49
Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.1 © 2006 Paulo Lício de Geus Immunological security systems Overview • Scenario (traditional security approaches) • Human Immune System, Danger Model • Imuno Project • Components • Analogies • Prototype • Some results • Framework for future development

Immunological security systems

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.1

© 2006 Paulo Lício de Geus

Immunological security systems

Overview

• Scenario (traditional security approaches)

• Human Immune System, Danger Model

• Imuno Project

• Components

• Analogies

• Prototype

• Some results

• Framework for future development

Page 2: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.2

© 2006 Paulo Lício de Geus

Scenario

• nature of security vulnerabilities» configuration, weak specifications, sloppy programming (culture!)

• security incident rates

Page 3: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.3

© 2006 Paulo Lício de Geus

Scenario

• continually increasing

– despite software writers’ efforts—why?

• complex programming environments

– Web servers + “intelligent” browsers

» can you a spot a “guru” on a given set of subsystems?

– who can program securely, these days?

• security administrators

➔ must be “online” (bug and patch awareness)

Page 4: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.4

© 2006 Paulo Lício de Geus

Scenario

• hard to maintain a security policy

• inadequacy/absence of native OS tools

– Windows...

• flexibility demanded internally to the organization

Page 5: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.5

© 2006 Paulo Lício de Geus

Breaking the vicious cycle

• we are very far from proved-secure OSs

• security must be intrinsic to the playing entities

• autonomous security systems

– administrators: ‘Thank, God!’

Page 6: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.6

© 2006 Paulo Lício de Geus

IDS

• IDS - Intrusion Detection Systems

– provide warnings of possibly successful attacks

– help covering limitations

» in the security policy process

» in the tools available to enforce policy

– limited to known attacks

• IPS - Intrusion Prevention Systems

– currently only help against known attacks

» some antiviruses manage some generality in signatures

• databases must be constantly updated

– administrators still forced to be online…

Page 7: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.7

© 2006 Paulo Lício de Geus

IDS

• knowledge-based detection

– only known attacks (in database)

!!!

"#""#"$#$$#$

%%&&

'('('(''('('(''('('('

)()()())()()())()()()

*(**(*+(++(++(+,,--

.(..(..(./(//(//(/

000000

11111122

223333

445566

667777

8(88(89(99(9Falso−negativo

Atividades aceitáveis Atividades inaceitáveis

Falso−positivo

acceptable activities unacceptable activities

false-negative

false-positive

Page 8: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.8

© 2006 Paulo Lício de Geus

IDS

• behaviour-based detection

– training required

– either annoyance to users or highly ineffective

! !

! !

! !

! !

"!"!"

"!"!"

"!"!"

"!"!"

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

#!#$#!#!#!#!#!#!#!#!#!#

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

%!%$%!%!%!%!%!%!%!%!%!%

&!&!&!&!&!&!&

&!&!&!&!&!&!&

&!&!&!&!&!&!&

&!&!&!&!&!&!&

'!'!'!'!'!'!'

'!'!'!'!'!'!'

'!'!'!'!'!'!'

'!'!'!'!'!'!'

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

(!(!(!(!(!(

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

)!)!)!)!)!)

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

*!*!*!*!*$*!*!*!*!*

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

+!+!+!+!+$+!+!+!+!+

,!,

,!,

,!,

,!,

,!,

,!,

-!-

-!-

-!-

-!-

-!-

-!-

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

.!.!.

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

/!/!/

Atividades aceitáveis Atividades inaceitáveis

Falso−negativo

Falso−positivo

acceptable activities unacceptable activities

false-positive

false-negative

Page 9: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.9

© 2006 Paulo Lício de Geus

IDS

...

Internet

unknown attacks

known attacks

based IDSknowledge

(packet level)

Page 10: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.10

© 2006 Paulo Lício de Geus

Human Immune System

(or Biological Immune System)

• pioneers (1994 onwards):

– Stephanie Forrest

– Jeffrey Kephart

– Dipankar Dasgupta

– Steven Hofmeyr

Page 11: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.11

© 2006 Paulo Lício de Geus

Human Immune System

• innate systems

– behaviour-based detection, normally inherited

• adaptive systems

– knowledge-based detection, acquired through exposure

• imperfect (people die!)

