adapt, automate or perish - csiro research · adapt, automate or perish february 2018 dr. partha...

41
Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled technical data. Distribution Statement “A” (Approved for Public Release, Distribution Unlimited). DISTAR Case No. 28888, approved on 12/28/2017) This document primarily describes work sponsored by the United States Defense Advanced Research Projects Agency (DARPA) under contracts: F30602-99-C-0188 (APOD), F30602-00-C-0172 (ITUA), F30602-02-C-0134 (OASIS Dem/Val), N00178-07-C-2003 (CSISM), FA8750-10-C-0242 (A3) and HR0011-16-C-0058 (ARMED), and also mentions work sponsored by the United States Air Force Research Laboratory (AFRL) under contracts: FA8750-15-C-0079 (KAGE) and FA8750-15-C-0057 (CMT), The views, opinions and/or findings expressed are those of the author and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government .

Upload: others

Post on 27-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Adapt, Automate or Perish

February 2018

Dr. Partha PalRaytheon BBN Technologies

This document does not contain any export controlled technical data. Distribution Statement “A” (Approved for Public Release, Distribution Unlimited). DISTAR Case No. 28888, approved on 12/28/2017)

This document primarily describes work sponsored by the United States Defense Advanced Research Projects Agency (DARPA) under contracts: F30602-99-C-0188 (APOD), F30602-00-C-0172 (ITUA), F30602-02-C-0134 (OASIS Dem/Val), N00178-07-C-2003 (CSISM), FA8750-10-C-0242 (A3) and HR0011-16-C-0058 (ARMED), and also mentions work sponsored by the United States Air Force Research Laboratory (AFRL) under contracts: FA8750-15-C-0079 (KAGE) and FA8750-15-C-0057 (CMT),

The views, opinions and/or findings expressed are those of the author and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government .

Page 2: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Agenda

qIntroduction (3)qA brief history (5)qTools of the trade and principles (6)qSome recent examples (10)q Challenges (1)q Summary and discussion (1)

Font size proportional to section content

Page 3: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Distributed Systems Technology @ BBNBrief Overview

Page 4: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

A History of Innovation1950s 1960s 1970s 1980s 1990s 2000s

Acoustic Design for UN General Assembly Hall

AI Programfor Pattern Recognition

Demonstration of Time Sharing

LOGO Programming Language

ARPANET-First Multi-node Packet Switched Network

First Person-to-Person Network Email & the @ Sign

First TCP for UNIX

Acoustic analysis of JFK Assassination Tapes

Analysis of Nixon Watergate Tapes

First Symmetric Multi-processor

Collaboration PlanningTechnology

First Electronic Mail

Defense Data Network

Natural Language Computer Interface

Intelligent Agents

SimNet

Secure email for DoD

DARPA Information Assurance

Broadband Wireless Technology

Genetic Algorithm Scheduling Tools

Collaborative Planning for Desert Storm

ATM Switch

40K Word Speech Recognition System

Safekeyper Certificate Management

Certificate Authority Workstation (CAW) Quantum

Cryptographic Network

Call Director Natural Language Routing

DARPA Agent Markup Language

MicrothunderUrban Environment SurveillanceSystem

Ultra*Log Agent-Based Network Survivability

Boomerang Mobile Shooter Detection System

2010s

Warrior-X soldier-wearable shooter detection

Quantum breakthrough in coupling of superconducting qubits

Nation’s largest network science research center

This slide is produced (and distributed) by BBN’s communication department, the images are BBN internal photos

Page 5: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Patents

BBN By the Numbers

Boomerang systems deployed to Iraq & Afghanistan

of technical staff have advanceddegrees

Staff with SecurityClearance

TS or SCIclearances

64%

10,000

800Employees

75% 120

57SCIFs

Years since BBN was founded

8US locations

Page 6: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

AQuAOIT

QuOIN

APODITUA

DPASA-DVPhishBouncer

CSISMQIAAMU

APSCoT P3S

STEG

A3 EvalQIAAMU 2

AIRESMoBIES

JBIQoSPCES 2

ARMS ARMS 2ICED

Marti

CAQ

ELSIFQED

Marti 2

CAQ 2

VFILMMETA

SAFIM

MIMIR

F6

Force ProtectionMSS

AMTRIPR

XDDS BBACLDADS

XDIME

ICAS

SIPHER

SCIMITAR

MICCA CEAM

TASBEMADV

CCM

ARC

MTIP

ASR

SOSITE

BANDITCoalesce

CMT

SAWDCHOPD

KAGE

2017 2018 2019 2020 2021 2022 2023

IMMoRTALS (BRASS)

