Introduction to WOLFASI: Workshop on Logical Foundations of an Adaptive Security Infrastructure Leo Marcus The Aerospace Corporation Los Angeles July 13,

Slides:



Advertisements
Similar presentations
Computer Systems & Architecture Lesson 2 4. Achieving Qualities.
Advertisements

MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Practical and Theoretical Issues on Adaptive Security Alexander Shnitko Novosibirsk State Technical University.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Design Concepts and Principles
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
OASIS Reference Model for Service Oriented Architecture 1.0
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Chapter 19: Network Management Business Data Communications, 4e.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Conquering Complex and Changing Systems Object-Oriented Software Engineering TJSS System Design Lecture 12 Päivi Ovaska.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
The Architecture Design Process
Unified Modeling (Part I) Overview of UML & Modeling
Using Architecture Frameworks
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Formalizing an Adaptive Security Infrastructure in Mob adtl Laura Semini & Carlo Montangero dip. Informatica, Pisa Outline Mob adtl instance ASI Mob adtl.
9 1 Chapter 9 Database Design Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
1 Objective of today’s lesson S oftware engineering occurs as a consequence of a process called system engineering. Instead of concentrating solely on.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Stephen S. Yau CSE , Fall Security Strategies.
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Course Instructor: Aisha Azeem
CSC230 Software Design (Engineering)
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Enterprise Architecture
SEC835 Database and Web application security Information Security Architecture.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
An Introduction to Software Architecture
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 2Slide 1 Chapter 2 Computer-Based System Engineering As modified by Randy Smith.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Networks Breakout Session Summary September 21, 2012.
X-Road – Estonian Interoperability Platform
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
SOFTWARE DESIGN.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Overview of Formal Methods. Topics Introduction and terminology FM and Software Engineering Applications of FM Propositional and Predicate Logic Program.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Process algebras.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
David Weiss Software Product-Line Engineering: A Family-Based Software Development Process: Designing The Family David Weiss
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Chapter 10 Analysis and Design Discipline. 2 Purpose The purpose is to translate the requirements into a specification that describes how to implement.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Operating Systems David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 432.
Software Acquisition and Project Management Lesson I: Introduction.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
CSPC 464 Fall 2014 Son Nguyen.  Attendance/Roster  Introduction ◦ Instructor ◦ Students  Syllabus  Q & A.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Version 02U-1 Computer Security: Art and Science1 Correctness by Construction: Developing a Commercial Secure System by Anthony Hall Roderick Chapman.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Basic Concepts Key Learning Points : The objectives of this chapter are as follows:  To provide an introduction to the basic Concepts of enterprise architectures,
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Sub-fields of computer science. Sub-fields of computer science.
The Development Process of Web Applications
Logical architecture refinement
An Introduction to Software Architecture
PLANNING A SECURE BASELINE INSTALLATION
Chapter 6: Architectural Design
Software Development Process Using UML Recap
Presentation transcript:

Introduction to WOLFASI: Workshop on Logical Foundations of an Adaptive Security Infrastructure Leo Marcus The Aerospace Corporation Los Angeles July 13, 2004

Goals of Talk Introduce Adaptive Security Infrastructure Discuss assurance and formalization State some tentative definitions and theorems

Need for Adaptive Security Static security architectures cannot cope with rapidly changing security environment, including: –physical parameters –threats –attacks –policies –mission goals Systems designed for extended many- decade life –Cannot predict and handle future threats by current built-in non-flexible mechanisms

Goal for Logical Foundations of an ASI Understand how such a system works!

Need for Assurance Systems are being specified, designed, and built without a good method for architecting system- wide adaptive security mechanisms, and without a good method for gaining confidence that the mechanisms to be employed will deliver what, and only what, is needed. Without assurance, the cure may be worse than the disease.

Need for Formalization of Adaptive Security Assurance that proposed adaptive security mechanisms will perform as hoped (specified) Currently: rather haphazard collection of devices, poorly specified, with some testing Near future: rigorous specification and analysis Distant future: formal specification and proof. To begin: formalize significant aspects of proposed real system

Possibility of Proof How can we prove anything about such a complicated system, when we can barely prove the most rudimentary security properties of the most rudimentary devices? Answer: hierarchy! –Assuming the building blocks (protocols, algorithms, devices, interfaces) work as advertised, how do they function together? Define the problems that components must solve

Adaptive Security Infrastructure (ASI) Unified approach conceptually composed of –Sensor, –Analysis, and –Response capabilities To coordinate –Detection of security-relevant input –Security policy –User input –Analysis –Response

