what if we got a “do-over?” an overview of crash and mrc · 2012-06-10 · what if we got a...

39
What If We Got A “Do-Over?” an Overview of CRASH and MRC Howard Shrobe Program Manager, DARPA I2O Approved for Public Release, Distribution Unlimited

Upload: others

Post on 31-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What If We Got A “Do-Over?”an Overview of CRASH and MRC

Howard ShrobeProgram Manager, DARPA I2O

Approved for Public Release, Distribution Unlimited

Page 2: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

We are divergent with the threat…

Malware:125 lines of code*

Line

s of

Cod

e

1985 1990 1995 2000 2005 2010

xxxx

DEC Seal Stalker

Milky Way

Snort

Network Flight Recorder

Unified Threat Management10,000,000

8,000,000

6,000,000

4,000,000

2,000,000

0

Security software

* Public sources of malware averaged over 9,000 samples(collection of exploits, worms, botnets, viruses, DoS tools)

x

x

Approved for Public Release, Distribution Unlimited 2

Page 3: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

The US approach to cyber security is dominated by a strategy that layers security on to a uniform but architecture.

We do this to create tactical breathing space, but it is not convergent with an evolving threat.

Approved for Public Release, Distribution Unlimited 3

Page 4: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Two Models of Survivability

Fortress (traditional) Organism

• Impenetrable (hopefully)• Monolithic• Single Layer• Rigid• Immobile

• Many partial barriers• Heterogeneous• Defense in depth & Self Healing• Adapts, Learns, Evolves• Mobile

Approved for Public Release, Distribution Unlimited 4

Page 5: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

B cells

natural killer (NK) cells

CD3/CD4 T cell

CD3/CD8T cell

thymus

CD4

CD16/56

neutrophils

macrophages

dendritic cells

ADAPTIVE

INNATE

CD8

CD19

Fast, but inflexible, covers fixed sets of pathogen that are always present. Supports the adaptive immune system.

Slower, learns to recognize new sets of pathogens, distinguishes self from non-self, retains memory to guard against future attacks.

At least 20 – 30% of the body’s resources are involved in constant surveillance and containment.

Humans have Two Immune Systems:  Innate and Adaptive

Approved for Public Release, Distribution Unlimited 5

Page 6: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Biology and Computation: Two Design Styles

Computation Biological

Near Perfect Components Fallible components

Core design formed in era of scarcity Abundance of resources

Core design formed in isolated environment

Evolution in ecosystem of predators and parasites

Evolutionary pressure from market: price, performance and features

Evolutionary pressure from ecosystem: survivability

Self-regulation and adaptation rarely considered. Runs open-loop.

Self-regulation and adaptation are core mechanisms. Closed loop control.

No enterprise-wide survivability mechanisms

Diversity for population survivalPublic-health systems in human society

Approved for Public Release, Distribution Unlimited 6

Page 7: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

CRASH & MRC Apply Biological Principles

Innate Immunity: New hardware & operating system architecturesthat eliminate all common technical vulnerabilities

Population Diversity Computational techniques that:

• Increase entropy in time and space• Make every system unique• Raise work factor of attacker for each system

Adaptive ImmunityMiddleware that:

• Diagnoses root causes of vulnerabilities and builds situational assessment

• Quickly adapts & reconfigures• Learns from previous attacks and gets better at

self-protection

Approved for Public Release, Distribution Unlimited 7

Page 8: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What If We Got A “Do-Over?”

Innate Immunity: Complete Mediation Through Hardware Enforcement

Approved for Public Release, Distribution Unlimited

Page 9: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Hardware Mediation

Thread’sPrincipal

Data

Register File Result Data

TagsUnit

Operand 1

Operand 2

Tag 1

InstructionResult Tag

Trap SignalTag

ALU

Tag 2

Memory

DataData

Tag

Data

BoundsType

Provenance

Conventional Computer

Meta‐computing system

Access Rules

Approved for Public Release, Distribution Unlimited 9

Page 10: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Perspective

Tag Processing Unit is about 125K bits125,000 SRAM bits < 16K Bytes– Note: L1 Dcache on Opteron is 64KB

Dual and Quad core Opterons

Approved for Public Release, Distribution Unlimited 10

Page 11: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Separation via Compartments and Principals

Process Manager

• Each system component has its own compartment for its private data

• Each system component has its own principal for managing its private data

• System components may have “satellite” compartments and principals for controlled interactions with users and other system components

• Gates are used to control access to shared compartment and principals

Log ManagerSatellite for Interaction

Gate to control 

interaction

Gate to control 

interaction

Approved for Public Release, Distribution Unlimited 11

Page 12: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What If We Got A “Do-Over?”

