fall 2015 research presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will...

22
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE Fall 2015 Research Presentations

Upload: others

Post on 18-Aug-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Fall 2015 Research Presentations

Page 2: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Monitoring Fusion for Intrusion Detection and Response

Atul BoharaP.I. William H. Sanders

Page 3: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Research Overview• Current research

– Fusion of monitoring information• Convert big heterogeneous data to more relevant and concise data• Build system profile through data association techniques to

support intrusion detection• Data driven fusion technique; currently using Clustering

– Working on a testbed to collect real data and run experiments

• Plan for the year– Use monitoring fusion to support automatic response

• We need to do fusion in real-time– Plan on publishing the work

Presenter
Presentation Notes
1.1 will help in making detection and response more efficient and accurate 1.2 learn about the system usage and detect outliers 1.3 to start with, we do not tag data for training purposes so we want to use unsupervised techniques 2.1 both host level and network level responses, such as killing a process, stopping certain communications, require combining data from multiple sensors in real-time We want to explore the feasibility of our fusion technique when we do it in real-time and then support response Currently, the target system is enterprise/academic like system
Page 4: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Security Monitor Deployment to Support Intrusion Detection

Uttam ThakoreP.I. William H. Sanders

Page 5: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Uttam ThakorePI: William Sanders

• Current work:– A cost-effective methodology for monitor deployment to meet

intrusion detection goals• Uses quantitative metrics to capture monitor utility and cost• Uses integer programming to determine optimal monitor

deployment based on intrusion detection goals and cost requirements

– Masters thesis: “A Quantitative Approach to Security Monitor Deployment”, deposited August 2015

• Plans for the year:– Improving scalability of MS thesis research– Preparing submission for DSN 2015 based on thesis– Adaptive “learning responses” – deployment and configuration

of monitors in response to detected attacker behavior to aid intrusion detection algorithms

Page 6: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

“Hands-Off” VM Introspection

Zachary EstradaP.I. Ravishankar K. Iyer

Page 7: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

“Hands-Off” VM Introspection• Virtual Machine Introspection (VMI) is used to

support Hypervisor-based VM Monitoring• Hypervisor only has access to bits and bytes• Traditional VMI requires precomputing offsets

and addresses for data structures– Can’t do in cloud (which is where you want VMI)

• Use architectural state to infer offsets e.g., Process IDs, address space information, etc…

• Enabling Reliability and Security as-a-Service

Page 8: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Research Summary

Cuong PhamP.I. Prof. Ravishankar Iyer,Prof. Zbigniew Kalbarczyk

Page 9: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Project Summary• Project

– Building resilient virtual machines: protection against failures and attacks

• Approach– Low-cost continuous monitoring– Measurement-driven designs– Leverage virtualization– Examples: HyperTap, Hprobes, hShield

Page 10: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Progress Summary

Continuous Monitoring- Hypertap/HProbe: Reliability

& Security monitoring of VMs- hShield: protect hypervisor

Automated Diagnosis- Failure diagnosis of cloud

management system

Fault/Attack Injection- CloudVal: Virtualized SW- TFI: Cloud management- HI: Attack Hypervisor-based monitoring

Assessment

Hardware

HypervisorCloud-val

App

OS

App

OS

hShield

Cloud OS Cloud OSDistributed System

Hardware

Hypervisor

App

OS

App

OS

App

OS

hShieldTFI

App

OS

FailureDiagnosis

Detection Recovery

Hypertap/HProbes

Hypertap/HProbesHI

Page 11: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Hypervisor RuntimeIntegrity Measurement

VM VM VM…

Layer

HyperTap

HProbes

Attack Surface

hShield

Continuouslymeasure

hypervisor integrity

• Assumption: Hardware is trusted – TPM, Intel TXT are enabled– Physical security

Firmware/Bios

OS/Hypervisor

HardwareTPM

Intel TXT

Physical security

TimeLoad-time Execution

11

Page 12: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Characterization and Adaptive Control of Cost-Performance Tradeoffs for Modern

Cloud SystemsMuntasir Raihan Rahman

P.I. Indranil Gupta

Page 13: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Muntasir Raihan Rahman• PCAP and GeoPCAP (complete)

– (C,A,P) -> (Pr C, Pr A, Pr P), characterize which combinations impossible together

– Defined consistency (C) / latency(A) SLA• Meet Pr C SLA, optimize Pr A, and vice versa

– Built system PCAP which meets PCAP SLA for single data-center under continuously changing data-center network conditions

• Deployed on top of Apache Cassandra, and Basho Riak– Extended PCAP to multiple geo-distributed data-centers

• AdapTive Elasticity for graph Computation (AzTEC) (current project)– Propose new graph computation SLA

• Meet deadline, optimize cost• Meet cost, optimize completion time

– Adaptive control of scale in/out to meet SLA without oscillations– Challenges

• Continuous and faithful measure of graph computation progress• Given current progress, find best schedule

Page 14: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Security and Isolation in Containers

Mohammad Ahmad, Sibin Mohan, Rakesh Bobba,

P.I. Roy Campbell

Page 15: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Background• Container benefits

– Startup on the order of milliseconds– Packaging dependencies & portability

• Container usage– Platform as a Service Clouds– Openshift, DotCloud

• Cross container side-channel attacks shown on public clouds [1]

Zhang, Yinqian, et al. "Cross-tenant side-channel attacks in paas clouds." Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014.

Page 16: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Secure Container Framework• Phase 1 – Defenses against cache based side-

channels– Scheduling-based defenses

• Security aware scheduling• Cache flushing

– Exploring hardware support• Intel Cache Allocation Technology to isolate tenants

– Evaluate the performance overhead with various configurations

Presenter
Presentation Notes
Phase 2 – Leverage hardware root-of-trust to bootstrap container framework security
Page 17: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Cloud-Routed Overlay Networks

Chris Cai P.I. Roy Campbell

Page 18: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Topic• Can we use servers publicly available from

cloud providers like Amazon to build overlay network? If so, what level of performance gain can we expect?

Page 19: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Questions to Answer• What percentages of

users can expect to benefit from cloud-routed overlay network?

• Does the performance gain depend on the geographic location of the users?

• Are the performance gains transient or persistent over long period of time?

• What is the proper routing strategy within cloud-routed overlay network?

Page 20: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTEUNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Toward Fabric: A Middleware Implementing High-level Description Languages on a Fabric-like Network

Sayed Hadi HashemiShadi AbdellahiJohn Bellessa

Roy H Campbell

Page 21: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

• Current Work:– Fabric Networks: Core Network, Edge Network.– Stop back practice.– An “approximate” implementation of Fabric

• Syntax → MPLS• Protocol → Shadow MACs (i.e., layer-2 labels)• Implementation (hardware/protocol) → OpenFlow

– High Performance. Very Large Scaled.– Immediate Update. Zero Packet Lost in Changes.– Submitted in ACM Middleware 2015

• Plans for the year:– Adaptation for Mobile Computing.– Prepare submission to NSDI.

Page 22: Fall 2015 Research Presentationspublish.illinois.edu/assured-cloudcomputing/files/2014/...1.1 will help in making detection and response more efficient and accurate\爀 氀攀愀爀渀

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS | INFORMATION TRUST INSTITUTE

Architecture