...

Network Mission Assurance

by user

on
Category: Documents
13

views

Report

Comments

Transcript

Network Mission Assurance
Network Mission Assurance
Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny
Lockheed Martin Advanced Technology Laboratories
Camden, NJ 08102
{mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
Abstract
1. Introduction
The doctrine of Network Mission
This document describes the Network
Assurance (NMA) evaluates the value of
Mission Assurance (NMA) doctrine of
information assurance and the risk of
Lockheed Martin Advanced Technology
computer threats based upon their impact on
Laboratories (ATL). This doctrine is used as a
the organizational functions supported by the
guide to focus our information assurance
network. The NMA framework is comprised
efforts in different research areas and ensure
of
Asset
these efforts can work together in a dynamic
Identification, Infrastructure Model and
distributed network environment and
Control, Threat Analysis and Prediction, and
effectively leverage and incorporate point
Response Coordination. Our research in
security solutions into a robust information
support of the NMA investigates technical
assurance architecture.
four
technical
functions:
solutions for trust-based resource control,
It is our belief that one cannot simply
reflective and reconfigurable network
back-fit existing security point solutions onto
services, autonomic network defense, and
existing architectures and expect to have an
cyber-attack representation. We contend that
improved security infrastructure. In fact, this
NMA unifies the purpose and function of
can result in a less secure architecture that
separate information assurance programs into
requires a great deal of manual effort in
a holistic, network-centric solution.
maintenance and monitoring.
Point security products (e.g., vulnerability
race is simply its current scope. Since most
scanners, intrusion detection systems,
security systems focus on relatively atomic
firewalls) often operate in isolation. In
attack actions (e.g., port scans, buffer
contrast, according to NMA, security
overflows), they have difficulty defending
solutions should not only be integrated with,
against coordinated attack campaigns. An
but orchestrated among, the components of a
attack campaign has an overall goal and is
network infrastructure.
composed of many atomic actions over time
NMA is a high level concept that spans a
that must be carefully and successfully carried
large area of information security and
out to achieve the desired goal.
information assurance. In support of this
The need for rapid assembly of tactical
doctrine, ATL is leveraging its applied
networks exacerbates the difficulty. In a
research strengths in quality of service (QoS),
dynamic coalition environment, one does not
distributed processing, data fusion, and
have the opportunity to perform the
intelligent agents to apply to the information
vulnerability assessment and red team testing
assurance domains. We believe that research
one would on static configurations. Further,
and technologies from many other academic,
one cannot assume that the systems will
commercial, and government sources also
always provide the same mission critical
support the NMA doctrine.
functionality. With future reconfigurable
2. Network Mission Assurance Approach
systems using open system architectures,
The ability to launch successful cyber
what parts of the system are critical at any
attack campaigns is far outpacing the ability
given time in the mission becomes a run-time
to defend against them. A fundamental
rather than design-time decision.
problem in the information assurance arms
The goal of the Network Mission
2
Assurance (NMA) is to keep the mission-
of new technologies to future operational
critical systems operational while under a
environments.
cyber attack. This implies the ability to
3. ATL NMA Research Areas
identify and map critical assets to operational
With these concepts in place the four main
support capabilities. It also requires efficient
research areas of Lockheed Martin Advanced
and judicious use of resources by focusing
Technology Laboratories’ Network Mission
additional resources on threatened assets.
Assurance
(NMA)
are:
(1)
Asset
In addition, we believe there is great value
Identification, (2) Infrastructure Model and
in leveraging offensive attack campaign or
Control, (3) Threat Analysis and Prediction,
threat knowledge for better defense. This
and (4) Response Coordination. Figure 1
allows us to explore full life cycle response
provides a conceptual overview that illustrates
through simulation before reflecting any
the functional relationship between the
changes onto the infrastructure components.
technology components of the NMA research
NMA is intended to work in concert with
existing
areas.
information
assurance efforts, which
we believe are both
necessary and effective.
However, we also contend
that there must be a higher
level vision that drives
requirements, metrics, and
capabilities for transition
Figure 1. Network Mission Assurance conceptual overview
3
3.1 Asset Identification
identification can enable more effective,
The functions of asset identification are to
identify
critical
mission
reactive, and proactive responses by
objectives
protecting assets that are most relevant to
dynamically and continuously and to map,
mission success, and provide a valuable
possibly through
discriminator for resource allocation.
multiple
levels of
abstraction, the criticality of mission
3.2 Infrastructure Model and Control
objectives to low-level infrastructure assets.
We believe that infrastructure models for
For example, in mission terms it might be
information assurance must satisfy two
important to identify at the high level a
important conditions. First, they must
critical unmanned autonomous vehicle (UAV)
represent the state of the infrastructure in a
video feed. In system terms, this video feed
manner that allows a system to reason about