Adaptive Security Infrastructure Environmental Sensors Virus Defs Threat Warnings Analyzer and Policy Engine User IDS outputs Responder (Rest of the) System Detector User

Adaptive Security Infrastructure Environmental Sensors Virus Defs Threat Warnings Analyzer and Policy Engine User IDS outputs Responder (Rest of the) System Detector Us er

Adaptive Security Infrastructure Environmental Sensors Virus Defs Threat Warnings Analyzer and Policy Engine User IDS outputs Responder (Rest of the) System Detector Us er

Adaptive Security Infrastructure Environmental Sensors Virus Defs Threat Warnings Analyzer and Policy Engine User IDS outputs Responder ( Rest of the ) System Detector Us er

Potential Responses I. Defensive: intended effect internal allocation of resources (e.g. power; turning devices on or off) routing (including or excluding nodes) access rights crypto algorithms, keys, protocols sensor networks auditing authentication intrusion detection system settings (altering the false positive/negative ratio) patches device or data destruction installation of new hardware or software

Potential Responses II. Offensive: intended effect external Electronic –bombs, etc. Physical –bombs, etc.

State of the Art Much work on detailed aspects of specific components –Intrusion detection –Sensor networks –Architectures –Security policies Much less work on unifying principles

Principles for Formalization Mathematical logical framework Abstract from realistic scenarios Not directly concerned with –Usability –Current technology Long term goal: uniform semantics to allow rigorous specifications and verifications of –Architectures –Properties –Capabilities Should yield coherent and interesting research directions for component areas

Basic Assumptions ASI exists in a temporal and spatial world Policy, detection, analysis, and response all have temporal and spatial aspects that must be first class citizens in the formalism Otherwise, significant and interesting real issues will not be modeled Need common semantics connecting policy, detection, analysis, response

Research Issues 1. How should the semantics of a dynamic security policy be specified? 2. How should we take into account the global- local nature of all components of an ASI? 3. How should we specify the "security-relevant resources" available so that at any time the analyzer can choose an appropriate response? 4. How should we unify the temporal-spatial reasoning aspects? 5. What are the decidability or complexity issues in such a system? 6. What is the role of "approximate security"?

Research Issues: Spatial Hierarchical architecture Central (local) and distributed (global) detection, analysis, and response coordination Smooth transition between hierarchies Testability of policy satisfaction Enforceability of response

Research Issues: Temporal Duration of response Synchronization Relative speeds of changing environment, detection, analysis, communication, response Incorporation of time in policy Acknowledgments, success reports

Three examples Dynamic security policy –Specification language –Analysis –Testing for adherence or consistency Pervasive hierarchy assumption –All aspects of ASI are hierarchical Response specification –As a dynamically changing resource/scheduling problem –Language and semantics (effect, efficiency, etc.)

Goals for Specification of Adaptive Security Policy Facilitate analysis: Test/prove adherence or consistency Provide an umbrella guide for deciding if future events, actions, or responses are to be permitted or tolerated Automate reasoning about policy change within the context of larger policy or policy hierarchy

The Pervasive Hierarchy Assumption Arbitrary architectural structures (patterns of connectivity, e.g. networks) can exist within the system and within the ASI These structures may be dynamically changing Any aspect of specification, detection, analysis, or response can be considered in a version relativized to any structure

Defining Local Policy Let H be a hierarchy description, A an ASI specification (not individual instantiation), and P a policy. 1.P is local with respect to H in A if the satisfaction of P in A is dependent only on the satisfaction of some other (“test”) policy in all subsystems satisfying H. 2.Play with quantifiers 1.For all instantiations of A there is a test policy for P such that… 2.There is a test policy for P such that for all instantiations of A… 3.….in some subsystems satisfying H

Specification, Derivation, and Verification of Response A response is a distributed program/algorithm to be run concurrently with ongoing ASI operation Specify and evaluate responsive resources –Including communication channels, if needed –Current strength and location Plan appropriate action in time and space Coordinate response with analysis –Temporary and local fixes while long-term global solution is researched

Other Topics Approximate security –Specify achievable security goals Statistical properties Game-theoretic view –Between environment and ASI –Restrict the environment and design the ASI so the adversary does not have a winning strategy

Future Theorem For any system S implementing the specification S For any ASI A implementing the specification A For any dynamic security policy P of type P For any environment E satisfying conditions E S+A satisfies P in E

Problem Given E, P, and S, find A, as in previous slide As E gets more “realistic”, P has to get weaker in order for there to be any hope of finding an appropriate A. This weakening can be –Temporal (allow for longer lapse) –More approximate (allow for less secure)