Dissemination of Security Updates

Download Report

Transcript Dissemination of Security Updates

Dissemination of
Security Updates
Jun Li
Dissertation Proposal
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
2
Motivation
 Consider network security in general
Dissemination of security updates
3
Dissemination of security updates
4
Motivation
 Consider network security in general
 Security attack on just a single machine in a
network environment is usually not the case

For instance, before taking action an attack may
hide itself and penetrate into many machines
 Wide-spread information sharing in a timely
way is necessary

The information is called security update
Dissemination of security updates
5
Security Update Examples
 Virus signature (and remedy)
 Special events in distributed intrusion
detection
 Offending characteristics to be filtered by a
firewall
 Characteristics of a potential attack
Dissemination of security updates
6
Observation
 They all share a common need of doing
security update dissemination
 But the need is addressed in various
unsatisfactory ways (to be discussed later)
Dissemination of security updates
7
Solution to the problem
 Provide a common facility for security
update dissemination
Dissemination of security updates
8
Challenges
 Scalability
 Low latency
 High assurance






some machines may be subverted
some machines may be disconnected
Topological adaptability
Heterogeneity
Low overhead
High security itself
Dissemination of security updates
9
Thesis
Dissemination of security updates while
simultaneously addressing each of the
above challenges is feasible.
 Design and build a system that does the work
 Call the system Revere
Dissemination of security updates
10
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
11
Related Work
 Information dissemination





simple transmission techniques
mailing list
distribution of software, virus signature, or key
network time protocol
push technology
 Element management


replicated data management
intrusion detection
Dissemination of security updates
12
Simple Transmission Techniques




Unicasting(one-to-one)
Broadcasting
Flooding
Multicasting
Dissemination of security updates
network
13
Mailing List
 Scalability
 Single path to reach
recipients
 Hard to interface with
other software ...
Dissemination of security updates
network
14
Distribution of
Software, Virus Signature, or Key
 Software distribution
 Virus signature distribution
 Key distribution
Dissemination of security updates
15
Network Time Protocol
 Disseminating clock time to synchronize
machines on network


manually configured
no retransmission
Dissemination of security updates
16
Push Technology
 Some commercial products: BackWeb,
Ifusion, InCommon, Intermind, Marimba,
NETdelivery, Wayfarer

poll the server periodically, fetch if needed
 Salamander




build a substrate
push data from suppliers to clients through the
substrate
only single path from a supplier to a client
no handling for disconnected machines
Dissemination of security updates
17
Element Management
 Replicated data management

each machine in Revere has a replica of
security update
 Intrusion detection

if we know which machines are subverted ...
Dissemination of security updates
18
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
19
Protecting Revere
 Revere must protect itself against attacks


otherwise, security update won’t be
disseminated successfully
corrupted Revere is more dangerous if used by
enemy for own purpose
Dissemination of security updates
20
Attacks on Revere
 Corrupting a message


modification
fabrication or forgery
 Corrupting the transmission path



blockage
misdirection
denial of service by replay overloading
 Leakage of security update
Dissemination of security updates
21
Fight Against Attacks
 Message corruption

digital signature
 Transmission path corruption


redundancy by multiple paths
be ready for replay attacks by logging
signatures of previous security updates
 leakage of security update

no secrecy when many millions of machines
are receivers to share same information
Dissemination of security updates
22
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
23
Dissemination Mechanism





High assurance
Pulling by disconnected node
Receiver based policy
Opportunistic use of transmission options
Scalability
 Dissemination structure
Dissemination of security updates
24
1. High Assurance
 Using acknowledgement
implosion
ack can be dropped
need to figure out what is missed by whom
retransmission probably follows same old path




 Using negative ack


only avoid implosion, and
only feasible when knowing a security update is missed
 Using redundancy



harder to corrupt all
to achieve best effort
accompanied with additional techniques,
such as pulling
Dissemination of security updates
25
2. Pulling By Disconnected Node
 Pulling from  is
not scalable and
hard to handle
network
 Repository nodes
 High assurance pulling

find best repository nodes
Dissemination of security updates
26
3. Receiver Based Policy
 Heterogeneous Revere node in terms of

different resiliency request
• different environment (hostile or safe)
• different context itself


different transmission characteristics
different platform
• different ability of being aware of above
Dissemination of security updates
27
4. Opportunistic Use of Transmission Options
 When security update forwarded from
machine to machine(s), choose best option
of available transmission type
 Tradeoff among




best performance
resource usage
delivery guarantee
simplicity of
implementation
Dissemination of security updates
network
28
5. Scalability
 Be ready for millions of receivers, or even
more



resource usage
performance
security
 Any machine can only have partial
information of the whole system

distributed computing
Dissemination of security updates
29
Dissemination Structure
 Automatic configuration

an easy-to-use user interface needed
• manual configuration hurts
 Dynamic adjustment adaptively





when a new node joins
when an existing node quits
when transmission characteristics changes
when detecting security problems
and so on …..
Dissemination of security updates
30
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One Strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
31
Dissemination w/ Sending Table
 Each Revere node has an associated
sending table locally
A
unicast
B,C
multicast
D
………….
B floppy
X broadcast
(empty)
C unicast w/
IP source routing
(empty)
Dissemination of security updates
32
Building the Sending Table
 Requirements



automatic
match dissemination mechanisms
dynamically adjustable
 Some information about dissemination
sources are common knowledge



addresses
type of security updates to disseminate
public keys
 Maybe similar information of some
existing Revere nodes
Dissemination of security updates
33
Recursive Enrollment of Newborn
 Recommending
Algorithm
 Decision Making
Algorithm
Selected
Detected
machinesmachines
info
list between
newborn and recommended
Recommended
list
Join Request
Machines listed in ’s sending table
A Newborn
Machines recommended to newborn
Machines selected
Dissemination of security updates
34
Enrollment Flexibility
 A new Revere machine can attach itself to
Revere system by sending enroll request(s)
to any existing Revere node(s)


based on trustfulness, or
contact more than one
Dissemination of security updates
35
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One Strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
36
A Prototype w/ Basic Functionality
 Security update delivery analysis
 Dissemination structure formation and
management
 Dissemination process


push
pull
Dissemination of security updates
37
Security Enforcement
 Authentication of security update


signing and verification of security update
key management
 Replay prevention

don’t be fooled to send lots of replays since
Revere has big fan-out
Dissemination of security updates
38
Test the System
 Build a testbed


composed of heterogeneous machines and
transmission media
small scale
 Simulate possible attacks
Dissemination of security updates
39
Simulation
 Large scale
 With some Revere nodes subverted

and actively thwarting the dissemination
 Understand the effects when lots of
machines pull missed information
 ……………...
Dissemination of security updates
40
Outline







Motivation, challenges, and thesis
Related work
Protection against attacks
Dissemination mechanism
One Strategy in initial study
Dissertation plans
Summary
Dissemination of security updates
41
Summary
 The goal is to be able to disseminate
security updates securely, quickly,
adaptively, to large number of
heterogeneous machines with high
assurance and low overhead
 The work includes design, prototype, test,
simulation, evaluation
Dissemination of security updates
42
Questions?
Dissemination of security updates
43