– but very successful (we’re around for quite some time...)

Page 12: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.12

© 2006 Paulo Lício de Geus

Human Immune System

• layered approach (innate, adaptive)

– very complex mechanism

» science has not yet mastered it all...

! "#$##$#

#$#%$%%$%

%$%

&$&&$&''

((())

)

**++

,,--

.!./001

11

2!22!233

4455

6677

8899

:!:;<<=

==

>$>>$>??

@@AA

BBCC

DDEE

F!FGHH

HII

I

J!JJ!JKK

LLLMM

M

NNOO

PPQQ

R!RSTTU

U

V!VV!VWW

XXYY

ZZ[[

\\]]

^!^_``a

a

b$bb$bcc

ddee

ffgg

hhii

Sistema

Sistemaimunológicoinato

químicasBarreiras

Patógenos

Fagócito

adaptativo

Pele

Linfócito

imunológico

innate immune

system

adaptive immune

system

lymphocytephagocyte

lymphocytelymphocyte

skin

chemical barriers

lymphocytepathogens

Page 13: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.13

© 2006 Paulo Lício de Geus

Human Immune System

• self-regulating response

– time to build specific antibodies

– response strength proportional…

» to existing number of antigens and antibodies

Resposta imunológica para um antígeno específico

Tempo de atraso para o início da resposta adaptativa

Co

nce

ntr

ação

de

anti

corp

os

Resposta primária

Tempo

Resposta secundáriafirst response

antibody concentration

Time

Delay till adaptive response starts Immune response for a specific antigen

further responses

Page 14: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.14

© 2006 Paulo Lício de Geus

Analogies with computer security

human immune system computer security

skin: basic physical isolation packet filtervirus DNA insertion inside the cell buffer/stack overflow

changes in config fileslymphatic system and its memory of past infectionslog file analysis, forensics, IPS?filtering system: mouth, stomach (intestines benefit) packet filteringbehaviour-based detection (phagocytes) process and syscall monitoringcounter-attack by phagocytes and related ones process killing?digestive system: processing of organic matter to retrieve nutrients; remains are disposed of

proxying, application filtering, data conformance sanitization

tonsils (some languages: amygdalae) escape goat, booby traps, honeypotbehaviour-based detection (phagocytes) resource monitoring: mem, I/O, CPUvirus scope ➔ limited to cell (on first analysis) buffer overflow scope ➔ limited to

host process (on first analysis)knowledge-based detection: creation of lymphocytesideal solution

Page 15: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.15

© 2006 Paulo Lício de Geus

Problems

• telling apart self and nonself

– Thymus

» random generation and maturation process (self/nonself)

– that is the hard part!

Nonself

Self

Self

Page 16: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.16

© 2006 Paulo Lício de Geus

Problems

• data patterns in computer attacks - signatures

• domain of possible combinations

• what is “self” in computer application data?

– some approaches monitor syscall activities

Page 17: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.17

© 2006 Paulo Lício de Geus

Alternate view - Danger Model

• Thymus function itself does not explain all

– immune system’s selective actions

• controversial theory says…

detection of damage essential to trigger immune response

• lots of harmless foreign material

– for which the immune system does not react!

» no reaction against useful bacteria in the digestive tract

» no response to food ingested

» no response either to invading virus that do not cause damage

» death of normal cells do not trigger reaction either

» the self is slowly, but constantly, changing

Page 18: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.18

© 2006 Paulo Lício de Geus

Alternate view - Danger Model

(no response)no match

(no response)no match

!!

""##

$$%%

&&''

(())

**++

,,--

..//

0011

2233

4455

6677

8899

::;;

<<==

>>??

