17
Ragib Hasan Johns Hopkins University en.600.412 Spring 2011 Lecture 10 04/18/20 11 Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing

  • Upload
    samira

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

Security and Privacy in Cloud Computing. Ragib Hasan Johns Hopkins University en.600.412 Spring 2011. Lecture 10 04/ 18/ 2011. Malware and Clouds. Goal : To explore how clouds can be used in malware detection, and how malware can use clouds. Review Assignment #9 : - PowerPoint PPT Presentation

Citation preview

Page 1: Security  and  Privacy  in  Cloud Computing

Ragib HasanJohns Hopkins Universityen.600.412 Spring 2011

Lecture 1004/18/2011

Security and Privacy in Cloud Computing

Page 2: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 2

Malware and Clouds

• Goal: To explore how clouds can be used in malware detection, and how malware can use clouds.

• Review Assignment #9:– CloudAV: N-Version Antivirus in the Network

Cloud, USENIX Security, 2008.

4/18/2011

Page 3: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 3

Cloud-AV: Putting the Antivirus on Clouds

Main premise: – Executable analysis currently provided by host-

based antivirus software can be more efficiently and effectively provided as an in-cloud network service.

– Or

– Anti-Virus-as-a-service4/18/2011

Page 4: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 4

Problems with host-based Anti-Virus

• Vulnerability window: – There is a significant vulnerability window between

when a threat first appears and when antivirus vendors generate a signature.

• Undetected malware:– a substantial percentage of malware is never detected

by antivirus software• Vulnerable Anti-Virus:– Malware is actually using vulnerabilities in antivirus

software itself as a means to infect systems

4/18/2011

Page 5: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 5

Solution Approach

• Antivirus as a network service:– Run the Anti-virus on a cloud, while running a

lightweight agent on user machines

• N-version protection– Run multiple versions/vendor Anti-Virus/scanners

on the cloud to ensure better detection

4/18/2011

Page 6: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 6

N-version programming

Idea: Generate multiple functionally equivalent programs independently (by different teams) from the same initial specifications– Goal: Reduce possibility of bugs

N version protection: – Run multiple scanners in parallel, to increase

detection rate

4/18/2011

Page 7: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 7

Advantages of cloud based anti-Virus

• Better detection of malicious software• Enhanced forensics capabilities• Retrospective detection• Improved deployability and management• No vendor lock-in … service is vendor agnostic

4/18/2011

Page 8: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 8

System Architecture

4/18/2011

3 major components:1. a lightweight host agent run on end hosts2. a network service that receives files from hosts and identifies malicious or

unwanted content; and 3. an archival and forensics service that stores information about analyzed files

and provides a management interface for operators.

Page 9: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 9

Host agent

• A lightweight process running on host– Can be Implemented on Windows, Mac, Linux

clients• Tasks:– Capture accesses to executable files, – hashe files to extract unique ID, – check ID against local black/white lists, – send unknown executable files to network cloud

service

4/18/2011

Page 10: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 10

Network service

• Consists of multiple Anti-Virus, scanners, and behavioral analysis tools– Behavioral analysis tools attempt to detect

anomaly by analyzing app behavior in a sandbox• Combines scan results from multiple tools and

sends report to host agent

4/18/2011

Page 11: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 11

Forensic storage service

• Stores information about scan logs, hosts• Can assist in forensic analysis and retroactive

scans

4/18/2011

Page 12: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 12

Challenges

• Network latency:– unlike existing antivirus software, files must transported

into the network for analysis; • Analysis scheme: – an efficient analysis system must be constructed to handle

the analysis of files from many different hosts using many different detection engines in parallel; and

• Comparison with local scanners:– the performance of the system must be similar or better

than existing detection systems such as antivirus software.

4/18/2011

Page 13: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 13

Evaluations: Performance of multiple Anti-Virus engines

4/18/2011

Page 14: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 14

Disadvantages

Disconnected operation:– Host agent can’t detect new malicious files

without network connectivityLack of context:– Scanners do not have access to large local context

Handling new malware:– Difficult to detect non executable malware (e.g.,

malicious word documents)

4/18/2011

Page 15: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 15

Discussion

• What other services can be run on a cloud?

4/18/2011

Page 16: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 16

Using Clouds for Malware

• Clouds can be used by malicious parties• Misuse can include:– Cloud based botnets– Cloud based spammers– Cloud based cracking services• WPACracker.com – Claims to break WPA passwords for

$17 in under 20 minutes, using a cloud

4/18/2011

Page 17: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 10 | JHU | Ragib Hasan 17

Discussion

• Is it realistic / feasible for a spammer to use a cloud?

4/18/2011