Foundational and Systems Support for Quantitative Trust Management (QTM)

Similar documents
Foundational and Systems Support for Quantitative Trust Management (QTM)

Dynamic Trust Management (DTM)

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation

QuanTM Architecture for Web Services

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation

QuanTM Architecture for Web Services

Introducing Cyber Resiliency Concerns Into Engineering Education

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Funded Project Final Survey Report

An Overview of Mobile Security

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Dynamic. Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, and Jonathan M. Smith, University of Pennsylvania

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Trust Management: An Overview

Control System Security for Social Infrastructure

AT&T Endpoint Security

Spam Mitigation using Spatio temporal Reputations from Blacklist History*

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

DAISY Data Analysis and Information SecuritY Lab

What is peer to peer?

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Higher Education Privacy Update

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

QuanTM: A Quantitative Trust Management System

Governance Ideas Exchange

Systemic Analyser in Network Threats

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

The NIS Directive and Cybersecurity in

Security and Privacy Governance Program Guidelines

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Module: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

External Supplier Control Obligations. Cyber Security

Bachelor of Science in Business Administration - Information Systems and Technology Major

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Building Successful Threat Intelligence Programs

Student Handbook Master of Information Systems Management (MISM)

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Security Management Models And Practices Feb 5, 2008

IoT privacy risk management in ANASTACIA project

Future and Emerging Threats in ICT

The U.S. Cybersecurity Information Sharing Act of 2015: Joel Benge Risk Evangelist Emergent Network Defense

Cyber Security and Cyber Fraud

Information Systems and Tech (IST)

Automating Security Response based on Internet Reputation

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

What is the Value of IT Certification?

Critical Infrastructure

Defense Engineering Excellence

Void main Technologies

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Security by Default: Enabling Transformation Through Cyber Resilience

Advanced Security Tester Course Outline

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

Cyber-Physical Chain (CPChain) Light Paper

Trust4All: a Trustworthy Middleware Platform for Component Software

The Global Cybercrime Industry

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

The University of Queensland

CompTIA CASP (Advanced Security Practitioner)

Predicting and Preventing Cyber Threats. Paolo Passeri, Consulting Systems Engineer

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

Trust is the Foundations for Computer Security

Revealing Botnet Membership Using DNSBL Counter-Intelligence

with Advanced Protection

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

Framework For Cloud Computing Networks Pdf

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

Cybersecurity and Hospitals: A Board Perspective

Vol. 1 Technical RFP No. QTA0015THA

Lecture Embedded System Security Introduction to Trusted Computing

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

All Aboard the HIPAA Omnibus An Auditor s Perspective

Smart Grid Security Illinois

The Challenge of Cloud Security

Legal Foundation and Enforcement: Promoting Cybersecurity

Defense in Depth Security in the Enterprise

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

National Cyber R&D Framework: Changing The Game Recommendations from the NITRD Senior Steering Group on Cybersecurity R&D

Advanced Cyber Topics

Pope: Infrastructure for DNS Scanning

Mobile Security Fall 2012

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Next-Generation Architecture for Virtual Prototyping

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science

CYBERSECURITY: Scholarship and Job Opportunities

Overview of Akamai s Personal Data Processing Activities and Role

Transcription:

Foundational and Systems Support for Quantitative Trust Management (QTM) Insup Lee (PI) Computer and Information Science University of Pennsylvania ONR MURI N00014-07-1-0907 Review Meeting November 4, 2009

Project Team Principal Investigators Sampath Kannan (Ph.D 89, Berkeley) Stream Algorithms, Run-time monitoring, Cryptography Insup Lee (Ph.D. 83, Wisconsin) Real-time and cyber-physical systems, Run-time monitoring Matt Blaze (Ph.D. 93, Princeton) Network security, Cryptography, Trust Management Oleg Sokolsky (Ph.D. 96, SUNY-SB) Formal methods, Real-time and hybrid systems Jonathan Smith (Ph.D. 89, Columbia) Networking, Security and privacy, Mobility Angelos Keromytis (Ph.D. 01, Penn) Computer security, Cryptography, Networking Wenke Lee (Ph.D. 99, Columbia) System and network security, Applied cryptography, Data mining Students Adam Aviv, Jian Chang, Nikhil Dinesh, Zhiyi Huang, Andrew West, David Dagon, Manos Antonakakis, Matt Burnside, Vasilis Pappas, Stelios Sidiroglou Postdocs Daniel Luo, Vinayak Prabhu, Krishna Venkatasubramanian, Collaborators Nick Feamster, Boon Loo, Aravind Joshi, Jason Nieh Sampath Insup Matt Oleg Jonathan Angelos Wenke 11/4/09 ONR MURI Review 2

Trust Webster s Dictionary: TRUST, -noun: (1) Assured reliance on the character, ability, strength, or truth of someone or something. (2) One in which confidence is placed. Our Definition: Trust is the expectation of a trustor with respect to certain properties of a trustee or her actions under a specified context and time, considering the risks, incentives, and historical information. 11/4/09 ONR MURI Review 3