@@AABBC

C

DDEE

FFGG

HHII

JJKK

LLMM

NNOO

antigen

danger zone

damaged cell

(no response)

(response)match

danger signals

match

immunologic cell

cell

Page 19: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.19

© 2006 Paulo Lício de Geus

Imuno Project

• Model

Data source

Filtering system

Signature

generator

Response

generator

Anomaly

detector

Primary

response agent

Profile

database

Signature

database

Signature

matcher

Secondary

response agent

Console

Anomaly-based detection system Misuse-based detection system

Page 20: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.20

© 2006 Paulo Lício de Geus

Imuno Project

• detection of known attacks and efficient response

– through signatures for IPS

» blocking packets on-the-fly, for example

• detection of unknown attacks

– evidence analysis (host’s realm)

» countermeasures -> restoration to acceptable levels

» learning from intrusion -> building suitable signature

» storing valuable information

➔ manual “forensic” analysis, partial automation

» restoration of affected parts (undofs, process restarting)

» precise detection/blocking at next exposure (signature obtained)

Page 21: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.21

© 2006 Paulo Lício de Geus

Components

• Console - administrator’s interface » config and log files

• Data source - data collection and delivery» network traffic, application and OS events etc

• Knowledge-Based Detector» performed by an available IPS (prevention)

Page 22: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.22

© 2006 Paulo Lício de Geus

Components

• Adaptive Response Agent» executes pre-specified, precise countermeasures

• Innate Response Agent» smooth, reversible contention measures

» system restoration (irreversible actions)

» filesystem restoration, restarting processes, reboot

• Response Generator» performs specific measures (new signature)

» blocking connections, killing processes etc

• Forensic Support Repository» data collected for further manual inspection

Page 23: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.23

© 2006 Paulo Lício de Geus

Components

• Behaviour-Based Detector» enables identification of probable attacks

» provides moderate, unspecific reactions

» identifies unusual events related with unknown attacks

➔ set of candidate attack signatures

Page 24: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.24

© 2006 Paulo Lício de Geus

Components

• Evidence-Based Detector» search for clear signs of intrusion (successful attack)

– attackers almost always perform:

» subversion of process -> unexpected accesses

» execution of non-authorized services

» editing of config files and system logs

» establishment of non-authorized, easier communication link

» alteration of information in unusual ways

» performing of related violations

– security policies established beforehand to detect...

» indisputable evidences of successful attacks

» specific filesystem changes, network connections

» execution of new processes, kernel module activities

Page 25: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.25

© 2006 Paulo Lício de Geus

Components

• Signature Extractor» elects data signatures ➔ good candidates for attack signatures

» simple algorithm

1. Restore the computer system to a safe state.

2. Select a set C of events to be candidate signatures, where C ⊆ E.

3. progress← 0.

4. While progress <⌈

|C|p

do:

4.1. Get a new event n ∈ N during normal computer system functioning.

4.2. For all ci ∈ C, if ci matches n, then C ← C \ {ci}.4.3. progress← progress + 1.

5. Return each signature in C. If |C| = 0, return null.

Page 26: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.26

© 2006 Paulo Lício de Geus

Similarities with the biological system

» precise detection of known attacks

» efficient elimination of known attacks

» ability to identify unknown attacks in similar/generic way

» provision for generic, but valuable response to unknown attacks

» filesystem restoration and elimination of intrusion processes

» ability to learn and memorize unknown attacks

➔ further precise detection and response.

Page 27: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.27

© 2006 Paulo Lício de Geus

Similarities with the Danger Model

» candidate events limited by proximity in time

➔ to be considered concrete evidence

» no restrictions for closely related events

Page 28: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.28

© 2006 Paulo Lício de Geus

Example of a policy

policy_name[/fully/qualified/application/pathname]{

fs_acl{ list of pathnames and access permissions }

can_exec{ list of programs which can be executed }

max_children = maximum number of children processes

can_send_signal = yes | no

can_manip_modules{ list of kernel modules which can be loaded and unloaded }

connect_using_tcp = yes | no

send_using_udp = yes | no

accept_conn_on_ports{ list of port ranges to listen to }

}

Page 29: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.29

© 2006 Paulo Lício de Geus

Prototype

(1) Precise detection of known attacks: could use Snort;

(2) Precise response of known attacks: some, but not integrated;

(3) Detection through evidence analysis: yes;

(a) Provision for countermeasures: some, but not integrated;

(b) Attack-related packet extraction: yes;

(c) Filesystem forensics support: yes;

(d) Filesystem/process restoration: yes.

