46
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics Yujuan Han Fudan U & UTSA Wenlian Lu Fudan U & U Warwick Shouhuai Xu UTSA HotSoS’14

Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Characterizing the Power of

Moving Target Defense via

Cyber Epidemic Dynamics

Yujuan Han Fudan U & UTSA

Wenlian Lu Fudan U & U Warwick

Shouhuai Xu UTSA

HotSoS’14

Page 2: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Moving Target Defense (MTD)

MTD is believed to be “game changer.”

There are a bag of MTD techniques.

A classification of three classes (next slide)

2

Page 3: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Three Classes of MTD

Network-based MTD Techniques

IP address and TCP port randomization etc.

Host-based MTD Techniques

Instruction-level: ISR

Code-level: code randomization

Memory-level: ASLR

Application-level: N-version programming etc

Instrument-based MTD Techniques

Dynamic honeypot

3

Page 4: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

How to Characterize Power of MTD?

There is no systematic quantitative understanding of

the power of MTD techniques individually, let alone

collectively.

Consequence: Don’t know how to deploy them

collectively and effectively or even optimally.

How to even define/formalize them exactly?

This paper: Using cyber epidemic dynamics as the

“lens” (or “ruler”) to characterize power of MTD.

First analytic approach

First-step within this approach

4

Page 5: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

What Is This Paper Basically About?

Cyber system often stays in some insecure/undesired

configuration/posture (will be precisely defined).

MTD often induces transient secure configurations,

which however do not last permanently.

How can we exploit MTD-induced secure configurations

to rescue/tolerate the insecure ones, by (e.g.) making the

dynamics converge to the clean state?

5

Page 6: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

What Is This Paper Basically About?

One sentence summary: Suppose we know MTD-induced

transient secure configurations, we can optimally

orchestrate MTD to achieve some desired long-term goal.

6

Time t 0

Non-MTD C1

t1

MTD C3

t4

Non-MTD C1

t3

MTD C2

t2

C1: insecure configuration (e.g., due to the introduction

of new attacks)

C2, C3, …: MTD-induced transient secure configurations

Page 7: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Optimal in What Sense?

Maximizing the time during which the cyber system can

afford to stay in insecure configuration C1, while still

able to force the dynamics converge to the desired state.

Don’t care about the cost imposed by launching MTD

Minimizing the cost of deploying MTD, while allowing the

cyber system to stay in insecure configuration for a

given amount of time.

When cost matters

7

Page 8: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Roadmap

Cyber epidemics model accommodating MTD

Analysis: The case of dynamic parameters (t), (t)

Analysis: The case of dynamic structures G(t)

Related work

Conclusion and future research directions

8

Page 9: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

A specific kind of Cybersecurity Dynamics (see poster)

Complex Network based abstraction:

Nodes abstract entities (e.g., computer)

Node state: green -- secure; red -- compromised

Edges abstract the attack-defense interaction structure

(system description/representation)

Three kinds of outcomes of evolution of global security state Example Question: what are the governing/scaling laws?

Cyber Epidemic Dynamics: Basics

Page 10: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

0

1

time

(Expected) portion of compromised nodes w.r.t. time

This is perhaps the most natural cybersecurity metric.

With information about the probability that the nodes are

compromised at time t, we can make better decisions.

E.g., can a mission be disrupted at time t (< mission

lifetime) with probability at most p? 10

Cyber Epidemic Dynamics: Basics

Page 11: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

0

1

time

(Expected) portion of compromised nodes w.r.t. time

Ideal result under defender’s

(optimal) manipulation via, for

example, MTD

0

1

time

Alternate result under

defender’s manipulation via, for

example, MTD

11

Cyber Epidemic Dynamics: Basics

Equilibria can be “dynamic” due to the introduction of zero-day attacks.

Page 12: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Cyber Epidemics Model: Basics

Using attack-defense structure to capture the (attacker,

victim) relation: G=(V, E)

Using parameters to capture “atomic” attack and defense

capabilities:

: the probability an infected node u V successfully

attacks a secure node v V over (u,v) E at time t

: the probability an infected node v becomes secure

at time t

12

Page 13: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Cyber Epidemics Model: Basics

Using attack-defense structure to capture the (attacker,

victim) relation: G(t)=(V(t), E(t))

Using parameters to capture “atomic” attacker and

defense capabilities: (t), (t)

Using epidemic threshold to describe the phase

transition: sufficient condition under which the epidemic

dynamics converges to equilibrium state — the clean

state (i.e., spreading dies out) in this paper.

13

Page 14: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Cyber Epidemics Model with MTD

Idea: MTD can induce dynamic attack-defense structures

G(t)=(V(t), E(t)) and/or dynamic parameters (t) and (t)

Network-based MTD Techniques can induce dynamic

attack-defense structures (e.g., dynamic IP addresses)

Host-based MTD Techniques can induce dynamic

parameters (e.g., harder to penetrate into computers)

Instrument-based MTD Techniques can induce dynamic

attack-defense structures (e.g., dynamic IP addresses)

and dynamic parameters (e.g., detecting new attacks)

14

Page 15: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Problem Space: Assuming Fixed V

15 Definition: Configuration = (G(t), (t), (t))

Static structure: G=(V, E)

Static parameters: ,

Static structure: G=(V, E)

Dynamic parameters:

(t), (t)

Dynamic structure:

G(t)=(V, E(t))

Static parameters: ,

Dynamic structure: G(t)=(V, E(t))

Dynamic parameters: (t), (t)

See full

version of

the paper

Page 16: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

A General Model

16

Dynamic structure: G(t)=(V, E(t)), adjacency matrix

A(t)=[Avu(t)]

Dynamic parameters: (t), (t)

iv(t): probability node v is infected at time t (i.e., state)

Assuming attacks are launched independently

See “a new approach to modeling and analyzing

security …” for tackling adaptiveness/dependence

We have, for each v

Page 17: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Threshold in the Simplest Case

17

Spreading dies

out (clean state)

The threshold

(sufficient condition)

Page 18: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Idea of Tolerating Insecure Config.