The Problem of Trust Quantitative Trust for federated networked systems Decentralized policies Dynamic environment, partial trust Complex trust models (logic + reputation), in reality Applications E-commerce systems Service compositions in GIG Reusing components/subsystem in complex DoD systems Social Networks Medical systems Cloud computing I Can need a Visa!?! France? I visit now? 11/4/09 ONR MURI Review 4

Trust Management Policy-Based Trust Mgmt. (PTM) Effective for delegated credentials and access enforcement Can t handle uncertainty and partial information Rep-Based Trust Mgmt. (RTM) Quantifies trust relationships No delegation (i.e., reputation no-transferable) No enforcement QUANTITATIVE TRUST MANAGEMENT (QTM) Combine PTM and RTM Dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved 11/4/09 ONR MURI Review 5

QTM Challenges What are some metrics for effectiveness of TM systems? How do we incorporate uncertainty in policy-based TM s? How do we incorporate dynamism in policy-based TM s? How can we model adversaries as economic agents and develop a game-theoretic view of trust management? Can we build new reputation management systems based on sound principles? What is the proper way to mathematically combine reputations? Involves integration of logical/quantitative/probabilistic reasoning Is there a means to build consensus from distributed observations? How do we integrate policy-based and reputation-based TMs? What are some important applications of TM systems? 11/4/09 ONR MURI Review 6

Quantitative Trust Management (QTM) Compliance Value Compliance Value Local Policy TDG Extractor TV Context Information Request & Credentials Policy Evaluation Engine Reputation Algorithm Decision Maker Action Reputation Quantifier TDG Reputation Database Decision Meta-Policy Policy-Based Trust Manager Reputation-Based Trust Manager Feedback Decison Manager 11/4/09 ONR MURI Review 7

Collaboration Policy-based Trust Management (PTM) KeyNote PTM Systems Permission-to-Speak Dynamic Trust Management Arachne 11/4/09 ONR MURI Review 8

Collaboration Reputation-based Trust Management (RTM) Evaluating RTM Systems Blacklist as Feedback of Reputation Management 11/4/09 ONR MURI Review 9

Collaboration Request & Credentials Oleg Sokolsky formal methods, hybrid systems Policy-based Trust Local Management Policy (PTM) Policy Evaluation Engine TDG Extractor Insup Lee cyber-physical Compliance systems Value Quantitative Reputation Trust Management Algorithm (QTM) Reputation-based Trust TV Management Context Information (RTM) Decision Maker Sampath Kannan algorithms,cryptography Action Reputation Quantifier TDG Reputation Database Decision Meta-Policy Matt Blaze trust management Policy-Based Trust Manager Jonathan Smith network security and privacy Reputation-Based Trust Manager Feedback Angelos Keromytis Decison Manager Wenke Lee intrusion detection, data mining 11/4/09 ONR MURI Review network security, cryptography 10

Team Efforts Several Research Collaborations Distributed TM, Dynamic TM, Spatio-Temporal Reputations, Keynote-base QTM Annual meetings 2007, 2008, 2009 Many Tele-conferences and Student Visits Penn -> GA Tech, Columbia -> Penn, GA Tech -> Penn Collaborative case studies SPAM list and BGP security as QTM application PhD Dissertation Committees Matt Burnside (Columbia) David Dagon (GA Tech) Andrew West (Penn) 11/4/09 ONR MURI Review 11

Education Courses Integrated material into COMS W4180 course (Columbia) CIS 125 new course on understanding of existing and emerging technologies, along with the political, societal and economic impacts of those technologies (Penn) Integrated material into CIS 551 (Penn) Material on botnet detection added to Network Security classes: undergraduate cs4237, and graduate cs6262 (GA Tech) 3 senior design projects (Penn) Workforce training 3 post-docs 10 Ph.D. students 1 Masters and 1 undergraduate 11/4/09 ONR MURI Review 12

Publication Publications 7 journal articles 2 book chapter 33 conference papers Selected papers M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J.M. Smith, A.D. Keromytis, and W. Lee. Dynamic Trust Management, In IEEE Computer Magazine, vol. 42, no. 2, pp. 44-52, February 2009. A.G. West, A.J. Aviv, J. Chang, V. Prabhu, M. Blaze, S. Kannan, I. Lee, J.M. Smith, and O. Sokolsky. QuanTM: A Quantitative Trust Management System. EUROSEC 2009, pp. 28-35. A.G. West, I. Lee, S. Kannan, and O. Sokolsky. An Evaluation Framework for Reputation Management Systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development (Zheng Yan, ed.), 2009. 11/4/09 ONR MURI Review 13

