Fundamentals of Computer Security
Download
Report
Transcript Fundamentals of Computer Security
Fundamentals of
Computer Security
Geetika Sharma
Fall 2008
Outline
Fundamentals of Computer Security
Security Threats and Protection Methods
Security Models and Mechanisms
Security Issues in Distributed systems
Latest Techniques
Agent Based Approach
Grid Specific Host Based Intrusion Detection
System
Fundamentals of Computer
Security[1]
Computer Systems
Can be represented by:
Subjects
Objects
Active entities that access objects
Passive entities that must be protected
Examples: data, hardware, software and communication links
Access Control Policy
Describes how objects are accessed by subjects
Flow Control Policy
Regulates the information flow between objects and
subjects
Security Threats[1]
Interruption (availability)
Interception
Loss of data and denial of service
Related to secrecy
Modification and Fabrication are violations of
system integrity
Threats from Web/Network[4]
Client Side
What can the server do to the client?
Fool it
Server Side
What can the client do to the server?
Bring it down (denial of service)
Install or run unauthorized software, inspect/alter
files
Gain access (break-in)
Network
Is anyone listening? (Sniffing)
Is the information genuine? Are the parties genuine?
Security Mechanisms[1]
Authentication
Verification
Authorization
Extending permission
Fault Tolerance
Sustaining faults
Encryption
Prevents exposure of information and maintains
privacy
Auditing
Passive form of protection
Security Models[1]
Discretionary
Provides separation of users and data
E.g. access control matrix
Mandatory
Requires access control of all subjects and orders
under its control on a system wide basis
E.g. multilevel security, all subjects and objects in
the system are assigned a sensitivity label. The
labels are used as the basis for mandatory access
control decisions.
Security Issues in Distributed
Systems[1]
Interoperability and Transparency
Gives rise to security issues
Approaches to Implementing New Services
Add an additional layer of software that runs on top of
the existing system to provide the new services
Redesign the system so that the new services can be
executed more efficiently in the kernel mode
Security Issues in Distributed
Systems[1]
Client/Server Security
A client initiates an access to an object through the
kernel
Kernel authenticates the client and then invokes the
object server
Implemented via Interprocess Communication at
transport layer
Supported by secure host-to-host communications at the
network layer and node to node communication at the
link layer
Secure distributed system consists of communicating
security servers using trusted gateway.
Security Issues in Distributed
Systems[1]
Client processes
request
response
Other OS Servers
response
Authentication
Server
Authorization
Server
Other Security
Servers
request
Trusted Secure Kernel
Client/Server Distributed Security Architecture
Latest Techniques
Majority of information security incidents is
perpetrated by insiders i.e. internal computer users
constitute the largest threat to the computer
systems security[2].
Traditional methods (such as identification and
authentication, access restriction, etc.) do not solve
this problem
Drawbacks; among them are
low ability of internal malicious users detection,
inability to process large amounts of information,
low productivity
Agent Approach for Security in
Distributed Systems[2]
Intelligent Security System for Computers users’
activity monitoring
Online and off-line monitoring allowing to detect
anomalies and irregularities in user behavior.
On-line monitoring is carried in real time, and is
used to predict user actions (use neural networks)
Off-line monitoring is done after the user has
ended his work, and is based on the analysis of
statistical information obtained during user's work.
Agent Approach for Security in
Distributed Systems[2]
Win
98
On-line User
Agent
On-line User
Agent
Free
BSD
Dbase
Off-line User
Agent
Win
2000
On-line User
Agent
Controller
Agent
On-line User
Agent
Linux
System Architecture for Agent Based Security in Distributed systems
GHIDS: Defending Computational Grids
Against Misusing of Shared Resources [3]
Grid Specific Host Based Intrusion Detection System
Design
Performance Impact
Central Control
Leverage Existing Software
Configurability
Effectiveness
Approach/Services
Uses Bottleneck Verification (Host)
Detects users that go from user to super user improperly
Monitors process creation, modification and destruction (Host)
Monitors accessing of critical resources (Host)
Grid User ID and Host Level ID stores when Grid services used
Architecture
Host and Grid level deployment
Virtual Kernel Device created
Grid Middleware modified
Data Analyzer
User Interface
References
1. Randy Chow, Theodore Jognson. Distributed Operating Systems and
Algorithms, Addison-Wesley 1997
2. Agent Approach for Providing Security in Distributed Systems;
TCSET'2006, February 28-March 4, 2006, Lviv-Slavsko, Ukraine
3. GHIDS:Defending Computational Grids Against Misusing of Shared
Resources”, Feng et all, IEEE 2006
4. www.cse.sc.edu/~farkas/csce522-2003/lectures/csce522lect22.ppt (2003)
Thanks!