Adaptive Immunity: Middleware for Diagnosis & Repair

Approved for Public Release, Distribution Unlimited

Page 13: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Defensive Architecture

System Models

Trust Model: Behavior

Compromises Attacks

Recovery And Regeneration

Adaptive Method Selection

Detection

Diagnosis

Attack Plan Recognition

InstrumentationSynthesizer

Application Software

Instrumentation

MachineLearning

Attack Plan

Library

Other Sensors: Intrusion Detectors

Approved for Public Release, Distribution Unlimited 13

Page 14: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Net benefit

Abstracttask

ServiceQualityParameters

User’sUtility

Function

The specific binding of parameters has a value to the user

Resource1,1

Resource1,2

Resource1,j

Each method requires different resources

Adaptation selects the method which maximizes expected net benefit

User invokes a task

ResourceCost

Function

The resources used by the

method have a cost

Each method binds the settings of Theparameters in a different way

Method1

Method2

Methodn

Each task can beprovided by severalmethods

Expected Net 

benefit

Trust Model:Risk of Failure

Likelihood of SuccessProbability of Success

*

Expected Cost of Failure

+ExpectedBenefit

ExpectedCost

+ ‐

Adaptation through decision theoretic use of functional redundancy

Approved for Public Release, Distribution Unlimited 14

Page 15: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

ClearView (SOSP 2009)

DAIKON:Invariant Learning

Memory Firewall(program shepherding)

Heapguard(out of bounds writes)

“Failure Oblivious” Repair – Invariant EnforcementE.g. Out of bounds write -> do nothing

Out of bounds read -> Return some array value

Approved for Public Release, Distribution Unlimited 15

Page 16: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Evolutionary Programming for Patch Generation

Automatically Finding Patches – Stephanie Forrest (CRASH)

Patched 55 out of 105 Bugs at an Average cost of $8 per patch

Program Lines ofCode

PathLength

ProgramDescription Vulnerability

nullhttp 5575 768 webserver remote heapoverflow

openldap io.c 6519 25 directory protocol non-overflow denial-of-service

lighttpd fastcgi.c 13984 136 webserver remote heap

overflow

atris 21553 34 graphical game buffer overflow

php string.c 26044 52 scripting language integer overflow

wu-ftpd 35109 149 FTP server format string

TOTAL 108784 1164

Approved for Public Release, Distribution Unlimited 16

Page 17: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What If We Got A “Do-Over?”

Eliminating Monoculture

Approved for Public Release, Distribution Unlimited

Page 18: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Monocultures are not survivable

• The attacker’s work factor is proportional to Entropy – When all systems are the same, a single attack disables them

all– When a single system never changes, the same attack will

work repeatedly

• We currently have a computational monoculture.

One attack fits them all

Approved for Public Release, Distribution Unlimited 18

Page 19: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Dynamic Diversity makes a single host different from moment to moment

Code and/or data blocks are periodically repositioned in memory so that attacker has to work harder to find a target.Garbage-Collected memory has the property inherently, new methods may optimize for increased entropy.

Address space randomization

Instruction-1

Instruction-2

Instruction-3

Instruction-4

Instruction-5

Instrution-6

Encrypted-1

Encrypted-2

Encrypted-3

Encrypted-4

Encrypted-5

Encrypted-6

Injected-1

Injected-2

Code is encrypted as it enters memory and Decrypted as it enters the instruction cache (or translation buffer). Injected code in native instruction set is then encrypted and not executable. Encryption key can be varied by process and time.

Disk Memory

instruction-1

instruction-2

instruction-3

instruction-4

instruction-5

instruction-6

Encrypted-1

Encrypted-1

ICacheInstruction set randomization

Functional Redundancy & Decision theoretic dispatch

Methodij

GoaliThere are multiple methods for achieving each goal (“n-version programming”). Each distinct method has different qualities of service. Method selection is driven both by preferences over QoS and by need for unpredictability.