A3 (CRASH)

ARMED ( XD#)

SHARC

BARTINDEED

PPFS2

BANDIT2

ROGERRIG (DyNAMO)

STAMPEDE

TIM

NSF Expeditions

MITE

C3DSCANNER

TAK

FACETS

DICEDAME

MAP

CCAST

LWAP

TRMO

SD2 (check)

FastNA (check)

Cross domain

Resilient systems

Drones/swarms

Information management

Tactical SA

Planning, modeling and quantification

Synthetic biology

Distributed Systems Tech at BBN

q Group of ~25 researchersq Almost all aspects of distributed systemsq Various types of distributed systems

q Smarter, Resilient, Trustworthy

Page 7: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

A Brief History

Page 8: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed

on the title page.

Security– A Brief History…There were “information” before the computers…

q Codes…Ciphers… Seals..

q Cryptology– cryptography and cryptanalysis

q From warfare to modern day economy!

Computers: Electronic machines that process and store information

q Access to computing resources and information

q Bell-La Padula, Orange Book…

Information Systems: Computers connected in a network.

Processing, storing, deriving, transforming………….

information

q Security of the network/communication over the network

q Intrusion detection, PKI…

Vulnerabilities

Attacks

Threats

Countermeasures

q Static (precaution)

q Dynamic (response)

5th Century BC

Source: www.unmuseum.org

Enigma, WWII

Source http://math.arizona.edu/~dsl/enigma11.htm

Page 9: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Elements of Modern Information Securityq Physical security

q Procedural security

q Personnel/Personal/Inter-personal security

q Compromising emanation security

q Operating systems/Host security

q Network security

q Application security

Information Assurance:

q Prevent, Deter, Detect, Respond, Recover….

Source: www.flickr.comSource: icondoit.wordpress.com

Source: YouTube video of NHK Van Eck Phreaking

Source: www.wox.it

Issues clearenceafter vetting

Source: nato.int

Source: openclipart.org

Page 10: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Traditional Security Issuesq Prevent bad things from happening:qPrevent unauthorized disclosure of dataqPrevent unauthorized modification of dataqPrevent unauthorized consumption of computer or network

resourcesq Security Policy: policy to prevent bad things q Mechanisms and elements supporting security policy:qAuthentication: prevent masquerade, spoofing (of data origin,

peer)q Identity based authorization

qEncryption: prevent unauthorized visibility to dataqAccess Control: prevent unauthorized use and consumption

q MAC, DAC, RBAC…qNon-repudiation: prevent deniability

Page 11: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Generations of Security ResearchNo system is perfectly secure– only adequately secured with respect to the perceived threat.

Prevent Intrusions(Access Controls, Cryptography,

Trusted Computing Base)

1st Generation: Protection

CryptographyTrusted Computing Base

Access Control & Physical Security

Detect Intrusions, Limit Damage(Firewalls, Intrusion Detection Systems,

Virtual Private Networks, PKI)

2nd Generation: Detection

But intrusions will occur

Firewalls

Intrusion Detection Systems

BoundaryControllers VPNs PKI

But some attacks will succeed

Tolerate Attacks(Redundancy, Diversity, Deception,

Wrappers, Proof-Carrying Code, Proactive Secret Sharing)

3rd Generation: Tolerance

Intrusion Tolerance

Big Board View of Attacks

Real-Time Situation Awareness& Response

Graceful Degradation

Hardened Operating System

This slide contains material previously published by DARPA

Page 12: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

3rd and 4th Generations3rd Generation: Tolerance and Survivability: q Assumes that attacks/bad things cannot be totally prevented– some attacks will

even succeed, and may not even be detected on time…q Focuses on desired qualities or attributes that need to be preserved/

retained/continued even if in a degraded manner—q Availability: (of information and service)q Integrity: (of information and service)q Confidentiality: (of information)

Next Generation of Survivability (Resiliency): q Regain, recoup, regroup and even improve…

W/O attack

Undefended

3rd Gen: Survivable

Next Gen?

time

Level of

service

Start of focused attack

Page 13: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Tools of the trade and principles

