Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Advertisements

1 Cyber Insurance and IT Security Investment: Impact of Interdependent Risk Hulisi Ogut, UT-Dallas Srinivasan Raghunathan, UT-Dallas Nirup Menon, UT-Dallas.
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
Chapter 5 Some Important Discrete Probability Distributions
Chapter 5 Discrete Random Variables and Probability Distributions
Statistics for Managers Using Microsoft Excel, 4e © 2004 Prentice-Hall, Inc. Chap 5-1 Chapter 5 Some Important Discrete Probability Distributions Statistics.
Critical Software Security Through Replication and Virtualization A Research Proposal Dennis Edwards Sharon Simmons Arangamanikkannan Manickam.
1 Detection and Analysis of Impulse Point Sequences on Correlated Disturbance Phone G. Filaretov, A. Avshalumov Moscow Power Engineering Institute, Moscow.
Multiaccess Problem How to let distributed users (efficiently) share a single broadcast channel? ⇒ How to form a queue for distributed users? The protocols.
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Return and Risk: The Capital Asset Pricing Model (CAPM) Chapter.
Chapter 4 Discrete Random Variables and Probability Distributions
Chapter Outline Expected Returns and Variances of a portfolio
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
Efficient Diversification
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and.
Models and Measures for Correlation in Cyber-Insurance Rainer Böhme Technische Universität Dresden Gaurav Kataria Carnegie.
1 Performance Evaluation of Computer Networks Objectives  Introduction to Queuing Theory  Little’s Theorem  Standard Notation of Queuing Systems  Poisson.
Models for Measuring and Hedging Risks in a Network Plan
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
-1- Entrance of Cable TV Service Provider into Broadband Internet Service Market : Service Bundling and Role of Access Charge By Jae-Hyeon Ahn, Jungsuk.
14-1. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 14 Capacity Planning and Queuing Models.
Complementary Goods Suppose that you need to have both left and right shoes. When you have both left and right shoes, your satisfaction is 10. What is.
Aaker, Kumar, Day Seventh Edition Instructor’s Presentation Slides
Return and Risk: The Capital Asset Pricing Model Chapter 11 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Banking Clouds V International Youth Banking Forum.
Aaker, Kumar, Day Ninth Edition Instructor’s Presentation Slides
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
The Capital Asset Pricing Model (CAPM)
Basic Business Statistics, 10e © 2006 Prentice-Hall, Inc.. Chap 5-1 Chapter 5 Some Important Discrete Probability Distributions Basic Business Statistics.
Institute for Statistics and Econometrics Economics Department Humboldt University of Berlin Spandauer Straße Berlin Germany CONNECTED TEACHING.
Lecture 10 The Capital Asset Pricing Model Expectation, variance, standard error (deviation), covariance, and correlation of returns may be based on.
Linux vs. Windows: A Comparison of Application and Platform Innovation Incentives for Open Source and Proprietary Software Platforms Submitted By: Kishan.
Chapter 08 Risk and Rate of Return
Chapter 4 Appendix 1 Models of Asset Pricing. Copyright ©2015 Pearson Education, Inc. All rights reserved.4-1 Benefits of Diversification Diversification.
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca.
Basic Business Statistics, 10e © 2006 Prentice-Hall, Inc.. Chap 5-1 Chapter 5 Some Important Discrete Probability Distributions Basic Business Statistics.
Queuing Theory Basic properties, Markovian models, Networks of queues, General service time distributions, Finite source models, Multiserver queues Chapter.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
More Continuous Distributions
yahoo.com SUT-System Level Performance Models yahoo.com SUT-System Level Performance Models8-1 chapter11 Single Queue Systems.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar (University of Pennsylvania) Andrew Odlyzko, Zhi-Li Zhang (University.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Optimal portfolios and index model.  Suppose your portfolio has only 1 stock, how many sources of risk can affect your portfolio? ◦ Uncertainty at the.
The M/M/ N / N Queue etc COMP5416 Advanced Network Technologies.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Skill Area 214 Introduce World wide web(www)
Introduction TO Network Administration
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
Chap 5-1 Chapter 5 Discrete Random Variables and Probability Distributions Statistics for Business and Economics 6 th Edition.
Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Uploading, Encoding and Tracking Files.  Introduction  Source vs. Published File Types  Streaming vs. Downloaded files  The Upload Tab  Playlists.
Chapter 2 Operating Systems
Summary of Learning Objectives
Key Concepts and Skills
Return and Risk The Capital Asset Pricing Model (CAPM)
Risk and Return.
Large Distributed Systems
Effective Social Network Quarantine with Minimal Isolation Costs
Vertical and Horizontal Integration
Presentation transcript:

Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University

The Problem? Many networked machines running software with shared vulnerabilities Vulnerabilities present in software with large critical mass invite a larger number of attacks Attacks propagate over networks Diversification – the use of software with fewer shared vulnerabilities – is an approach to mitigate the risk of correlated failure

Correlated Failure Nodes within organization are interconnected and equally vulnerable Various Applications Vulnerable Links

Too much uniformity -monoculture According to market researcher OneStat.com, Windows now controls 97.46% of the global desktop operating system market, compared to just 1.43% for Apple Macintosh and 0.26% for Linux. Microsoft Internet Explorer has 87.28% browser market share compared to 8.45% for Firefox and 1.21% for Apple’s Safari.

Why uniformity? Homogeneity has “network effects” Network effect is the positive externality from consuming a software that others use due to Better connectivity Integration Support etc.

But.. Homogeneity means putting all your eggs in one basket… …if one node fails then so will others

How can diversity be introduced? Choosing a different product? Linux vs. Windows vs. MAC OS? IE vs. Firefox Outlook vs. thunderbird Different builds using different components MIME-handler and header processors in mail clients? Sensor network nodes distributed with multiple OS’s in ROM?

Diversity: Definition Two software choices Incumbent software 1 Competing software 2 Diversity defined in percentage terms The firm may choose to have x 1 proportion of its systems on incumbent software 1, while having the remaining 1-x 1 on the competing software 2 50% diversity implies half nodes running software 1 and the other half running software 2

Diversification Strategy Model Correlated Failure Beta-binomial distribution Estimate Loss due to an Attack Downtime is crucial economic loss Mean time to recover as a metric for loss Security Investment Tradeoffs Service capacity or preparedness Network configuration

Modeling Correlated Failure General randomized Binomial distribution The intensity function f p (p) gives the probability distribution that a fraction of all nodes will fail The node failure distribution is beta-binomial when f p (p) follows beta distribution with parameters: Where, π is the (expected) probability of computer failure in an attack, θ ε (0, infinity) is the correlation level

Beta-binomial α = 0.1 and β = 0.9 (high corr.) α = 1 and β = 9 α = 10 and β = 90 α = 100 and β = 900 (low corr.) B N (i)

Security Cost At any time some computers are affected by worms, viruses, software bugs etc. and require servicing.

Loss from an Attack = Expected Repair Time M/G/1 queue M (memoryless): Poisson arrival process, intensity λ, which captures the arrival rate for attacks G (general): general service time distribution, mean E[S] = 1/μ, which captures the service time to bring all infected systems back to normal status 1 : single server, load ρ = λ E[S] (in a stable queue ρ is always less than 1)

(Contd.) Loss from an Attack Mean time to bring every node up is given by Pollaczek-Khinchin mean formula Note: Mean downtime depends only on the expectation E[S] and variance V[S] of the service time distribution but not on higher moments, and Mean value increases linearly with the variance.

Number of Attacks Attack arrival modeled as a Poisson process with arrival rate λ λ, may depend on many factors including type of software industry where it is used inherent security level of software market share of the software product Economies of scale in attack Let mλ be mean # of attacks against software 2

Loss Reduction Via Diversity Where, y = # of computers affected by attack on either type of software y 1 = # of computers affected by attack on incumbent software y 2 = # of computers affected by attack on competing software Individual f(y,x) are given by Beta-Binomial distribution

(Contd.) Loss Reduction Via Diversity Where, Service time S = k*y, where k is the measure of service capability; by investing in the IT department’s capacity a firm can decrease service time by decreasing k. λ+mλ = total number of attacks faced; 1/1+m are of type 1 and m/1+m of type 2.

Variables of Interest Diversity (x) Service capacity (k) Network configuration (θ)

Diversity vs. Service Capacity m is kept constant at 0.5 i.e. software 2 receives half as many attacks as incumbent software 1; π =.05 (5% probability of failure) Investment in service capacity offsets investment in diversity

Diversity vs. Network Config. m is kept constant at 0.5 i.e. software 2 receives half as many attacks as incumbent software 1; π =.05 (5% probability of failure) Investment in network config. offsets investment in diversity

Optimal Diversity Optimal diversity (i.e. optimal proportion of software 2) declines as software 2 receives more attacks vis-à-vis software 1 π =.05 (5% probability of failure); k = 1; θ = 1, λ=0.1.

Future Research Game-theoretic decision models for distributed network partition Graph coloring approach Each agent decides its color taking into account both the benefits and costs of being the same color as its neighbors Additional costs may be imposed by network administrator (social planner) Market Equilibrium Strategic interaction Role of government and industry groups

Questions?