by carefully refining the

description • Each node becomes root of a subtree describing threats

represented by it • Eventually, each leaf node of the tree provides a description of a

threat that can be used for a (less arbitrary) threat list

The main idea of this technique is to postpone the creation of (arbitrary) threat lists as much as possible

Page 46: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 46

Example: A Hospital Information System Threat Tree

Hospital System Threats

Patient Medical Information Non Patient Medical Information

Life Threatening Non Life Threatening

Disclosure Integrity

Billing Non Billing

Denial of Service ... ...

(source: [Amo94])

At each level of refinement the child nodes of a node must maintain demonstrable completeness to allow for confidence that nothing is missing

...

Page 47: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 47

Inferring Composed Threat in Threat Trees

These relations can be used to infer composed threat:

• Augment nodes with effort estimations (e.g. easy, moderate, high)

• OR-related composed threat inferred as the lowest effort value subtree (the attacker will most likely take the easy way...)

• For conjunction, infer highest effort (all threats have to be realized)

Child nodes can have different relations to their parent nodes

The two most common relations are AND and OR:

Disjunction Conjunction

Threat

Subthreat Subthreat

OR

Threat

Subthreat Subthreat

AND

Page 48: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 48

Supporting System Security Engineering with Threat Trees

Appropriate attributes are, e.g., estimated criticality and attacker effort for individual threats

Threat trees then can help to gain insight where to spend resources to decrease the overall system’s vulnerability:

Threat

Subthreat A Subthreat B

Criticality = 4 Effort = 2

Risk = 2

Criticality = 6 Effort = 1

Risk = 6

Threat

Subthreat A Subthreat B

Criticality = 4 Effort = 2

Risk = 2

Criticality = 6 Effort = 3

Risk = 2

The second threat tree re-evaluates the risk after some protective measure has been taken to increase the attacker’s effort for subthreat B

Here, risk is assessed as: Risk = Criticality / Effort

OR OR

Page 49: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 49

Summary (High Level System Security Engineering Process)

• Specify system architecture: Identify components and interrelations

• Identify threats, vulnerabilities and attack techniques: The threat tree technique provides help for this step

• Estimate component risks by adding attributes to the threat tree:

However, removing subjectivity from initial assessments is often impossible and other attributes than criticality and effort (e.g. risk of detection) might have to be considered as well

• Prioritize vulnerabilities: Taking into account the components’ importance

• Identify and install safeguards: Apply protection techniques to counter high priority vulnerabilities

• Perform potential iterations of this process Re-assess risks of the modified system and decide, if more

iterations are required

Page 50: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 50

A High Level Model for Internet-Based IT-Infrastructure

Private Networks Mobile Communication Networks Public Internet

...

Access Network

Web-Server

ISP Networks Support Infrastructure

Network Management

DNS Server

...

Page 51: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 51

Countering Attacks: Three Action Classes

Prevention:

• Measures taken to avert that an attacker succeeds in realizing a threat

• Examples: Cryptography: encryption, computation of modification detection codes, running

authentication protocols, etc.

Firewalls: packet filtering, service proxying, etc.

Detection:

• Measures taken to recognize an attack while or after it occurred

• Examples: Recording and analysis of audit trails

On-the-fly traffic monitoring

Reaction:

• Measures taken in order react to ongoing (mitigation and healing) or past attacks

• Examples: Adding new firewall rules

Traffic re-routing

(DDS: Prevention, Removal, Forecasting, Tolerance/Graceful degradation)

Page 52: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 52

Safeguards Against Information Security Threats 1

Physical Security: Locks or other physical access control

Tamper-proofing of sensitive equipment

Environmental controls

Personnel Security: Identification of position sensitivity

Employee screening processes

Security training and awareness

Administrative Security: Controlling import of foreign software

Procedures for investigating security breaches

Reviewing audit trails

Reviewing accountability controls

Emanations Security: Radio Frequency and other electromagnetic emanations controls

Referred to as TEMPEST protection

Page 53: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 53

Safeguards Against Information Security Threats 2

Media Security: Safeguarding storage of information Controlling marking, reproduction and destruction of sensitive

information Ensuring that media containing sensitive information are

destroyed securely Scanning media for viruses

Lifecycle Controls: Trusted system design, implementation, evaluation and

endorsement Programming standards and controls Documentation controls

Computer / System Security: Protection of information while stored / processed in a system Protection of the computing devices / systems themselves

Communications Security: Protection of information during transport from one system to

another Protection of the communication infrastructure itself

Page 54: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 54

Course Objectives

This course tackles the following aspects: Threats to and measures for ensuring availability

Threats and measures concerning systems (beyond pure network security protocols which are more targeting transmission security)

Measures for intrusion detection and response

Considering the Internet: networking is an essential service, hence the networking infrastructure is/may be the main target of attacks! We‘ll hence be looking at the security of deployed, crucial networks, networking functions, and network protocols.

Page 55: Resilient Networking Thorsten Strufe · 20.04.2015 FS Wintersemester FS Sommersemester 1 2 Informations- und Kodierungstheorie 3 Betriebssysteme & Sicherheit 4 Forschungslinie 5 BAS-4

Privacy and Security Folie Nr. 55

Summary

You know who we are

You know what to expect from the lecture

You have seen some trends that are happening

You have been introduced to Alice, Bob, Eve, and Mallory

You understand what threats are … and what this means

You can tell security goals (CIA!) from security services

You know how to perform a network security analysis using threat trees ;-)

20.04.2015