would map at the low level to network flows,
itself. Second, they must actuate changes in
ports, and processors on hosts in the
the model in the infrastructure itself. The
operational equipment.
models we have in mind are, therefore,
While others have recognized the need for
reflective. Specifically, the reflective
critical asset identification, we believe there is
infrastructure provides a representation of the
a need to make this process continuous and
infrastructure that maintains infrastructure
dynamic, and we have outlined an approach
state and critical asset analysis; threat history,
for realizing this process. In addition, we have
analysis, and projection; and responses and
identified how to integrate the results of
status.
critical asset identification with other security
Changes to the model, however, need not
components of a distributed system. For
be reflected immediately into the actual
example, results from critical asset
infrastructure but rather be considered as a
4
hypothetical state. This supports the ability to
they constitute threat actions by an adversary.
reason over proposed changes using
Second, systems must predict what the
simulation before actuating the changes back
adversary is likely to do next. Third, systems
on to the infrastructure components.
must project the impact of the adversary’s
3.3 Threat Analysis and Prediction
trajectory on infrastructure assets, in
Current network security measures are
particular the assets critical to mission
designed to make it more difficult for
success.
attackers to penetrate the boundary of an
These functions are crucial for planning
infrastructure. However, if an adversary is
and implementing an effective response to an
successful in penetrating this line of defense
attack campaign. Performing these tasks in
while eluding detection, very little stands in
less time than attackers perform their own
the way of total compromise of the
tasks is particularly difficult now that so many
infrastructure. There is a good reason this
attacks are heavily scripted and distributed.
model
an
We believe that automation in these areas is
infrastructure against a potential adversary,
crucial. Threat Analysis and Prediction
for all its complexity, is far less complicated
research is necessary to fill this current gap in
than recognizing and analyzing the attack of
infrastructure security.
an actual adversary.
3.4 Response Coordination
is
so
pervasive:
sealing
Threat Analysis and Prediction research
Information assurance decisions have
seeks to reduce this complexity by looking at
probabilistic and interdependent effects upon
three types of necessary tasks. First, systems
an organization’s operations. The complexity
must correlate events occurring throughout
of decisions can overwhelm human operators
the infrastructure and deduce correctly that
in large infrastructures. Thus, timely response
5
for infrastructure defense necessitates
4.1 Dynamic Trust-based Resources
automated response coordination.
Cooperation and sharing of resources on a
Response Coordination seeks to enable
network requires some degree of trust
automated threat response decision making. It
between the entities involved. In current
integrates with components for threat analysis
systems, this degree of trust manifests itself
and network control through infrastructure
through static configuration of authentication
models. We believe decision-theoretic
and access control mechanisms that determine
concepts such as belief, action, and utility
trust levels and map them to access rights.
map well to infrastructure defense concepts
This approach requires a great deal of
such as threat, control, and mission. These
planning and effort. As the time provided to
mappings can be leveraged to reason about
organize
effective responses, even in conditions of
infrastructures decreases and their interactions
uncertainty.
become more complex, it is increasingly
4. ATL Work in Support of NMA
unlikely the proper degree of trust can be
collaborative
computer
This section provides brief overviews of
determined at system configuration time.
the specific areas of research that Advanced
Clearly this is the case for self-organizing,
Technology Laboratories (ATL) is working in
autonomous systems where cooperating
to support the Network Mission Assurance
entities may not even be known at
(NMA). Our goal is to provide mission
configuration time.
assurance by ensuring survivability of high
Current solutions, in and of themselves,
value assets and continued operation of
are too rigid, require too much human
critical infrastructure components.
intervention, and are inadequate for managing
resources among rapidly assembling,
6
dynamic, active network components. What is
tightly couple this continually assessed trust
needed in such cases is a dynamic, adaptive
with
determination of trust that is integrated with
mechanisms to ensure that requesting
resource allocation mechanisms, so that as
processes are trusted and, thus, permitted to
trust in an entity degrades, so does its access
use system resources. If a requesting process
to resources. Such trust-based resource
exhibits suspicious behavior, DyTR will
allocation mechanisms are necessary to limit
degrade its level of trust for that process, and
and ultimately completely restrict the
subsequently reduce that process’s access to
disruptive behavior of an entity and ensure
system resources, so that other critical
fault tolerance.
resources can continue to operate to achieve
The goal of Dynamic Trust-based
low-level
resource-allocation
fault-tolerant behavior.
Resources (DyTR), which ATL is currently
4.2 ATL’s Next Generation Infrastructure
developing under the DARPA Fault Tolerant
ATL’s Next Generation Infrastructure
Networks program, is to go beyond traditional
(ANGI) project has developed technology for
authentication-based approaches to trust and
building systems that can be deployed in
build systems where the trustworthiness of
increasingly more dynamic, distributed, and