QoSij

Approved for Public Release, Distribution Unlimited 19

Page 20: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What If We Got A “Do-Over?”

Moving beyond the host to the cloud

Approved for Public Release, Distribution Unlimited

Page 21: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

VirtualMachine

VirtualMachineVirtual

Machine

VirtualMachine

Multicore Chip 1U Blade in Blade Server

Blade Server Racks Blade Server NetworkModular Data Center

Your Software Lives Here

Cloud Computing Infrastructure

Approved for Public Release, Distribution Unlimited 21

Page 22: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

The drive to cloud computing:– The White House released a 25-point plan in December for reforming government IT, and it

included a requirement that agencies adopt a cloud-first policy for new IT deployments– “…we have found it is easier to secure the cloud… coming up with a defensible system is

important and cloud computing is one way to help make that possible. By shifting to a cloud architecture, the US would save money and be better placed to protect vital computer networks.” (Gen Keith Alexander, Nov 7, 2011)

Clouds On The Horizon

Motivations Concerns

Economic efficiency MonocultureAdded attack surface of hypervisor

Manageability of large scale data centers Concentration of hosts on high speed network with few internal barriers

Availability of “fungible computation” on demand.   Use on demand vs. build to worst case. 

“Fate sharing” among unrelated computations.

Centralization of data for common analytics

Obvious target for adversary & single point of failure

Approved for Public Release, Distribution Unlimited 22

Page 23: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

TODAYEach host Acts in isolation, making the enterprise weaker than the sum of its parts

• “Box” oriented• Vulnerable components• Static• Shared vulnerabilities• Implicit trust within enclave

amplifies vulnerabilities

RESILIENT CLOUDSActing as a community makes the enterprise stronger than the sum of its parts

• Mission optimized• Components from CRASH program• Moving target• Resilience through diversity• Collective defense & diagnosis across

enclave dampens vulnerabilities

Mission‐oriented Resilient Clouds:Turning Liabilities into Assets

Approved for Public Release, Distribution Unlimited 23

Page 24: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Objective: Sustain mission effectiveness. Different mission components have different security and performance needs and will make different trade-offs at run-time.Target: Achieve at least 80% of optimal mission effectiveness while using at most 150% of the “base” resource requirements.

time

Effectiveness

Conventional System(Crashes)

Initial Operational Capability

100% Critical Functionality

(attack)

Theoretical Optimal

Mission‐oriented Resilient Clouds

Approved for Public Release, Distribution Unlimited 24

Page 25: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Taskable Diversity Mission-Aware Networking

Initiating the Mission: Tasks are assigned to hosts and the network is configured to maximize mission effectiveness

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Task

s 10

-12

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 25

Page 26: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Taskable Diversity Mission-Aware Networking

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5

Task

s 13

-16

Task

s 10

-12

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Quorum Algorithm Over Multiple Instances of Task 13 Detects Violation

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 26

Page 27: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Migrate Task 16 to unaffected host

Taskable Diversity Mission-Aware Networking

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5,16

Task

s 10

-12

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 27

Page 28: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Increase communication network priority for host receiving task 16

Taskable Diversity Mission-Aware Networking

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5,16

Task

s 10

-12

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 28

Page 29: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

All machines running Task 13 now suspect and directed to monitor Task 13

Taskable Diversity Mission-Aware Networking

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5,16

Task

s 10

-12

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 29

Page 30: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Another Task 13 failure plus activity data from sandboxed Task 13 leads to more complete diagnosis & workaround for the problem

Taskable Diversity Mission-Aware Networking

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5,16

Task

s 10

-12

Resilient Clouds In Action

Host 1 Host 2 Host 3 Host 4 Host 5 Host 6 Host 7 Host 8

Approved for Public Release, Distribution Unlimited 30

Page 31: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Detectors, Patches & Workarounds for Task 13 vulnerability are distributed to all affected hosts

Taskable Diversity Mission-Aware Networking

Task

s 13

-16

Task

s 1-

3

Task

s 13

-15

Task

s 6-

8

Task

s 11

-13

Task

s 1-

5

Distributed, Highly Resilient Cloud Defense System

Shared Situational AwarenessMission-aware Resource Optimization

Task

s 3-

5,16

Task

s 10

-12

Resilient Clouds In Action

Approved for Public Release, Distribution Unlimited 31

Page 32: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Innate Immunity Adaptive Immunity Manageable Diversity

