the willow system implementation john c. knight university of virginia dennis heimbigner university...

26
The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System Reconfiguration

Upload: erin-day

Post on 18-Jan-2018

217 views

Category:

Documents


0 download

DESCRIPTION

3 Aspects of Intrusion Tolerance Very Large Networks Interdependent Networks Heterogeneous Nodes Explicit Sense/Analyze/Respond Non-Local Faults Sequential Faults

TRANSCRIPT

Page 1: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

The Willow System Implementation

John C. Knight University of VirginiaDennis Heimbigner University of Colorado

Intrusion Tolerance ThroughSecure System Reconfiguration

Page 2: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

2

The Willow Team

University of Colorado: Alexander Wolf, Dennis Heimbigner, Antonio Carzaniga Naveed Arshad, Marco Castaldi, John Giacomoni Nathan Ryan

University of Virginia: John Knight, Jonathan Hill, Mike Tashbook, Phil Varner

University of CA, Davis: Prem Devanbu, Michael Gertz, Brian Toone

Page 3: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

3

Aspects of Intrusion Tolerance•Very Large Networks•Interdependent Networks•Heterogeneous Nodes•Explicit Sense/Analyze/Respond•Non-Local Faults•Sequential Faults

Page 4: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

4

Network

Sensors Act

uato

rs

Network State &Analysis Model

SelfHealing

TolerateAnticipated

Faults

PlannedPostureChange

SystemUpdate

SystemDeployment

External Input

Dimensions of Intrusion Tolerance

Secure &Decentralized

LogicalStructure

Page 5: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

5

Interesting Scenario

Very large network, crucial services Many OASIS elements operational in system System software upgrade underway (or your stuff) Several (<10) servers report e-mail with viruses:

Safely stop system software upgrade Isolate local networks containing affected nodes

E-mail attack worsens, wide area affected: Safely stop local isolation process (no point) Isolate critical databases, stop some applications Etc.

Page 6: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

6

Willow Architectural Issues Control loop interactions:

Asynchronous Priority & resources Conflicting goals

Network scale: State model Wide area change

Exceptions and results: Dynamic network Absolute vs. statistical Aggregation?

Target system actuation: Lightweight Standard interface & protocol

Network

Sensors Act

uato

rs

Network State &Analysis Model

SelfHealing

TolerateAnticipated

Faults

PlannedPostureChange

SystemUpdate

SystemDeployment

External Input

Page 7: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

7

Implementation Overview

Coordination Management

ProactiveReconfiguration

ReactiveReconfiguration

OtherE.g., Offense

Network

Siena P

/S

Actuation

External Entities

Mediators

Sensing

Page 8: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

8

Implementation Overview

Coordination Management

ProactiveReconfiguration

ReactiveReconfiguration

OtherE.g., Offense

Network

Siena P

/S

Actuation

External Entities

Mediators

Sensing

Page 9: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

9

Coordination Management Approach

Hierarchical workflows Priorities Intention counsel (council?) Site-selective communication Distributed agent structure (Cougaar) Payload delivery

Page 10: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

10

Cougaar Agent Structure

PI PI PIPI

PI PI PIPI

Plan

Asset(Attributes)

Society(Abstract Child)

Organizational(Abstract Child)

Task

Task

Task

Blackboard

Pub/sub System

Page 11: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

11

Willow Implementation Plug Ins

Site selective command Work request receiver Resource allocation Intention counseling Payload delivery Payload support services

Page 12: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

12

Willow Architecture AgentsWide Area Domain

Local Area DomainLocal Area Domain

Network Nodes

Page 13: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

13

Site-Selective Command

12

payload

22

1

2

Page 14: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

14

An Intrusion Tolerance Example

Intention:=StopPropagatingVirus.StopEmailVirus

At:=LAN(10<=emailVirusAlerts<=50000) AND NetworkNode(any) AND EmailServer(active)

At:=WAN(any)