(4) Precise detection/response at next exposure: partially implemented.

Page 30: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.30

© 2006 Paulo Lício de Geus

Prototype

• Case studied: buffer overflow

• Filesystem restoration (undofs)

undofs_is_undoable(file)

undofs_discard_prev_log()

4

5

6

8

3

7

undofs_run_parser()

Linux kernel

sys_write(file, ...)

syscall(NR_UNDOFS, op)

sys_undofs(op)

Filesystems

11

10

undofs.conf undologfile

9

12...1

2

do_mount_root(...)

fwrite(file, ...)

Application

undofs_make_write_log(file, ...)

undofsApplication

Page 31: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.31

© 2006 Paulo Lício de Geus

Results

• Datasets: DARPA and locally collected LAS

Page 32: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.32

© 2006 Paulo Lício de Geus

Results

• named: 3 tests with DARPA and 12 with LAS» real attack signature found in all tests

» but 2 LAS tests produced one false-positive each

0

2

4

6

8

10

12

14

16

18

20

22

24

26

0 2500 5000 7500 10000 12500 15000 17500 20000 22500 25000 27500 30000 32500

Num

ber

of candid

ate

sig

natu

res

Signature extraction progress (number of analyzed events)

DARPA1DARPA2DARPA3

LAS1LAS2LAS3LAS4LAS5LAS6LAS7LAS8LAS9

LAS10LAS11LAS12

Page 33: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.33

© 2006 Paulo Lício de Geus

Results

• wu-ftpd: 6 tests with DARPA» real attack signature found in all tests

» but some false-negative signatures were produced too

8

10

12

14

16

18

20

22

24

26

28

30

32

34

36

38

0 500 1000 1500 2000 2500 3000 3500 4000 4500

Nu

mb

er

of

ca

nd

ida

te s

ign

atu

res

Signature extraction progress (number of analyzed events)

DARPA1DARPA2DARPA3DARPA4DARPA5DARPA6

Page 34: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.34

© 2006 Paulo Lício de Geus

Problem

• Follow-up work

– single kernel implementation used throughout (2.4.19)

– very hard to bring to current kernel line (2.6)

– continuous job of keeping up with kernel (sub)releases

Page 35: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.35

© 2006 Paulo Lício de Geus

Imuno framework requirements

• Prevention

• Detection

– Host level

– Network level

• Response

– Primary (innate)

– Forensic analysis

– Secondary (specific)

• Self-protection

• Administration

Page 36: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.36

© 2006 Paulo Lício de Geus

Subsystems used in Imuno

• Linux kernel, 2.6 series

• LSM (Linux Security Modules)

• Netfilter

• CKRM (Class-based kernel resource management)

• BSD Secure Levels

Page 37: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.37

© 2006 Paulo Lício de Geus

Abstract view

Security

module

Security

module

Normal

process

user space

kernel space

Imuno frameworkSlightly-patched

kernel

......

Page 38: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.38

© 2006 Paulo Lício de Geus

Key features

Multi-functional hooks– LSM hook infra-structure ➔ expanded and more flexible

– more freedom in the execution mode

– user-space interaction

– real-time dynamic control

Interface– use of RelayFS pseudo-filesystem

– new syscall added ➔ imuno()

Page 39: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.39

© 2006 Paulo Lício de Geus

Multi-functional hook scheme

Security

module

user kernel

Hook

controller

Management

functions

Dispatcher 1

Dispatcher 2

Dispatcher 3

imuno()

RelayFS

channels

Normal

process

LSM

hook

... ...