Innate Distributed Defense Shared Situational Awareness, Trust Modeling, and Diagnosis

Manageable & TaskableDiversity

Cyber-Mission Resilience

Optimizing Mission and Resources

CRASH Technologies

Resilient Clouds Technologies

Combined Goal of CRASH & Resilient Clouds

Mission-Aware Networking

Resilient Clouds, like CRASH, is– Willing to redesign hosts, networks and distributed systems architectures to gain security and

robustness– Concerned with Immunity, Adaptation & Diversity– Intended to respond to threats at internet speed

But Resilient Clouds is uniquely concerned with Clouds and other ensembles of hosts, connected by networks, acting in concert to achieve enterprise goals.

Resilient Clouds will augment network protocols to provide visibility and adaptability

Information flow Control flow

CRASH ‐> Resilient Clouds: Moving to the Enterprise Scale

Approved for Public Release, Distribution Unlimited 32

Page 33: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Mission Effectiveness

The objective is to sustain mission effectiveness. Different mission components have different security needs and will make different trade-offs at run-time between these, quality of service, and even correctness.

Task1

Task2

Taskn

confidentiality

integrity

availability

QoS

P1

Pn

W11

W1n

W12

Pi = Priority of Task iWij = Importance of property j to Task iVij = Degree to which property j is achieved for Task I

iji ijji vwP

v11

v12

v1n

time

Effectiveness Conventional System(Crashes)

Initial Operational Capability

100% Critical Functionality

(attack)

Theoretical Optimal

Metric for Mission Effectiveness

Approved for Public Release, Distribution Unlimited 33

Page 34: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Network Optimization ‐ Nash Bargaining

• Bottleneck bandwidth halved every 30 seconds due to, e.g., DoS flooding attack• Nash Bargaining rapidly adjusts bandwidth allocations to remain consistent with

priorities

time (seconds)

Thro

ughp

ut (M

bps)

Group Throughput (250 Flows per Group)group 1group 2group 3group 4

10

40

30

20

030 60 90 120

Approved for Public Release, Distribution Unlimited 34

Page 35: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What if We Got A “Do-Over?”

Summary

Approved for Public Release, Distribution Unlimited

Page 36: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Turn the Tables: Make The Attacker Do The Work

xInnate Immunity

xxx

DefenderEffortx

x

AttackerEffort:

• Novel Hardware

• Separation OS’s

• Information Flow

• Formal Methods

Adaptive Immunity

xxx

DefenderEffortx

x

AttackerEffort:

• Policy Weaving

• Automatic Patching

• Selective Playback

• Symbiotes

Dynamic Diversity

xxx

DefenderEffortx

x

AttackerEffort:

• Compiler generated Diversity

• Algorithmic Diversity

• Instruction Set Randomization

Approved for Public Release, Distribution Unlimited 36

Page 37: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Economic Tradeoff: Workfactor & Degradation

Attacker’s Work Factor

% Degradation of Mission Effectiveness

Defense W

inning Zone

Offense Winning Zone

COTS

Today’sProtectedSystems

Goal

100%

50%

0%

1 day 1 week 1 yearApproved for Public Release, Distribution Unlimited 37

Page 38: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

Changing the Equation

Attack Succeeds

Degree ofMaximum

Degradation

Change Work Factor to Achieve Attack

Improve Detection, Diagnosis & Initiation of Recovery

Change Severity of Attack

Increase RecoverySpeed

Increase Level of Regeneration

Minimize Footprint& Cover Footsteps

Escalate & penetrate new area

Destroy resources necessary for regeneration

Final Recovery

escalationRecon & penetration exploitation

RecoveryDetection

DiagnosisApproved for Public Release, Distribution Unlimited 38

Page 39: What If We Got A “Do-Over?” an Overview of CRASH and MRC · 2012-06-10 · What If We Got A “Do-Over?” an Overview of CRASH and MRC ... DARPA I2O Approved for Public Release,

What if We Got A “Do-Over?”

Will we do it better?

Approved for Public Release, Distribution Unlimited