Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical...

19
Dr. Sajjan G. Shiva Professor and Chair Department of Computer Science University of Memphis Memphis, TN, USA Security Testing – Status Report

Transcript of Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical...

Page 1: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Dr. Sajjan G. Shiva Professor and Chair

Department of Computer Science

University of Memphis

Memphis, TN, USA

Security Testing – Status Report

Page 2: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Potential attack targets in a system

• Network – identify security vulnerabilities on externally accessible

network-connected devices such as firewalls, servers, and routers.

• Web application – identify vulnerabilities and abnormal behavior within the

applications.

Page 3: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Potential attack targets in a system

• Database – identifying vulnerabilities in system’s databases – due to incorrect configuration of the database security

parameters or improper implementation of the business logic used to access the database

• Security subsystem – identify security vulnerabilities in specific subsystems

Page 4: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Types of security testing • Vulnerability scanning • Security scanning • Penetration testing • Risk assessment • Security auditing • Ethical hacking • Posture assessment

Page 5: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Vulnerability scanning • Network security

– Nessus, OpenVAS, Core Impact, Nexpose, Microsoft Baseline Security Analyzer (MBSA), etc.

• Database security – DBAPPSecurity database vulnerability scanner (DAS-DBScan)

• Web application security – Acunetix

Page 6: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Security Scanning • Network security

– NetScanTools

• Database security – McAfee Security Scanner for Databases, Repscan™ 3.0

• Web application security – AppScan

Page 7: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Penetration Testing • Network security

– BackTrack Linux – Penetration Testing Distribution

• Database security – McAfee Security Scanner for Databases

• Web application security – Arachi

Page 8: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Risk Assessment • Network security

– Microsoft Security Assessment Tool (MSAT)

• Database security – SecureSphere: Discovery and Assessment Server (DAS)

• Web application security – WebScarab

Page 9: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Security Auditing • Network security

– Nsauditor Network Security Auditor

• Database security – SecureSphere: Database Activity Monitoring (DAM), DAS-

DBAuditor: Database Auditor, DAS-LogAuditor: Log Auditor

• Web application security – Wapiti

Page 10: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Microsoft Security Development Lifecycle (SDL)

Page 11: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Are we safe? • Significant research has been done by the research

community and the industry to enhance security as a whole. • SDLCs have evolved to incorporate secure coding and

testing methodologies. • Security testing is categorized into various types, and there

are many tools available for performing each type. • Newer testing tools are created every day, but so are

attacks…

Page 12: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

News articles in June 2012

• ‘Flame’ Spreads via Rogue Microsoft Security Certificates; Flame authors order infected computers to remove all traces of the malware

• LinkedIn Password Breach Spawns Spam Campaign • Last.fm warns users of password leak • ‘SwaggSec’ Claims Hack of China Telecom, Warner Bros. • Anonymous Claims Attack on Facebook • Dutch man charged with stealing credit cards

Page 13: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Trustwave Semiannual Report: The Web Hacking Incident Database What attack methods do attackers use? Period: 2011.

Source: https://www.trustwave.com/downloads/WHID_Semiannual_Report_2011.pdf

Page 14: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Our Four-layer Holistic Security Scheme We envision a 4-layer Holistic Security Scheme: 1. Self-Checking HW /SW Components

(Innermost layer “The core”). 2. Secure applications (Second layer ). 3. Traditional network security infrastructure

(3rd layer). 4. Game Theory Inspired Defense (Outer

layer).

Page 15: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Runtime Monitoring Why is it difficult to perform runtime monitoring of web applications? • Web applications can be compromised in numerous ways.

Monitoring it in the real world is challenging. • Estimating the extent to which the attack may affect the

application is difficult. • Identifying the possibility of the occurrence of an attack

and deciding the appropriate defense mechanism is not trivial.

Page 16: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

“Carrot and Stick” approach • The Carrot and Stick approach refers to a policy of offering

a combination of rewards and punishments to induce the adversary behavior.

• Using game theory, this defense approach can be modeled as a game between the defender and the adversary.

Page 17: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Game Inspired Defense Architecture (GIDA)

GIDA Control Unit

Internet Sensors

(Intrusion detection systems)

Actuators

(Firewalls)

Target

system/

network

Honeypot

Knowledge

Management

System

Page 18: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

KMS GIDA Control Unit

Honeypot Internal Network / Target

System

Actuators

Sensors Network-

Layer(IDS,

etc)

App-layer

(Monitor,...

)

App-Layer

Network-

Layer

(firewall,

etc.)

Other

In put

Devices

Other

Out put

Devices

AIS AVOIDIT

Online knowledge-

bases with info

about attacks

vulnerabilities, etc

Internet

GSS

ADAP

T

AIS & Other

Intelligence

Game

Selectio

n

System

&

Other

Intellige

nce

Game

Model

Repository

Page 19: Security Testing – Status Reportgtcs.cs.memphis.edu/pubs/Shiva_STEP_2012.pdf · •Ethical hacking •Posture assessment . Vulnerability scanning •Network security –Nessus,

Questions?