Page 40: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.40

© 2006 Paulo Lício de Geus

UndoFS hooks

– special hooks intercept file-modifying syscalls

– transactions registered on disc ➔ restoration and forensic analysis of filesystems

Process

Middleware UndoFS (hooks)

VFS’s original functions

File/directory

Registry

kernel

usersyscall invocation

Page 41: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.41

© 2006 Paulo Lício de Geus

Other subsystems used

Netfilter

• does the job at the network level

• QoS features can also be used

CKRM

• resource control requirements

– RCFS (Resource Control FileSystem)

• other features not used…

Page 42: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.42

© 2006 Paulo Lício de Geus

Self-protecting mechanism

What needs to be protected?

• kernel components, Imuno framework

• user-space processes involved with security

– those that can implement a immune security system

• vital components of filesystems

• loading chain of the security system

Page 43: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.43

© 2006 Paulo Lício de Geus

Self-protecting mechanism

Policy that was implemented

• kernel isolation

• other administrative restrictions (BSD SEClvl)

• normal process cannot touch protected object

• protection of the imuno() syscall

Page 44: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.44

© 2006 Paulo Lício de Geus

Self-protecting mechanism

Administrative unblocking

• disables self-protection

• password controlled (BSD SEC lvl)

• Interface ➔ 2 RelayFS files

– /imuno/interface/setpasswd

– /imuno/interface/passwd

• can be changed to use TPM

– Trusted Platform Modules employ hardware crypto

Page 45: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.45

© 2006 Paulo Lício de Geus

Complete view

USUÁRIO

KERNEL

...

...

...

RCFSpasswd

CKRM

Ganchos Multifuncionais (LSM)

Ganchos UndoFS

Ganchos Netfilter

Processo

comum

Repositório

Seguro

Módulo de

Segurança 1

Módulo de

Segurança 2

Módulo de

Segurança 3

Interface

RelayFS

Tratamento

de gancho

multifuncional

Chamadas

de sistema

Desbloqueio

Administrativo

BARREIRA DE AUTO-PROTEÇÃO

outros

...

Controladores de recursos

(CPU, E/S, Mem, Rede)

Gerenciamento

estruturas

internas

setpasswd

Page 46: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.46

© 2006 Paulo Lício de Geus

Results of micro-tests

• chosen hook ➔ security_task_create()

• benchmark ➔ 1000 loop invocations of fork()

• 1, 2, 4, 8, 16 and 32 concurrent processes

Test modes

• standard LSM (Imuno disabled)

• multi-functional, but no registered dispatchers

• multi-functional, 5 dispatchers in sequence mode

• multi-functional, 5 dispatchers in interactive mode

– controlled by a user-space process

Page 47: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.47

© 2006 Paulo Lício de Geus

Results of micro-tests

130

140

150

160

170

180

190

200

210

1 2 4 8 16 32

Tem

po (

ms)

Processos

Medições − Modo 1Aproximação − Modo 1

Medições − Modo 2Aproximação − Modo 2

Medições − Modo 3Aproximação − Modo 3

Medições − Modo 4Aproximação − Modo 4

Page 48: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.48

© 2006 Paulo Lício de Geus

Results of macro-tests

Benchmark

• decompression of linux-2.6.12.tar.bz2

• kernel compilation, default configuration

• removal of the whole kernel tree

Hooks exercised (same four previous modes)» security_inode_setattr()

» security_inode_unlink()

» security_inode_rmdir()

» security_inode_create()

» security_inode_mkdir()

Page 49: Immunological security systems

Current research interests at LAS-IC-Unicamp versão 1.0 – 01.Oct.08 Pág 1.49

© 2006 Paulo Lício de Geus

Results of macro-tests

0

100

200

300

400

500

600

700

800

900

Modo 1

Modo 2

Modo 3

Modo 4

Tem

po (

s)

Descompressão Compilação Remoção