Actuators shut down server

Intention:=Parent+DisableCapability(Email).ShutdownServer

Intention:=Parent+ReduceCapability(Email).DisableAttachments

At:=NetworkNode(administrator=false) AND EmailCient(active)

Actuators disable attachments

Page 15: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

15

An Intrusion Tolerance Example

WAN

LAN LAN

NetworkNodes

Email Clients and Servers

NetworkNodes

Page 16: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

16

Example of Intention Council

Intentions are compounded from most general to most specific intentions in layers (forced by specification) Halt_Intrusions(Buffer).Uninstalling_Application(Excel)

(Priority 7.1) Countermeasure(VirusInfected,Containment)

.Activate(TrapDoorExcel) (Priority 8.2) Repair_Application(Excel)

Finite state machine with the following rule: Do not repair applications that are recently uninstalled Do not finish repairs of applications that are to be uninstalled

Excel repair is cancelled if it is scheduled later, and is aborted/cancelled if it activated prior to arrival of the uninstall.

Page 17: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

17

Implementation Overview

Coordination, Resource Management

ProactiveReconfiguration

ReactiveReconfiguration

OtherE.g., Offense

Network

Siena P

/S

Actuation

External Entities

Mediators

Sensing

Page 18: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

18

Light-Weight Actuator Interface

Goals Remote management of applications and components

Specifically to actuate reconfigurations Light-weight mechanism capable of using new or

existing mechanisms Approach

Define a standardized interface for managing a single component or application

Coordinated actuation for multiple components Based on a simple and general protocol Minimal component support required

Implemented by the managed component Architecture-based vs ad hoc

Page 19: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

19

Dynamic Reconfiguration Single Component Reconfiguration

Application Reconfiguration? ?

?

Page 20: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

20

Protocol

System inspired by Network Management (SNMP) Manipulation of “variables” to achieve effects Get – determine component state Set – set state; side effect can cause reconfiguration Call – combination of set/get to achieve function calls Notify – asynchronous output from component

These variables are specified in a Component Description (similar to a MIB)

The developer defines and “exports” the variables

Page 21: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

21

Light-Weight Actuator Architecture

Component Agent: per-component code that manages component-specific reconfiguration mechanisms Implementation: in-component, wrapper, separate process

Application Agent: per-application code that coordinates and delegates component-level reconfiguration

Manager: the interface with the reconfiguration decision maker (automatic or manual)

ApplicationAgentManagement

ProtocolComp

Description

ManagerComp

ComponentAgent

ApplicationDescription

ManagementProtocol

Page 22: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

22

Field Reconfiguration Controller

ConfiguredComponents

ActivatedSystem

ActivatedSystem

Notification Service

ModelsAgentsAgents ModelsAgentsAgents

ConfiguredComponents

Reconfiguration control and/or data channel

Event channel

Application control and/or data channel

Component activation

Component deactivation

Standard reconfiguration interface

Mediator + Authority

DepotModelsAgents

Components

Mediator

Field Reconfiguration Controller

Mediator

Admin.Workbench

WorkflowManager

RecoveryFSMs

Willow Architecture

Page 23: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

23

Example Component Based Application

A

A

A

A

A

AA

A

ApplicationAgent

Manager

WillowFieldReconfigurationController (FRC)

Page 24: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

24

Benefits of this Architecture General

The system is independent with respect to applications, operating systems, ...

Component/Application Descriptions and Management Protocol specification allow interoperability with other management systems

Scalable Agents can be composed hierarchically

E.g., Treat whole application as “component” Manager coordinates and uses component-level

agent to perform dynamic reconfiguration at the application level

Page 25: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

25

Status

Initial target application: Joint Battlespace Infosphere (JBI) tracking demonstration Disseminators (Siena publish/subscribe servers) now

reconfigure using standard interface Next target: all fuselets comprising our JBI tracking

demonstration Prototype Manager and Application Agents

implemented Next step: J2EE reconfiguration

Page 26: The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System

Questions?