Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel,...

21
Bickering In-Depth Rethinking the Composition of Competing Security Systems Patrick McDaniel, [email protected] Sean W. Smith, [email protected] Speaker Chia-Yi, Cho Date 2010/05/26

Transcript of Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel,...

Page 1: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Bickering In-Depth :Rethinking the Composition

of Competing Security Systems

Patrick McDaniel, [email protected]

Sean W. Smith, [email protected]

Speaker : Chia-Yi, ChoDate : 2010/05/26

Page 2: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Outline

•Abstract•About defense in-depth•Protection or Protectionism?•Turn Off Your Firewall•Security Conflict Scenarios•An Initial Exploration•Approach : Secure Negotiation•Other Work

Page 3: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Abstract

•Avast array of security software exists, and because most of it addresses only relatively small facets of information security, it remains unclear how users should compose such software to achieve a reasonable degree of protection coverage.

Page 4: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

About defense in-depth

•“defense in-depth” can exacerbate existing performance and usability problems and lead to an unintentional loss of security.

Page 5: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Protection or Protectionism? ( 1/2 )

• Computer security software aims to detect, stop, kill, eliminate, or counterattack malicious code and unwanted data.

• Because malware has a chance to hit back or evade detection, so much security software strives to intercept and control its host as much as possible.

• Users have little choice to install security software programs:“personal” firewalls, OS firewalls, email virus scanners, desktop antivirus programs, antispyware toolbars, various browser plug-ins to counter phishing and spoofing attacks…

Page 6: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Protection or Protectionism? ( 2/2 )

• We believe that this self-focused view of software defense can lead to a variety of problems, including :

A loss in both security efficacy and system performance.

A potentially disastrous fusion of security policies.Poor management strategies.

• We claim that enabling systems from different vendors to negotiate resource and measurement needs can ease or eliminate the problem.

Page 7: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Turn Off Your Firewall ( 1/2 )

•Pasting two or more security mechanisms in the name of defense-in-depth and having them interact in unanticipated, counterproductive, or ultimately insecure ways doesn’t seem very desirable.

•Hackers seem to worry about the problem of well-engineered security composition.

Page 8: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Turn Off Your Firewall ( 2/2 )•Although the security community accepts

defense-in-depth as an entrenched paradigm, it remains unclear whether we have practical tools, frameworks, and techniques for enabling the smooth cooperation of real security software systems.

•Perhaps manual examination, configuration tuning, and certification reviews can offer some assistance, but such an approach doesn’t seem sustainable or scalable.

Page 9: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Security Conflict Scenarios ( 1/2 )•A few areas of potential conflict exist :Network connectivity can be interrupted due to

firewalls interacting with network address translation, VPNs, other packet filters, and network management mechanisms.

Computers are often packed with a variety of software security agents, the net effect of which is to drastically impair the machine’s performance.

the research community has recently advocated using collaborative security, whereby large, distributed networks of intrusion sensors and countermeasures share intrusion alerts, automatically generated infection or malware signatures, and auto-generated patches.

Page 10: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Security Conflict Scenarios ( 2/2 )•Software engineering best practices teach

students to distrust input parameters and function arguments and to check these parameters for sanity before use.

• In dynamically composed applications, where we might construct processing pipelines from many similar components and libraries, much of this checking is redundant and can interfere with performance.

Page 11: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

An Initial Exploration ( 1/5 )

•We conducted various experiments to help us understand to what extent software protection mechanisms clash.

•Security software tends to interfere with other security software and decrease system performance.

•Windows XP machine: no protection mechanisms, a moderate number of common protection measures, and heavy protection.

Page 12: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

An Initial Exploration ( 2/5 )•Our experiments included several

benchmarks :

Measuring the time it took to copy a directory from an external hard drive to the system.

Creating a zipped directory using 7-zip.Encrypting a file using Gpg4Win.Copying a directory over the network.Compiling the Apache HTTP server through Cygwin.Encoding MP3 files through iTunes.Booting the system.Loading the Wachovia homepage.

Page 13: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

An Initial Exploration ( 3/5 )• Runtimes increased on the more protected

systems.

• Compiling Apache was particularly : on the unprotected system it took two minutes-versus 45 minutes for the heavily protected system.

• Although some programs terminate installation when they find an incompatible program, many others allow installation to continue, thereby exposing the user to the claimed conflicts.

Page 14: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

An Initial Exploration ( 4/5 )•Ranging from the “blue screen of death”

to unhandled Windows kernel exceptions causing a startup-crash-reboot cycle, a variety of errors :

•Installing CA Internet Security but after installing Clam AV and restarting, the ma chine lost network connectivity.

Page 15: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

An Initial Exploration ( 5/5 )•These initial experiments indicate that

many conflicts occur when multiple protection mechanisms are installed.

•Although some software packages seem to be aware of the potential for conflicts, many still let users install the software anyway.

Page 16: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Approach : Secure Negotiation ( 1/3 )• We suggest that one way to ease the

management and performance burdens of running multiple security systems from multiple vendors is to adopt a mechanism for secure negotiation of hooking and other policy events and behaviors.

• Not only must this framework address the need to negotiate over specific security or measurement functionality, but it must also deal with navigating the policy trade-offs and conflicts inherent in the composition of these competing function ality requirements.

Page 17: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Approach : Secure Negotiation ( 1/3 )

Page 18: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Approach : Secure Negotiation ( 3/3 )

•A major goal of the negotiation framework isn’t just to get the functionality of two systems cooperating-it could also help compose security policy.

•Where goals agree, negotiation about load sharing can occur; where they conflict, the components can decide to follow a course of mu tual distrust and alert their administrators about the conflict.

Page 19: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Other Work ( 1/2 )•The systems or components being

composed are themselves security systems, and thus their failure modes are potentially more dangerous because they typically fail open.

•whereas secure composition focuses on the composition of functionality as measured by a certain set of properties, security cooperation implicitly demands the composition of policy.

Page 20: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Other Work ( 2/2 )• It seeks to let multiple security systems operate

on the same data streams and system control structures without a needless loss in performance or security, and with the ability to resolve conflicts between the goals of the policies controlling these ostensibly competing systems.

• Unfortunately, as we’ve begun to see through our case studies, competition for control over a system’s security posture can leave systems mired in a performance.

Page 21: Bickering In-Depth : Rethinking the Composition of Competing Security Systems Patrick McDaniel, mcdaniel@cse.psu.edu Sean W. Smith, sws@cs.dartmouth.edu.

Thank you for listening.