Information Assurance and Security

Download Report

Transcript Information Assurance and Security

Information Assurance and Security
MS
I
Eugene Spafford
Professor
Department of Computer Sciences
Purdue University
Outline
MS
I
Security at Purdue, COAST/CERIAS
 Resources, Sponsors
 Ongoing Research Projects
 Proposed QoS Research

2
Information Security At Purdue
MS
I
Information Security started in 1979
 Many courses offered (grad, undergrad)
 COAST (1992-97)
 CERIAS (1998)

• University-wide
• Multidisciplinary
3
Center Resources
MS
I







32 Sun Workstations
2 Sun Enterprise Servers
9 MacOS Platforms
FORE ATM cloud
• 40 host adapters
• 2 BX200
• 4 FORErunners
3 486/586 PCs w/Win 95
4 Pentium Pro BSDI/Linux
12 Pentium II WinNT







5 HP Printers
2 Tektronix Color Printers
3 Cisco Routers
• 7507 Enterprise router
3 Sunscreen firewalls
2 PrivateNet firewalls
1 Firewall-1 firewall
2 Pentium laptops
Assorted other dedicated
hardware & software
4
On-Going Projects–Brief Synopses
MS
I

Intrusion Detection
• AAFID agent-based system
• Characterizing Misuse

Audit Analysis
• Audit content
• Audit representation & compression

Firewalls and Network Protection
• Firewall evaluation lab
• Firewall structure

Vulnerability Testing
5
On-Going Projects (1)
MS
I

Vulnerability Database
• Data Mining
• Taxonomical Work
• Software Testing

Archive Development
• Organization and Protection
• Archival document entry
Secure outsourcing
 Watermarking

6
On-Going Projects (2)
MS
I
ATM Security
 Network vulnerability analysis
 Database & Multimedia security
 Use of information-based terrorism
 Attack traceback analysis
 Privacy ethics & protections
 Best practices survey

7
Current Sponsors
MS
I


Founding Sponsors
• Lilly Endowment
Tier I Sponsors
• Andersen Consulting
• AT&T Labs/GeoPlex
• Cisco Systems
• GE Laboratories
• Global Integrity Corp.
• Hewlett-Packard Corp.
• Intel Corporation
• Microsoft
• MITRE
• Schlumberger
• Sun Microsystems
• Trident Data Systems
• Tripwire Security Systems
• TRW


Tier II Sponsors
• Axent
Other Donors
• Addison-Wesley
• INITA
• L3 Communications
• O’Reilly & Associates
• RiskWatch
• Tektronix
8
Potential Sponsors
MS
I
Boeing
 Citicorp
 Compaq
 Department of Energy/LANL/Sandia
 Motorola
 NIST
 Swiss Bank Corporation

9
Security QoS
MS
I

Security services
• E.g., audit, intrusion detection, …

Many levels of service
• Multiple ``alarm levels’’ in an ID system
• Multiple levels of audit

Costly in terms of network & storage
resources
• Low (high) security levels cause small (large)
footprints
• Impact on system usability/availability
– E.g., firewall blocks UDP packets

Security requirements differ across the
network
10
Research Issues in Security QoS
MS
I

How does user …
• … specify security QoS ?
• … negotiate security QoS ?

What granularity (host ? subnet ? )
• Varies with security service considered

Connections with DB QoS and network QoS
• Compete for same resources
• Benefit from same techniques

… and many more in the following examples
•
•
•
•
Intrusion detection
Audit trail service
Profiling service
Secure multimedia document service
11
Intrusion Detection Service (1)
MS
I
Experimental testbed: Existing AAFID
prototype
 Already supports multiple levels of
security

12
Intrusion Detection Service (2)
MS
I

More research questions
• How to handle levels of security that vary across a
network
• The interface between security-level regions
– Where ``low’’ meets ``high’’
• What network QoS requirements should the
AAFID agents make ?
– Different types of agents
• What network QoS requirements should AAFID
monitors make ?
• What DB QoS requirements should the AAFID
entities make on the audit trail DB ?
13
QoS Tradeoffs
MS
I

Footprint on network vs. level of security
• Economic model
• Cost-benefit analyses
• Characterize ``best’’ operating points

Similar tradeoff for which security
services to provide
• Same research issues as above

Functionality vs. security
14
Audit Service
MS
I


Gives ability to know ``what happened’’
Various levels of audit
• From ``Store all events’’ to ``store nothing’’
• Quality of audit required affects resources, hence system
usability and availability

Requirements can vary
• From application to application
• From host to host
• From subnet to subnet

DB techniques for audit data
• Audit data is massive (compression issues)
• Special nature of data and how it is used (``ephemeral
records’’)
• Special queries (searching for attack patterns)
15
User Profiling Service
MS
I

Profile of user
• For active email (IBM Almaden), active DB
• For statistical ID (IDES, NIDES and related systems)

Levels of quality (of profile)
• Extensive and accurate implies a higher expense

Quality requirements are highly variable
• E.g., active DB can do with lower quality profile than MD
system

Profiling technology
• Similar to statistical approach to intrusion detection
– Notion of ``normal’’ user (or network, or DB) behavior
– Difficult! (Curse of dimensionality, dependence, …)
• User profile is itself stored in special DB
– How fast should profile evolve? (Drawbacks to both extremes) 16
Other Security Services
MS
I






Scanning
• Related to ID but intense & limited in time (ID is
continuous)
Multimedia document services
• Timestamping, tamper-resistance, watermarking,
…
Cryptographic protocol support
PKI
… etc
Each service has its own QoS requirements/tradeoffs
17
Other Contributions
MS
I



CERIAS Outreach
• Technology transfer to sponsors
• Workshops and Conferences
• Continuing Ed offerings
CERIAS K-12
• Full-time coordinator
• Working with State Education Dept.
CERIAS Archive Delivery
• Full-time Webmaster
• Major archive & dissemination
18