18

Definition: Insecure configuration C1=(G1, , ): because it

violates convergence condition (1).

Suppose the system has to stay in configuration C1

Justification: introduction of new attacks etc

The defender can exploit MTD to force the system into

some transient secure configuration C2, C3, …

How to orchestrate MTD to make the dynamics converge

to the desired equilibrium state?

Time t 0

Non-MTD C1

t1

MTD C3

t4

Non-MTD C1

t3

MTD C2

t2

Page 19: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Def: MTD-Power w/o Considering Cost

19

Given

information

To

maximize

Page 20: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Def: MTD-Power while Considering Cost

20

Given

information

To minimize

Page 21: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Roadmap

Cyber epidemics model accommodating MTD

Analysis: The case of dynamic parameters (t), (t)

Analysis: The case of dynamic structures G(t)

Related work

Conclusion and future research directions

21

Page 22: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

A General Result

22

Page 23: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Max Tolerance of Insecure Configuration

without Considering MTD Cost

23

The optimal

orchestration strategy

Page 24: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Algorithm for Orchestrating MTD to

Achieve the Max Tolerance

(without considering cost)

24 Time t 0

Non-MTD C1

t1

MTD CN

t4

Non-MTD C1

t3

MTD CN

t2

Page 25: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Degree of Tolerance vs. Parameters:

the case of not considering cost

25

Page 26: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Minimizing Cost w.r.t. Given Degree

of Tolerance

26

Page 27: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Min Cost: Dynamic Parameters

27

Page 28: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Algorithm for Orchestrating MTD to

Achieve the Min Cost

28 28 Time t 0

Non-MTD C1

t1

MTD C2

t4

Non-MTD C1

t3

MTD C3

t2

Page 29: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Simplifications

29

When the cost functions are convex or concave,

things can be simplified

True for many practical scenarios

See paper for details

Page 30: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Roadmap

Cyber epidemics model accommodating MTD

Analysis: The case of dynamic parameters (t), (t)

Analysis: The case of dynamic structures G(t)

Related work

Conclusion and future research directions

30

Page 31: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

A General Result

31

Page 32: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Max Tolerance of Insecure Configuration

without Considering MTD Cost

32

The optimal

orchestration strategy

Page 33: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Algorithm for Orchestrating MTD to

Achieve the Maximum Tolerance

(without considering cost)

33 33 Time t 0

Non-MTD C1

t1

MTD CN’

t4

Non-MTD C1

t3

MTD CN’

t2

Page 34: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Degree of Tolerance vs. Parameters:

the case of not considering cost

34

Page 35: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Minimizing Cost w.r.t. Given Degree

of Tolerance

35

Idea for finding min cost:

Fortunately, the number of

MTD-induced configurations

is often small

Page 36: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Finding Minimum Cost

36

Page 37: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Finding Minimum Cost

37

Page 38: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Algorithm for Orchestrating MTD to

Achieve the Minimum Cost

38 38 38 Time t 0

Non-MTD C1

t1

MTD C2

t4

Non-MTD C1

t3

MTD C3

t2

Page 39: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Roadmap

Cyber epidemics model accommodating MTD

Analysis: The case of dynamic parameters (t), (t)

Analysis: The case of dynamic structures G(t)

Related work

Conclusion and future research directions

39

Page 40: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Related Work

Characterizing effectiveness of MTD: two

complementary perspectives (see paper for references):

Specific technique with localized view vs.

classes of techniques with global view

Step closer to real system: state configuration

Cyber Epidemic Dynamics: an active research area

rooted in biological epidemic dynamics

But beyond it because of unique technical barriers

40

Page 41: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Limitation of the Study

Assume attack-defense structures and parameters (i.e.,

transient configurations) are given.

Eliminating it: An orthogonal thread of Cybersecurity

Dynamics (see poster)

Assume attacker cannot choose when to impose

configuration C1.

Assume homogeneous parameters (v, u) = and (v) = .

Eliminate them or weaken them as much as possible

Where is the boundary between analytic model and

simulation model? 41

Page 42: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Conclusion and Future Work

An approach: using cyber epidemic dynamics to

characterize the power of MTD.

Two measures of MTD-power: Optimization

Constructive proofs that lead to algorithms for

orchestrating MTD to achieve the maximum

tolerance or minimum cost

Future work: Addressing the limitations

42

Page 43: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

Enjoy exploring the unknown

territory!

43

Page 44: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

44

Page 45: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

( secure node compromised node)

Can be instantiated at multiple resolutions: nodes

represent (for example) computer, component, etc.

Topology can be arbitrary in real-life: from complete

graph to any structure

45

Cyber Epidemic Dynamics: Basics

Page 46: Characterizing the Power of Moving Target Defense via ...shxu/socs/Measuring-Power-of-MTD.pdfconverge to desired state (e.g., due to zero-day attacks) Many desired “transient”

The Gap Need to Be Bridged to Practice

We assume we know “transient” capabilities of launching

MTD (in terms of manipulating the model parameters).

Justification: No single MTD defense (combination)

would be “permanently” powerful to force the dynamics

converge to desired state (e.g., due to zero-day attacks)

Many desired “transient” configurations can tolerate

some undesired configurations, when making the

dynamics converge to the desired equilibrium state

Need to eliminate this assumption.

46