Page 14: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Fundamentalsq AdaptqChange is inevitable, some are natural but some are adversarial qRisks of not adapting

q In the short term- sitting duck

q In the long term- evolutionarily extinct

q AutomateqChanges are rapid (sign of the time—internet speed), adversary is at

machine speedqRisks of not automating

q Human errors

q Slow response à no response

Source: oldsalshaker.blogspot.com

Source: openclipart.org

Source: www.dodo.blog.br

Source: www.empillsblog.com

Source: www.lowlevel.it

Page 15: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

What to Adapt and Automateq Adapt and Automate should cross cut basic security

aspectsq Protect:

q responding to mission needs, threat levelq balancing cost

q Detect: q drowning in data

q And then some, for repair and recovery

q Adapting for resilience q Configurationq Codeq Policy

Some of the repair and recovery adaptations may actually adapt protection and detection mechanisms…

vs

Source: acreelman.blogspot.com

Source: asmemoriasdarute.blogspot.com

Page 16: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Proactive and Reactiveq Reactive: In response to an observed event (detection) or

its derivative (suspicion)q Proactive: Based on predetermined policyq Combination: Modify the proactive policy based on

detection or suspicion

q Proactive Adaptation q Rejuvenation (e.g., GMU SCIT)q Moving Target Defense (One of the recommendations

from NCLY 2009):

q Food for thoughtq Is there anything that is truly proactive?q State reconstitution(Northeastern’s DMTCP)

Page 17: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Context, Basis, Support q Adaptation and Automation do not happen in a vacuumqArchitecture: organization of components, both functional

components from the undefended system and the added defense mechanisms, their interconnections, and protocols that govern them…q Entities, interconnections, protocols

qProtect and detect supplements to adaptationq High barrier to entry (outside as well

from one part to another)q Improve the chance to spot attacker

activityq Adapt to changes caused by the

attackerq Automate, when possible

Page 18: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Principles/Rules of Thumbq SPOF protectionq Controlled use of diversityq Physical barriers before key assetsq Robust basis of defense in depthq Containment layersq Modularityq Range of adaptive responsesq Human overrideq Minimalismq Configuration generation from specs

q Many of these are surprisingly simplistic and intuitive– but it is also surprising how many of these are routinely ignored

Page 19: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

A Quick Design Pass

• Notion of “zones”: Crumple zone, Operations zone, Executive zone

b

Network

“key asset”

applications accessing the key asset over the network

Introduce redundancy

a d cb

Network

• Crumple zone enablers: proxies at various layers • Other advantages

• Rate limiting• Size limiting• Learning usage pattern• Tunnel termination• Insertion of protocol diversity• Control points

Introduce diversity

a

Network

a

SPOF?

Introduce physical barriers

using DMZ diversity?

Automation and management?

run same attack 4 times? 4 replicas are still accessible

Network

controlled communication

Management & decision-making functions

Main operational functionality

Access points

• Executive zone enablers: AI, Planning, Learning• Other advantages

• Human interface and override• Out of band analysis and improvement

Page 20: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Some examples

Page 21: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Early Examplesq 1999-2000qAPOD (sensor-actuator loops, pre-programmed MW-based

defense-application integration for defensive response to unavailability attacks)

qITUA (redundancy, unpredictability, response to unavailability and integrity attacks)

q ODV (2005)qArchitecture, integration qHighlighted the need for automation

q Intel/Automation (2007)qCognitive cyber-defense reasoning

This arc is more personal/ BBN DST centric, other contemporary projects explored similar, alternative and complementary paths, e.g., EU MAFTIA

Page 22: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

APOD (Aug 1999- Mar 2003)

Middleware for QoS andResource Management

Crypto

AttackerDistributedApplication

OSs and Networks

Raw Resources

IDSs Firewalls

Overcome Avoid Guard

Use QoS Management

Reserve bandwidth, CPU

Migrate replicas Tighten access controls

Use Gateways Block IP sources

Change protocols, ports

Strengthen encryption

Use application level adaptivity

Retry, use local calls

Choose alternate server, degrade service

Increase self-checking

q Red team evaluationqGoal: Deny the service offered by the defended application (imagebroker)

q ResultsqMost single attack runs failedq The red-team was forced to combine different attacks to cause a denial of service qOf the attack runs that succeeded, the average time-to-denial was ~45 minutes

from start of attacks, with a minimum of roughly 10 minutes (without APOD defenses, service was denied immediately)

qDefense added 5-20% overhead to the defended application’s latency

This research was sponsored by DARPA under contract No. F30602-99-C-0188.