entities adapts over time based on system
open environments. This includes an
events. DyTR provides an adaptive trust-
integrated set of services for dynamic system
assessment methodology that allocates
modeling as well as for system QoS.
resources dynamically to an initial level of
ANGI is a library of tools and executable
credentials, continually assesses trust, and
services for developing and deploying
adaptively allocates resources in accordance
distributed objects. Among these services are
with changes in perceived trust. DyTR will
model sharing and sensor mechanisms that
7
allow systems to discover and monitor their
associating utility (value or cost) with some of
own configuration and environment.
those actions and beliefs. It is a probabilistic
We have also developed for ANGI a rich
reasoning technique that extends the concepts
set of QoS controls for classifying and
of Bayesian networks and decision trees.
shaping traffic flows, which provide the
ATL is applying this technique to
foundation for managing and securing the
information assurance by evaluating sensor
shared network infrastructure and, in
findings and specific threat alerts in a model
particular, protecting a system against
of potential responses and their impact upon
distributed denial of service attacks. The QoS
network services and assets. Then the
controls are superior to traditional firewall
decision network selects the action with
filters because they provide wider and more
maximal expected utility, which factors
fine-grained range of influence. They also
certainty and priority in a holistic manner for
provide an end-to-end solution allowing
mission assurance.
greater latitude over where to place the
The primary challenge of this research is
controls. This allows confinement of
to identify and incorporate a technology for
potentially malicious flows through limits and
response selection which functions to provide
priorities and protection of critical flows that
mission assurance under the inherent
are necessary to mission success.
uncertainty
4.3 Decision Network Technology
data/control in large infrastructures.
Decision networks—also known as
and
incompleteness
of
4.4 Distributed Autonomic Response
influence diagrams—use a graph structure to
Coordinator
represent dependencies between possible
ATL is developing a prototype Distributed
decisions and uncertain beliefs, also
Autonomic Response Coordinator (DARC)
8
that uses the ANGI framework as the
responses against single- and multi-node
foundation to deploy and manage the
attacks.
distributed sensor information as well as
4.5 Cyber Attack Workstation
ANGI’s dynamic QoS capabilities for
In keeping with our belief that leveraging
response mechanisms. The DARC prototype
offensive attack campaign knowledge makes
uses existing intrusion detection and
for better defense, ATL has also developed a
vulnerability assessment products as sensors.
prototype Cyber Attack Workstation (CAW).
We intend to apply decision network logic
The CAW provides a pluggable API and GUI
to develop autonomic response to more
for adding, integrating, and executing cyber
devastating and more rapid cyber attacks. The
reconnaissance and attack scripts. The
challenge is to develop an autonomic
interface generates a map of the network as
response mechanism that can understand an
reconnaissance information is gathered, which
attack campaign to determine the best
allows the user to target specific hosts with
response in a dynamic environment given the
particular vulnerabilities. The interface also
uncertainty of intrusion detection and
allows users to select the level of risk they are
vulnerability assessment sensor information.
willing to accept, and the CAW will adjust the
This will ensure mission assurance in the
parameters of attacks accordingly.
presence of an attack.
Future versions of the CAW will
The goal of DARC is to provide a
automatically and dynamically formulate and
distributed, autonomic response capable of
execute cyber offensive attack campaigns that
detecting, adapting, and collaboratively
meet mission objectives and constraints. The
responding to cyber attacks. It will enable the
CAW will determine the appropriate steps of
coordination and monitoring of start-to-end
the campaign based on the intent of the user
9
and the risks the user is willing to accept. The
Metabase
long-term goal is to incorporate the attack-
meaning that capability attributions have been
campaign understanding and decision-model
assigned to the vulnerabilities listed in the
logic developed for DARC in order to
database. This formal representation will
produce more sophisticated offensive attack
allow advanced reasoning for correlating,
campaigns.
predicting, and projecting attacks.
4.6 Attacker Capability Ontology
5. Future Work
A key enabler of ATL’s future work in
ATL
(http://icat.nist.gov/icat.cfm),
continues
its
research
and
information assurance is the formal
development in information assurance in each
representation of, and reasoning about, cyber
of the projects described above, using the
attack data. Two important aspects of this
NMA doctrine as a guide. As NMA
domain we have attempted to capture are: (1)
technology matures, we seek to deploy
the
software
information assurance products technology as
vulnerabilities and the capabilities that
well as transfer the results of our research into
attackers gain by exploiting them on actual
the
systems, and (2) the relationships among
community.
these capabilities. For this effort we have
Acknowledgements
relationship
between
developed the Attacker Capability Ontology.
broader
information
assurance
Defense Advanced Research Projects
The Attacker Capability Ontology is
Agency/Air Force Rome Laboratory, contract
implemented in both Resources Description
Number F30602-02-C-0109.
Framework Schema (RDFS) and DARPA
References
Agent Markup Language (DAML). It has also
NMA
been integrated with the ICAT Vulnerability
Home
Page:
external.lmco.com/projects/ia/
10
http://www.atl.
Fly UP