Dissemination & Tech transfer Beyond conference talks 7 invited and 2 keynote talks, 6 panels Working with Symantec to determine modus operandi of rogue Antivirus sites (and why users trust them) Interim Symantec Threat Report (ISTR), Oct 09 Working with Damballa to deliver botnet detection and mitigation technologies to government and enterprise customers Botnet detection system such BotMiner malware analysis technologies, and the DNS-based monitoring technologies Several Ph.D. students did summer internship Several Damballa researchers were former students at Georgia Tech, and still participate in some of the research meetings at Georgia Tech Matt Burnside now working for NSA QTM ideas used in ONR-supported "Networks Opposing Botnets" (NoBot) project, withpenn, Harvard and Princeton 11/4/09 ONR MURI Review 14

Research highlights Project Overview, Insup Lee (PI) Trust Management, Matt Blaze Dynamic Trust Management, Jonathan M. Smith Exposing Trust Assumptions in Distributed Policy Enforcement, Angelos Keromytis Permission to Speak: A Novel Formal Foundation for Access Control, Oleg Sokolsky Dynamic IP Reputation from DNS, Wenke Lee Using Spatiotemporal Reputation to Predict Malicious Behaviors, Andrew West Reputations and Games, Sampath Kannan Future Work and Discussion, Insup Lee 11/4/09 ONR MURI Review 15

Dynamic Trust Management (Penn + Columbia + Georgia Tech) A COOPERATIVE and DYNAMIC policy evaluation infrastructure that will enable such critical capabilities as: Adaptation to dynamic service availability Complex situational dynamics (e.g., differentiating between bot-net and physical attacks on infrastructure). BENEFITS of a Dynamic Trust Management approach Flexible and robust control of authorizations in complex distributed systems such as the DoD/IC GIG The ability to define policies for scalable decentralized defense against emergent cyber-threats by rapid adaptation of resource access limits. Clean Router Host DTM NW-Wide Mgmt Clean Router Clean Router INFECTED Router INFECTED Router 11/4/09 ONR MURI Review 16

Arachne: Coordinated Policy Enforcement POLICY ( Columbia) Sensors Events Actuators NETWORK: applications, network links, routers, etc. ARACHNE is a system for the coordinated distribution and evaluation of a system-wide policy on different nodes Several prototype systems for enterprise-level security have been developed GOAL: Integrate a variety of different, diverse security mechanisms and policy expression methods Achieve enhanced protection over any individual method Allow exchange of information between different mechanisms (Eliminate the possibility of locally correct but globally wrong decisions Capture trade-offs between amount of global context, scalability, etc. 11/4/09 ONR MURI Review 17

Permission-to-Speak A new policy deontic logic developed under ONR-MURI Explicit representation of PERMISSIONS and OBLIGATIONS imposed by a policy, and the delegation of policies. Captures notions such as allow to require which are necessary for dynamic policy introduction. Explicit representation of policy DEPENDENCIES Iterative algorithm for calculating the set of relevant policy statements Logic prog.-based evaluation allows efficient blame assignment P pat says pat O hosp says hosp P pat access(pat, record(pat)) Patients are allowed to ask a hospital for their medical records. In response, the hospital must permit access. 11/4/09 ONR MURI Review 18

Evaluating RTM Systems Many reputation systems are available in the literature EigenTrust, TNA-SL (Trusted Network Analysis with Subjective Logic), Little or no comparison between them Designed and implemented a framework for comparative evaluation of reputation systems Identified evaluation criteria Generation of evaluation scenarios Development of malicious strategies Collection of statistics and analysis Useful in developing own RTM sys. Network Params Simulated Trace Generator Trace File Reputation Algorithm Trace Simulator Output Statistics 11/4/09 ONR MURI Review 19

Dynamic IP Reputation from DNS (Georgia Tech) Dynamic Domain Name reputation using passive DNS (pdns) Professional DNS hosting differs from non-professional pdns information is already present in our network Static IP/DNS blacklists have limitations Malicious Users tend to reuse their infrastructure Contributions: Zone and network based clustering of pdns A new method of assigning reputation on new RRSETs using limited {White/Grey/Black}-listing A dynamic Domain Name reputation rating system Always maintain fresh reputation knowledge based on pdns 11/4/09 ONR MURI Review 20

Spatio-Temporal Reputation (Penn + Georgia Tech) As the RM part of QTM, we have developed reputation-bases trust management based on spatiotemporal reputation Approach Assumptions Bad guys are geographically clustered (spatio) Bad guys are likely to repeat bad behaviors (temporal) Given A historical record of those principals known to be bad, and the time when this was noted (feedback) Produce An extended list of principals who are thought to be bad at the current time, based on their own past history, and the history of those around them Case studies: Spam filter based on IP blacklist, wikipedia 11/4/09 ONR MURI Review 21

Quantitative Trust Management (QTM) QTM provides a dynamic interpretation of authorization policies for access control decisions using evolving reputations of parties QuanTM is a QTM system that combines elements from PTM and RTM to create a novel method for trust evaluation The QuanTM Architecture Trust Dependency Graph (TDG), encoding PTM relationships useful for RTM Reputations of PRINCIPALS, DELEGATIONS and CREDENTIALS are aggregated 11/4/09 ONR MURI Review 22