Page 23: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Intrusion-Tolerant Gateway

Manager

Replicas

FirewallSensor/Actuator Loops

KEY:

ITUA (Aug 2000-Jan 2004)q An intrusion-tolerant

middleware that usesqRedundancy and group

communication protocols to tolerate arbitrary component failures

qSensor-actuator loops to mount quick and localized defensive response to intrusions

qDecentralized managers to recover from intrusions and to manage redundant resources

qUncertainty in defense strategy to make adaptive response unpredictable to the attacker

q Validated the middleware’s intrusion tolerance by probabilistic and experimental methods qTransitioned developed technology to DoD

application(s) (e.g., CECOM SMS, Boeing’s IEIST) to improve their survivability, and to other DARPA programs (OASIS Dem/Val)

This research was sponsored by DARPA under contract F30602-00-C-0172 (ITUA).

Page 24: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

DPASA (2002- 2005)q High water-mark in survivable system design q Protection-detection-adaptation baked in architectural resilienceq Need for intelligence and automation

q Defense mechanisms: policy enforcement, encryption, authentication, detection and correlation, redundancy, recovery and response adaptation

q Design principles: No SPOF, layered defense, containment

q Architecture: Zones, quads, protection domains, middleware

q Protocols: Corruption tolerant PSQ, command and control

This research was sponsored by DARPA under contract No. F30602-02-C-0134.

Page 25: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

CSISM (2005-2007)

Learn from past successes and failures

Proofs, coherences to select claims about the system state Select the response from options available that

provides the best remedy to the claimed state

Alerts à accusations, Observationsà evidences

Came close to “ground truth” decisions in controlled red team experiments, but building and working with a performant model where hypotheses can be proved turned out to be very very hard!

This research was sponsored by DARPA under contract No. N00178-07-C-2003.

Page 26: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Recent Examplesq Clean Slate Resilience (DARPA CRASH Program)qWhat would you do if you are to start fresh

qWhat else remains unexplored q Among other things, deception

Other works: Proven kernels, Tagged architecture covering hardware, OS and compiler support

Page 27: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Advanced Adaptive Applications (A3) Environment q MotivationqDefense of last resortq Time taken to address zero-

daysq Opportunity qHost resources are becoming

chipqVirtualization

q ApproachqNear application/per applicationqContainerizeqMandatory mediation (I/O and

execution)qRecord and replay,

experimentation

qAdvent of RASP Successfully demonstrated resilience against zero-days in red team experiments, and real CEs

This research was sponsored by DARPA under contract No. FA8750-10-C-0242

Page 28: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

KAGE and ARMEDq MotivationqAdversary can cause a diversion, why cant we?

q Opportunity qSDN, Virtualization

q Approachq Create an alternate reality

q KAGE

q Present an alternate reality q ARMED

Page 29: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Keeping Adversaries Guessing and Engaged (KAGE)

q Basic Construct:q Employ Virtual End Points (VEPs)qPseudo copies of a Real End

Point (REP)qWithout real (critical) dataqMonitored at the hypervisor level

to evade detectionq Employ SDN toqHide the REP and only expose a

VEPqDuplicate only application traffic

to the REP, drop responses from the VEP

qUpon detection of malice, isolate all adversary traffic to a VEP and begin targeted deceptions

This construct enables complex interactions with the adversary, while protecting against cyber fratricide, as the vast majority of KAGE interactions occur separate from all benign traffic and computation.

This research was sponsored by the US AFRL under contract No. FA8750-15-C-0079

Page 30: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed

on the title page.

Adaptive Resource Management Enabling Deception (ARMED)

q Network maneuvers, including deceptive

maneuvers, to defend aganst extreme DDoS

attacks, including low and slow

q ARMED offers protocol specific network nodes

that serve as anomaly detection points and

deception injection platforms

Split Network Stack

Adaptive Adaptation Control

Low Cost Connection Management

Active Deception

Overlay NetworkAR

MED

Net

wor

k A

ctor

(AN

A)

This research was sponsored by DARPA under contract No. HR0011-16-C-0058

Page 31: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Challenges

Page 32: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

We Progressed, but Are We Done? q Technical ChallengesqStable and beneficial adaptationqRange and scope of adaptation

q E.g., code modification qA3 only functionality reductionqOthers (e.g., gen prog)- genetic

programming/evolutionary search qTrust in automation

q Acceptance/Trust/Transition ChallengesqValidation/Quantification (e.g., determine impact of

deception?)qCertification

Page 33: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Composable Measurable Trust (CMT)What does it take to earn the trust of mission stakeholders when a system under attack is recovered and repaired?CMT is initially focused on embedded control systems (e.g., Pixhawk) and missions involving autonomous vehicles

q Trust: willingness to accept risk of the unknown q How to increase trust passively (i.e., without adding new

QoS and Security controls)q Reduce the scope (of the unknown)

q More transparencyq Reduce the risk (of the unknown)

q Less uncertaintyq Usage of trust

q tends to vary from mission to mission: periodic reassessment, trust but verify, complete mistrust

This research was sponsored by the US AFRL under contract No. FA8750-15-C-0057

Photo: 3DR IRIS( stock)

Photo: a BBN-built rover

Page 34: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Summary and discussion

Page 35: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Challenging, Scary, But Also Excitingq Arms raceqAsymmetryqNew payoffs, new vectors

q Challenge as well as an opportunity qTechnicalqSocietal good

q Eat the humble pie: technology is not a silver bulletqEducationqEthics

Page 36: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Backup

Page 37: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Proactive and Reactiveq Reactive: In response to an observed event (detection) or its

derivative (suspicion)q Proactive: Based on predetermined policyq Combination: Modify the proactive policy based on detection

or suspicion

q Both styles can be used to cause deception q Reactive: Divert ill-behaving (e.g., sending too many

requests, sending out of order protocol messages)clients to a tar pit (instead of rate limiting, or sending error/terminating)

q Proactive: Drop SYN packets with a certain probability, always respond to scans with a set of non-existent hosts

Page 38: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Deception-A Timeline Perspective

Burst of defensive cyber deception activity : Cohen, Rowe, Provos, Bishop, etc. (even some in CPS – e.g., Cisco) Honeypots and honeynets really emerge. Systems to masquerade are developed. A downturn in activity in defensive cyber deception (though uptick in other deception-related areas such as MTDs)

A notable resurgence in commercial, DoD, and academic settings. In the commercial space focused on the simpler space of deception for detection. Some potential drivers of this resurgence:• Availability and awareness of new domains and contexts such as CPS• Availability of enabling technologies such as malleable networks, virtualization• Continued advantage by the adversary in the cyber arms race

Deception beginnings

Page 39: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

DDoS Background and Contextq Cloud based defenses have had reasonable success in protecting

against traditional DDoSq A particularly problematic variant of these attacks, however, has

emerged: “low and slow” DDoSqNon-volumetric (attacks are not measured in Gbps)qExploits vulnerabilities in protocols/systemsqGoals and effects are the same: loss of serviceqExamples: “slowloris” family of attacks

q Create connections to a web server, sending partial requestsq Periodically write HTTP headers, keeping the connection alive,

and operating within the HTTP protocolq Variants of this perform slow POST request, or perform a full

request, but read the response very slowly (set TCP window size)qRequests in isolation often look legitimate, and unlike their noisy

volumetric counterparts, the attacks tend to fly below the radar

Page 40: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

Notice: Data on this page is controlled by restrictions listed on the title page.

Advanced Adaptive Applications (A3) Environment q A3 is an execution management

environment that makes network-facing server applications resilient against zero-day attacks

q Our most recent work in adaptive systems and resiliency

q Features isolation, interception, mediation, run forward proxying

q Stop and absorb attacks using application-specific I/O and execution mediation policy, preventing attacks from spreading in the mission-critical network

q Monitor application and mission-specific undesired conditions that are indicative of successful attacks

q Automated localization and diagnosis of attack induced faults q Mitigate exploited vulnerability by policy adaptation and application program repair

Rapid Response Immunization Against Zero-Day Attacks

Without A3, deployed applications may become unavailable and/or stay vulnerable for days until a fix for the zero day is (manually) found and applied

This research was sponsored by DARPA under contract No. FA8750-10-C-0242

Page 41: Adapt, Automate or Perish - CSIRO Research · Adapt, Automate or Perish February 2018 Dr. Partha Pal Raytheon BBN Technologies This document does not contain any export controlled

RAYTHEON MOST PRIVATE

RAYTHEON MOST PRIVATE

Notice: Data on this page is controlled by restrictions listed on the title page. Raytheon BBN Proprietary

Questions?Partha Pal

[email protected]